Key Features

MONEY BACK GUARANTEE

How this works :

At Simplilearn, we greatly value the trust of our patrons. Our courses were designed to deliver an effective learning experience, and have helped over half a million find their professional calling. But if you feel your course is not to your liking, we offer a 7-day money-back guarantee. Just send us a refund request within 7 days of purchase, and we will refund 100% of your payment, no questions asked!

For Self Placed Learning :

Raise refund request within 7 days of purchase of course. Money back guarantee is void if the participant has accessed more than 50% content.

  • 16 Hrs of High Quality e-Learning content
  • 2 Simulation Exams
  • 88 Knowledge check questions
  • 65 End of Chapter Quizzes
  • 16 CPE's Offered
  • 98.6% Pass rate

About Course

  • What is this course about?

    CISM certification training from Simplilearn, aligned to ISACA, ensures you are re-equipped on the best practices in the industry and enables you to ace the exam in the first attempt. The certification helps you develop the expertise to manage, design, oversee and/or assess an enterprise’s information security.

  • What are the course objectives?

    By the end of this training you will:
    • Be able to define the architecture, design and manage the security of your organization.
    • Acquire the relevant knowledge and skills required to clear the CISM certification exam
    •  Able to demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.
    • Earn the requisite 16 CPEs required to take up the CISM certification exam
    • Develop a working knowledge of the 4 domains areas as prescribed by ISACA –Exam Candidate Information Guide 2015.

  • Who should do this course?

    CISM certification is a globally recognized professional requirement in the IT Security domain. This certification is most suited for:
    • Security Consultant/Manager
    • IT Director/Manager
    • Security Auditor/Architect
    • Security Systems Engineer
    • Chief Information Security Officer
    • Information Security Managers
    • IS/IT Consultants
    • Chief Compliance/Privacy/Risk Officers

  • Our Program Advisor

    Joseph Steinberg is an internationally renowned Cyber Security thought leader and author. He has penned several books, including (ISC)2’s official study guide for the CISSP-ISSMP exam, and currently writes a column on Cyber Security and entrepreneurship for Inc. He has also been associated with Forbes and several other renowned publications. Onalytica ranks him among the top cyber security influencers in the world. His work is cited in over 100 published US patent filings. Steinberg is one among only 28 people around the world to hold the suite of advanced information-security certifications – CISSP, ISSAP, ISSMP, and CSSLP – indicating that he possesses a rare, robust knowledge of Information Security. He is the CEO of SecureMySocial, the company which recently introduced the world’s first system that gives real-time warnings of inappropriate social-media posts.

Course Syllabus

    • Domain 00 - Introduction to CISM 06:59
      • 0.1 Introduction 00:18
      • 0.2 Introduction to CISM® 00:47
      • 0.3 Objectives 00:31
      • 0.4 About ISACA® 01:19
      • 0.5 ISACA® Certifications 00:36
      • 0.6 Value of CISM® 01:09
      • 0.7 Requirements for CISM® Designations 00:42
      • 0.8 CISM® Domains 00:00
      • 0.9 CISM® Exam 00:48
      • 0.10 Quiz 00:00
      • 0.11 Summary 00:40
      • 0.12 Conclusion 00:09
    • Domain 01 - Information Security Governance 56:09
      • 1.1 Welcome 00:30
      • 1.2 Objectives 00:49
      • 1.3 Tasks Statements 00:48
      • 1.4 Tasks Statements (Contd.) 00:36
      • 1.5 Knowledge Check 00:00
      • 1.6 Knowledge Statements 00:52
      • 1.7 Knowledge Statements (Contd.) 00:37
      • 1.8 Tasks and Knowledge Statement 00:30
      • 1.9 Knowledge Check 00:00
      • 1.10 Information Security Governance Overview 00:00
      • 1.11 Importance of Information Security Governance 00:00
      • 1.12 Outcomes of Information Security Governance 00:00
      • 1.13 Effective Information Security Governance 01:11
      • 1.14 Business Goals and Objectives 01:08
      • 1.15 Scope and Charter of Information Security Governance 01:35
      • 1.16 Scope and Charter of Information Security Governance 00:48
      • 1.17 Knowledge Check 00:00
      • 1.18 Roles and ResponsibilitiesStrategic Alignment 01:17
      • 1.19 Roles and Responsibilities 00:50
      • 1.20 Roles and ResponsibilitiesValue Delivery 00:48
      • 1.21 Knowledge Check 00:00
      • 1.22 Roles and ResponsibilitiesResource Management 00:55
      • 1.23 Roles and Responsibilities 00:46
      • 1.24 Roles and Responsibilities 01:00
      • 1.25 Knowledge Check 00:00
      • 1.26 Governance Risk Management and Compliance 01:04
      • 1.27 The Business Model for Information Security 00:00
      • 1.28 The Business Model for Information Security 00:00
      • 1.29 Information Security Governance Metrics 00:52
      • 1.30 Information Security Governance Metrics 00:46
      • 1.31 Effective Security Metrics 00:00
      • 1.32 Knowledge Check 00:00
      • 1.33 Strategic Alignment Metrics 01:12
      • 1.34 Risk Management Metrics 01:34
      • 1.35 Knowledge Check 00:00
      • 1.36 Value Delivery Metrics 01:12
      • 1.37 Resource Management Metrics 01:10
      • 1.38 Performance Measurement Metrics 01:32
      • 1.39 Developing an Information Security Strategy 01:00
      • 1.40 Common Pitfalls in Developing an Information Security Strategy 00:00
      • 1.41 Information Security Strategy Objectives 00:46
      • 1.42 Knowledge Check 00:00
      • 1.43 Goals of Information Security Strategy 00:51
      • 1.44 Determining Current State of Security 01:45
      • 1.45 COBIT 00:37
      • 1.46 Knowledge Check 00:00
      • 1.47 Capability Maturity Model 01:17
      • 1.48 Balanced Scorecard 00:36
      • 1.49 Knowledge Check 00:00
      • 1.50 Architectural Approaches 00:55
      • 1.51 ISO IEC 27000 Series 01:09
      • 1.52 Risk Objectives 01:25
      • 1.53 Information Security Strategy Development 00:47
      • 1.54 Strategy Resources 01:25
      • 1.55 Strategy Resources 01:43
      • 1.56 Strategy Resources 01:36
      • 1.57 Strategy Resources 02:32
      • 1.58 Knowledge Check 00:00
      • 1.59 Strategy Constraints 00:44
      • 1.60 Action Plan in Strategy implementation 00:42
      • 1.61 Policy Development 01:22
      • 1.62 Knowledge Check 00:00
      • 1.63 Standards Development 01:04
      • 1.64 Training and Awareness 01:11
      • 1.65 Action Plan Metrics 01:35
      • 1.66 Information Security Program Objectives 00:00
      • 1.67 Case Study1 US Financial Institution 00:00
      • 1.68 Case Study 1 US Financial (contd.) 00:45
      • 1.69 Case Study 1 US Financial (contd.) 00:48
      • 1.70 Case Study 1 US Financial (contd.) 01:08
      • 1.71 Case Study2 TeliaSonera 00:00
      • 1.72 Case Study 2 TeliaSonera (contd.) 00:51
      • 1.73 Case Study 2 TeliaSonera (contd.) 00:39
      • 1.74 Quiz 00:00
      • 1.75 Summary 01:23
      • 1.76 Summary (contd.) 01:04
      • 1.77 concludes 00:07
    • Domain 02 - Information Risks Management and Compliance 52:08
      • 2.1 Welcome 00:25
      • 2.2 Information Risk Management 00:22
      • 2.3 Objectives 00:46
      • 2.4 Tasks Statements 00:48
      • 2.5 Tasks Statements (contd.) 00:28
      • 2.6 Knowledge Check 00:00
      • 2.7 Knowledge Statements 00:47
      • 2.8 Knowledge Statements 00:33
      • 2.9 Knowledge Statements (contd.) 00:31
      • 2.010 Knowledge Statements (contd.) 00:29
      • 2.11 Knowledge Check 00:00
      • 2.12 Risk Management 00:35
      • 2.13 Risk Assessment types 00:00
      • 2.14 Knowledge Check 00:00
      • 2.15 Risk Management 00:29
      • 2.16 Risk Management Design 00:37
      • 2.17 Knowledge Check 00:00
      • 2.18 Risk Management Outcomes 00:49
      • 2.19 Risk Management Outcomes 00:41
      • 2.20 Knowledge Check 00:00
      • 2.21 Risk Management Strategy 00:48
      • 2.22 Effective Information Risk Management 01:10
      • 2.23 Risk Management Program 00:26
      • 2.24 Risk Management Support System 00:00
      • 2.25 Knowledge Check 00:00
      • 2.26 Information Security Management 00:28
      • 2.27 Information Security Management 00:23
      • 2.28 Information Security Management 00:32
      • 2.29 Information Security Management 00:20
      • 2.30 Implementing Risk Management 00:39
      • 2.31 Risk Management Process 00:00
      • 2.32 Knowledge Check 00:00
      • 2.33 Risk Management Framework 01:04
      • 2.34 Risk Management Requirements 00:00
      • 2.35 Knowledge Check 00:00
      • 2.36 Defining External and Internal Environment 00:52
      • 2.37 Risk Management Context 00:44
      • 2.38 GAP Analysis 00:37
      • 2.39 Other Organizational Support 00:00
      • 2.40 Introduction to Risk Assessment 00:43
      • 2.41 Risk Analysis Evaluation and Management 00:00
      • 2.42 Risk Rating Matrix 03:05
      • 2.43 Knowledge Check 00:00
      • 2.44 Risk Assessment 00:49
      • 2.45 NIST Risk Assessment Methodology 00:48
      • 2.46 Knowledge Check 00:00
      • 2.47 Probabilistic Risk Assessment 00:36
      • 2.48 Factor Analysis of Information Risk 00:00
      • 2.49 Factor Analysis of Information Risk (contd.) 01:08
      • 2.50 Aggregated Risk and Cascading Risk 00:00
      • 2.51 Knowledge Check 00:00
      • 2.52 Risk Identification Methodology 00:00
      • 2.53 Threats 00:00
      • 2.54 Threats (contd.) 00:31
      • 2.55 Knowledge Check 00:00
      • 2.56 Vulnerability 01:02
      • 2.57 Risk 00:36
      • 2.58 Knowledge Check 00:00
      • 2.59 Operational Risk 01:01
      • 2.60 Qualitative Risk Analysis 00:35
      • 2.61 Qualitative Risk Analysis (contd.) 00:19
      • 2.62 Probability Scales 00:39
      • 2.63 Knowledge Check 00:00
      • 2.64 Quantitative Risk Analysis Techniques 00:00
      • 2.65 Semi-Quantitative Risk Analysis 00:28
      • 2.66 Knowledge Check 00:00
      • 2.67 Probability Distribution 00:31
      • 2.68 Probability Types 00:00
      • 2.69 Evaluation of Risk 00:34
      • 2.70 Risk Treatment 00:43
      • 2.71 Negative Risk Strategies 00:50
      • 2.72 Knowledge Check 00:00
      • 2.73 Residual Risk 00:38
      • 2.74 Residual Risk (contd.) 00:34
      • 2.75 Knowledge Check 00:00
      • 2.76 Risk Impact 00:44
      • 2.77 Legal and Regulatory Requirements 00:46
      • 2.78 Knowledge Check 00:00
      • 2.79 Cost benefit analysis 00:43
      • 2.80 Security Baseline Changes 00:43
      • 2.81 Information Resource 00:32
      • 2.82 Information Resource 00:35
      • 2.83 Information Asset 00:33
      • 2.84 Potential Loss 00:33
      • 2.85 Techniques 00:58
      • 2.86 Knowledge Check 00:00
      • 2.87 Information Classification 00:39
      • 2.88 Business Impact Analysis 00:39
      • 2.89 Impact Analysis and Risk Assessment 00:33
      • 2.90 Recovery Time Objective 00:47
      • 2.91 Recovery Point Objective 00:41
      • 2.92 Knowledge Check 00:00
      • 2.93 Integration with Life Cycle processes 01:06
      • 2.94 Security Control Baseline 01:26
      • 2.95 Knowledge Check 00:00
      • 2.96 Risk Monitoring and Communication 00:26
      • 2.97 Training and Awareness 00:54
      • 2.98 Case Study One 00:54
      • 2.99 Case Study Two 01:30
      • 2.100 Quiz 00:00
      • 2.101 Summary 01:19
      • 2.102 Summary (contd.) 01:10
      • 2.103 Summary (contd.) 01:13
      • 2.104 Conclude 00:11
    • Domain 03 - Information Security Program Development and Management 1:06:43
      • 3.1 Welcome 00:19
      • 3.2 Objectives 01:08
      • 3.3 Task Statements 00:52
      • 3.4 Task Statements (contd.) 00:30
      • 3.5 Knowledge Check 00:00
      • 3.6 Knowledge Statements 00:46
      • 3.7 Knowledge Statements (contd.) 00:48
      • 3.8 Knowledge Check 00:00
      • 3.9 Information Security Program Objectives 00:38
      • 3.10 Information Security Program Objectives (contd.) 00:28
      • 3.11 Defining Information Security Program Objectives 00:28
      • 3.12 Defining Information Security Program Objectives (contd.) 00:51
      • 3.13 Scope and Charter of Information Security Program 00:40
      • 3.14 Introducing an Information Security Program 00:44
      • 3.15 Knowledge Check 00:00
      • 3.16 Introducing an Information Security Program 00:34
      • 3.17 Introducing an Information Security Program (contd.) 00:43
      • 3.18 Introducing an Information Security Program (contd.) 00:00
      • 3.19 Information Security Management Framework 00:29
      • 3.20 COBIT 00:00
      • 3.21 COBIT (contd.) 00:00
      • 3.22 Knowledge Check 00:00
      • 3.23 ISO IEC 27001 00:47
      • 3.24 ISO IEC 27001(contd.) 00:38
      • 3.25 Components of Information Security Framework 00:18
      • 3.26 Operational Components 00:40
      • 3.27 Operational Components (contd.) 00:39
      • 3.28 Knowledge Check 00:00
      • 3.29 Management Components 00:47
      • 3.30 Objectives of Management Components 00:47
      • 3.31 Objectives of Management Components (contd.) 00:16
      • 3.32 Knowledge Check 00:00
      • 3.33 Administrative Components 00:29
      • 3.34 Educational and Informational Components 00:00
      • 3.35 Information Security Program Roadmap 00:00
      • 3.36 Elementsof Information Security Program RoadMap 00:00
      • 3.37 Development of Information Security Program Road Map 00:46
      • 3.38 Gap Analysis 00:38
      • 3.39 Knowledge Check 00:00
      • 3.40 Information Security Infrastructure and Architecture 00:27
      • 3.41 Information Security Infrastructure and Architecture (contd.) 00:29
      • 3.42 Knowledge Check 00:00
      • 3.43 Objectives of Information Security Architecture 00:00
      • 3.44 Architectural Implementation 00:00
      • 3.45 SABSA Model 00:36
      • 3.46 SABSA Model (contd.) 00:25
      • 3.47 Knowledge Check 00:00
      • 3.48 Security Program Management and Administrative Activities 00:40
      • 3.49 Information Security Program Administrative Activities 00:44
      • 3.50 Information Security Program Roles Responsibilities SkillsandCulture 00:00
      • 3.51 Knowledge Check 00:00
      • 3.52 Security Awareness Training 00:31
      • 3.53 Security Awareness Training (contd.) 00:43
      • 3.54 Documentation 00:56
      • 3.55 Documentation (contd.) 00:27
      • 3.56 Knowledge Check 00:00
      • 3.57 Project Management and Program Development 00:43
      • 3.58 Project Management and Program Development (contd.) 00:34
      • 3.59 Knowledge Check 00:00
      • 3.60 Risk Management 00:36
      • 3.61 Business Case Development 00:30
      • 3.62 Business Case Elements 00:55
      • 3.63 Business Case Process Design 00:50
      • 3.64 Knowledge Check 00:00
      • 3.65 Information Security Program Budget 00:43
      • 3.66 Information Security Program Budget Guidelines 00:34
      • 3.67 Knowledge Check 00:00
      • 3.68 Acceptable Use Policy 01:08
      • 3.69 Information Security Problem Management 00:34
      • 3.70 Vendor Management 00:52
      • 3.71 Information Security Program Management Evaluation 00:00
      • 3.72 Information Security Program Management Evaluation (contd.) 00:00
      • 3.73 Knowledge Check 00:00
      • 3.74 Legal, Physical and Environmental Factors 00:33
      • 3.75 Legal, Physical and Environmental Factors (contd.) 00:39
      • 3.76 Ethics 00:40
      • 3.77 Cultural and Regional Differences 00:47
      • 3.78 Logistics 00:42
      • 3.79 Security Program Services and Operational Activities 01:18
      • 3.80 Incident Response 00:43
      • 3.81 Security Review and Audits 01:13
      • 3.82 Knowledge Check 00:00
      • 3.83 Management of Security Technology 00:56
      • 3.84 Due Diligence 00:58
      • 3.85 Compliance Monitoring and Enforcement 00:00
      • 3.86 Knowledge Check 00:00
      • 3.87 Risk and Business Impact Assessment 00:59
      • 3.88 Resource Dependency Assessment 00:36
      • 3.89 Knowledge Check 00:00
      • 3.90 Outsourcing and Service Providers 00:36
      • 3.91 Outsourcing and Service Providers (contd.) 00:00
      • 3.92 Knowledge Check 00:00
      • 3.93 Third-party Access 00:50
      • 3.94 Third-party Access (contd.) 00:24
      • 3.95 Knowledge Check 00:00
      • 3.96 Outsourcing Contracts 00:51
      • 3.97 Outsourcing Contracts (contd.) 00:27
      • 3.98 Cloud Computing 00:00
      • 3.99 Cloud Computing (contd.) 00:38
      • 3.100 Knowledge Check 00:00
      • 3.101 Cloud Service and Deployment Models 00:00
      • 3.102 Cloud Service and Deployment Models (contd.) 00:00
      • 3.103 Knowledge Check 00:00
      • 3.104 Integration with System Life Cycle Processes 00:36
      • 3.105 Integration with System Life Cycle Processes (contd.) 00:44
      • 3.106 Change Management and Release Management 01:03
      • 3.107 Change Management and Release Management (contd.) 00:28
      • 3.108 Information Security Controls and Countermeasures 00:47
      • 3.109 Information Security Controls and Counter measure (contd.) 00:00
      • 3.110 Knowledge Check 00:00
      • 3.111 Control Design 01:11
      • 3.112 Control Strengths-and Methods 00:00
      • 3.113 Knowledge Check 00:00
      • 3.114 Elements of Control 00:35
      • 3.115 Counter measures 00:40
      • 3.116 Knowledge Check 00:00
      • 3.117 Physical and Environmental Controls 00:51
      • 3.118 Types of Control Technologies 00:00
      • 3.119 Knowledge Check 00:00
      • 3.120 Components and Architecture of Technical Control 00:44
      • 3.121 Control Testing and Modification 00:55
      • 3.122 Knowledge Check 00:00
      • 3.123 Baseline Controls 00:39
      • 3.124 Information Security Program Metrics and Monitoring 00:50
      • 3.125 Metrics Development 00:35
      • 3.126 Metrics Development (contd.) 00:00
      • 3.127 Knowledge Check 00:00
      • 3.128 Monitoring Approaches 00:00
      • 3.129 Measuring Support of Organizational Objectives 00:59
      • 3.130 Measuring Information Security Management Performance 00:37
      • 3.131 Measuring Information Security Management Performance (contd.) 00:35
      • 3.132 Knowledge Check 00:00
      • 3.133 Measuring Compliance 00:00
      • 3.134 Measuring Operational Productivity 01:00
      • 3.135 Knowledge Check 00:00
      • 3.136 Measuring Security Cost-effectiveness 00:44
      • 3.137 Measuring Organizational Awareness 00:41
      • 3.138 Measuring Effectiveness of Technical Security Architecture 00:40
      • 3.139 Knowledge Check 00:00
      • 3.140 Measuring Effectiveness of Resources 00:48
      • 3.141 Measuring Operational Performance 00:44
      • 3.142 Monitoring and Communication 00:24
      • 3.143 Common Information Security Challenges 01:02
      • 3.144 Common Information Security Challenges (contd.) 00:26
      • 3.145 Quiz 00:00
      • 3.146 Summary 01:06
      • 3.147 Summary (contd.) 00:56
      • 3.148 Summary (contd.) 00:41
      • 3.149 Concludes 00:12
    • Domain 04 - Information Security Incident Management 54:15
      • 4.1 Welcome 00:15
      • 4.2 Objectives 00:55
      • 4.3 Task Statements 00:34
      • 4.4 Task Statements 00:44
      • 4.5 Knowledge Check 00:00
      • 4.6 Knowledge Statements 00:45
      • 4.7 Knowledge Statements (contd) 00:39
      • 4.8 Knowledge Statements (contd) 00:42
      • 4.9 Incident Management Overview 00:59
      • 4.10 Knowledge Check 00:00
      • 4.11 Incident Response 00:22
      • 4.12 Incident Response (contd.) 00:32
      • 4.13 Incident Response Procedures 00:28
      • 4.14 Incident Response Procedures (contd.) 00:19
      • 4.15 Knowledge Check 00:00
      • 4.16 Incident Management Outcomes 00:46
      • 4.17 Incident Management Concepts 00:00
      • 4.18 Knowledge Check 00:00
      • 4.19 Incident Management Systems 00:59
      • 4.20 Incident Management System 00:43
      • 4.21 Incident Management Responsibilities 00:46
      • 4.22 Senior Management Commitment 00:39
      • 4.23 Incident Management Resources 00:00
      • 4.24 Outcomes of Incident Management 00:23
      • 4.25 Outcomes of Incident Management (contd.) 01:00
      • 4.26 Incident Response Team 00:00
      • 4.27 Knowledge Check 00:00
      • 4.28 Roles and Responsibilities 01:11
      • 4.29 Roles and Responsibilities (contd.) 01:00
      • 4.30 Roles and Responsibilities (contd.) 01:23
      • 4.31 Knowledge Check 00:00
      • 4.32 Roles and Responsibilities (contd.) 01:12
      • 4.33 Roles and Responsibilities (contd.) 01:11
      • 4.34 Skills for IRT 00:44
      • 4.35 Incident Management Objectives 00:00
      • 4.36 Desired State of Incident Management 00:56
      • 4.37 Incident Management Metrics and Indicators 00:35
      • 4.38 Incident Management Metrics and Indicators (contd.) 00:24
      • 4.39 Knowledge Check 00:00
      • 4.40 Strategic Alignment 00:00
      • 4.41 Knowledge Check 00:00
      • 4.42 Risk Management and Assurance Integration 01:12
      • 4.43 Value Delivery and Resource Management 00:59
      • 4.44 Knowledge Check 00:00
      • 4.45 Performance Management 00:31
      • 4.46 Defining Incident Management Procedures 00:39
      • 4.47 Detailed Plan of Action for Incident Management 00:00
      • 4.48 Knowledge Check 00:00
      • 4.49 Current State of Incident Response Capability 00:48
      • 4.50 Threats and Vulnerabilities 01:03
      • 4.51 Developing an Incident Response Plan 00:25
      • 4.52 Developing an Incident Response Plan 00:00
      • 4.53 Knowledge Check 00:00
      • 4.54 Gap Analysis 00:39
      • 4.55 Business Impact Assessment 01:21
      • 4.56 Knowledge Check 00:00
      • 4.57 Elements of Business Impact Assessment 00:38
      • 4.58 Elements of Business Impact Assessment (contd.) 00:30
      • 4.59 Benefits of Business Impact Assessment (contd.) 00:27
      • 4.60 Knowledge Check 00:00
      • 4.61 Escalation Process for Effective Incident Management 00:45
      • 4.62 Incident Management and Response Team 00:44
      • 4.63 Knowledge Check 00:00
      • 4.64 Incident Notification Process 00:43
      • 4.65 Incident Notification Process (contd.) 00:26
      • 4.66 Challenges in Developing an Incident Management Plan 00:45
      • 4.67 Recovery Planning and Business Recovery Procedures 00:36
      • 4.68 Recovery Planning and Business Recovery Procedures (contd.) 00:48
      • 4.69 Knowledge Check 00:00
      • 4.70 Recovery Strategies 00:27
      • 4.71 Recovery Strategies (contd.) 00:19
      • 4.72 Recovery Strategies (contd.) 00:23
      • 4.73 Recovery Sites 00:00
      • 4.74 Knowledge Check 00:00
      • 4.75 Criteria for Selecting Alternative Site 00:38
      • 4.76 Basis for Recovery Site Selection 00:38
      • 4.77 Reciprocal Agreements and Alternative Backup Sites 00:41
      • 4.78 Reciprocal Agreements and Alternative Backup Sites (contd.) 00:38
      • 4.79 Knowledge Check 00:00
      • 4.80 Recovery Strategy Approach 00:38
      • 4.81 Strategy Implementation 00:32
      • 4.82 Strategy Implementation 00:30
      • 4.83 Incident Recovery Plan Elements 00:40
      • 4.84 Knowledge Check 00:00
      • 4.85 Risk Acceptance and Tolerance 00:53
      • 4.86 Business Impact Analysis, RTO, and RPOs 00:45
      • 4.87 Business Impact Analysis, RTO, and RPOs (contd.) 00:00
      • 4.88 Knowledge Check 00:00
      • 4.89 Service Delivery Objective and Maximum Tolerable Outage 01:05
      • 4.90 Notification Requirements 00:31
      • 4.91 Notification Requirements (contd.) 00:43
      • 4.92 Knowledge Check 00:00
      • 4.93 Supplies and Communication Networks 00:42
      • 4.94 Supplies and Communication Networks (contd.) 00:25
      • 4.95 High Availability Considerations 00:41
      • 4.96 Insurance 00:38
      • 4.97 Knowledge Check 00:00
      • 4.98 Updating and Testing Recovery Plans 00:46
      • 4.99 Updating and Testing Recovery Plans (contd.) 00:21
      • 4.100 Types of Tests 00:00
      • 4.101 Types of Tests (contd.) 00:00
      • 4.102 Knowledge Check 00:00
      • 4.103 Types of Tests (contd.) 00:00
      • 4.104 Knowledge Check 00:00
      • 4.105 Types of Tests (contd.) 00:46
      • 4.106 Recovery Test Metrics 00:25
      • 4.107 Recovery Test Metrics (contd.) 00:00
      • 4.108 Knowledge Check 00:00
      • 4.109 Legal Aspects of Forensic Evidence 00:42
      • 4.110 Post-Incident activities and investigation 00:23
      • 4.111 Quiz 00:00
      • 4.112 Summary 00:56
      • 4.113 Summary (contd.) 00:44
      • 4.114 Summary (contd.) 00:39
      • 4.115 Summary (contd.) 00:54
      • 4.116 Conclusion 00:07
    • {{childObj.title}}
      • {{childObj.childSection.chapter_name}}
        • {{lesson.title}}
      • {{lesson.title}}

    View More

    View Less

Exam & Certification

  • How do you become a CISM certified professional?

    To be a certified CISM professional, you need to meet the following requirements:
    1. Successful completion of the CISM examination
    2. Adherence to the ISACA Code of Professional Ethics
    3. Agree to comply with the Continuing Education Policy.
    4. Work experience in the field of information security
    5. Submit an Application for CISM Certification
    For additional information on how to become a certified CISM and to understand the CISM certification requirements please refer the following link:
    http://www.isaca.org/Certification/CISM-Certified-Information-Security-Manager/How-to-Become-Certified/Pages/default.aspx

  • What are the prerequisites for CISM certification?

    To become a CISM certified professional, you need to fulfill the following criteria:
    • A completed application must be submitted within 5 years from the date of initially passing the examination.
    • All experience must be verified independently with employers.
    • This experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination.
    • Three (3) years of the five (5) years of work experience must be gained performing the role of an information security manager
    • In addition, this work experience must be broad and gained in three (3) of the four (4) CISM® domains

FAQs

  • What all will I get as part of the training?

    You get access to our e-learning content along with the practice simulation tests that help you tackle the toughest of the exam questions. You will also get an online participant handbook with cross references to the e-learning for reinforcement of your learning.

  • Is exam fee included in the course fee?

    No. The exam fee is not included in the course fee as it is directly paid to ISACA for the membership, application and examination.

  • How many questions are there in the CISM certification exam?

    ISACA uses and reports scores on a common scale from 200 to 800. For example, the scaled score of 800 represents a perfect score with all questions answered correctly; a scaled score of 200 is the lowest score possible and signifies that only a small number of questions were answered correctly. You need to achieve a score of 450 or higher to pass the CISM® Exam.

  • What is the CISM certification cost?

    The CISM Certification cost varies between $450 - $760 based on  the mode of registration and if you are a registered member or not.

    Please click on the below link for further details :
    http://www.isaca.org/certification/pages/exam-registration.aspx

  • What certification do I get post the training?

    After successful completion of the training, you will be awarded the course completion certificate along with the 16 CPE certificate from Simplilearn.

  • What is the date of the next CISM exam?

    CISM exam is conducted thrice in a year in the months of July, September and December. To find the exam locations & dates go to (www.isaca.org/examlocations)

  • Can I defer my exam?

    If you are unable to take the exam, you can request a deferral of your registration fees to the next exam date. To learn more about deferring your exam, including deferral deadlines and costs, please visit www.isaca.org/examdefer.

  • Do you provide assistance for the exam application process?

    Yes, we do provide assistance for the exam application process. You can state your queries on community.simplilearn.com and get them answered along with any other query or concern that you might have about the course.

  • How does Simplilearn assure me that the training and course material delivered are effective?

    Our CISM course is developed to deliver a first attempt pass rate of 100%. With a hands-on learning approach, the training not only gives you the confidence to clear the exam but also helps you retain the knowledge beyond the examination.

  • Can I cancel my enrollment? Do I get a refund?

    Yes, you can cancel your enrollment. We provide you a refund after deducting the administration fee. To know more, please go through our Refund Policy.

  • I want to know more about the training program. Whom do I contact?

    Please join our Live Chat for instant support, call us, or Request a Call Back to have your query resolved.

Talk to us(toll free)
Drop us a Query
Name *
Email *
Your Query *
Looking for a training for
Myself My team/organization
I agree to be contacted over email
We are looking into your query.
Our consultants will get in touch with you soon.

Request for a custom quote

Please fill in the details and our inhouse support team will get back to you within 1 business day

Name*

Email*

Phone*

Course*
Company
Looking for*
Online license
training
Onsite
training
Online Virtual
training
Please select one of the above
Your Query
I agree to be contacted over mail
Please accept to proceed
/index/hidden/ - Never remove this line