Washington University in St. Louis
cart_icon-1

SECP18: CISM - Certified Information Security Manager (30 hrs)

Washington University Logo
Course summary:

The CISM training course focuses on information security management and governance, covering topics such as the creation of security programs and incident management. With the increasing demand for skilled information security professionals, CISM has become a universal standard for the industry. Possession of this certification demonstrates precise knowledge, practical experience, and commitment to the field, making CISM holders some of the most certified professionals in information security.

Through the CISM certification, delegates learn how to tailor ever-changing technology to their enterprises and align information security programs with larger organizational goals. This enables organizations to emerge as valuable players in the industry and expand their clientele. Join the CISM cybersecurity training course and become a recognized expert in information security management.

Course outline:

Domain 1 – Information Security Governance

  • Information Security Governance
  • Effective Information Security Governance
  • Governance and Third Party Relationships
  • Information Security Metrics
  • Information Security Governance Metrics
  • Information Security Strategy
  • Information Security Strategy Development
  • Strategy Resources and Constraints
  • Other Frameworks and Compliances
  • Action Plans to Implement Strategy
  • Governance of Enterprise IT

Domain 2 – Information Risk Management and Compliance

  • Risk Management Overview
  • Risk Assessment
  • Information Asset Classification
  • Assessment Management
  • Information Resource Valuation
  • Recovery Time Objectives
  • Security Control Baselines
  • Risk Monitoring and Training and Awareness
  • Information Risk Management Documentation

Domain 3 – Information Security Program Development and Management

  • Information Security Program Management Overview
  • Information Security Program Objectives and Concepts
  • Information Security Program Technology Resources
  • Information Security Program Development and Framework
  • Information Security Program Roadmap and EISA
  • Security Program Management, Administration, Services and Operational Activities
  • Controls, Metrics and Monitoring
  • Measuring Operational Performance and Common Information Security Program Challenges

Domain 4 – Information Security Incident Management

  • Incident Management Overview and Procedures
  • Incident Management Resources and Objectives
  • Incident Management Metrics and Indicators
  • Business Continuity and Disaster Recovery Procedures
  • Post-Incident Activities and Investigation
  • ISACA Code of Professional Ethics, Laws, Regulations and Policies
Learning outcomes:
  • Identify critical issues and customize company-specific practices to support the governance of information and related technologies
  • Bring credibility to the enterprise for which they are employed
  • Take a comprehensive view of information systems security management and their relationship to organizational success
  • Demonstrate to enterprise customers their commitment to compliance, security and integrity; ultimately contributing to the attraction and retention of customers
  • Ensure that there is improved alignment between the organization's information security program, executives and its broader goals and objectives
  • Provide the enterprise with a certification for Information security management that is recognized by multinational clients and enterprises, lending credibility to the enterprise

Join the Waitlist

Prerequisites:

There are no prerequisites to take this course; however, to get the CISM certification you need to:

  • Pass the CISM examination
  • Submit an application for CISM certification
  • Adhere to the Code of Professional Ethics
  • Dedicate to the Continuing Professional Education Program
  • Compliance with the Information Security Standards
Recommendations

CISM certification is a globally recognized professional requirement in the IT Security domain. This certification is best suited for:

  • Security consultants and managers
  • IT directors and managers
  • Security auditors and architects
  • Security systems engineers
  • Chief Information Security Officers (CISOs)
  • Information security managers
  • IS/IT consultants
  • Chief Compliance/Privacy/Risk Officers
The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives.
Have questions?
Contact us if you would like to speak with a program director or visit our Frequently Asked Questions page.