Country

Classroom Training in Ashburn Change city

Sorry, we do not have any classroom workshops in Ashburn at the moment. Please leave your details and we will get back to you with the feasibility of conducting a workshop

Drop us your details and we will get back to you

{{queryStatusMsg}}
Name *
Email *
Message *
I agree to be contacted over email
 

Online self learning

3 DAYS MONEY BACK GUARANTEE

How this works:

For refund, write to support@simplilearn.com within 3 days of purchase

The mode of reimbursement will be same as the mode of payment used during enrollment fees. For example: If a participant has paid through credit cards, we will reimburse through credit card

Note: Money back guarantee is void if the participant has accessed more than 50% of the course content.


Start Anytime! Anywhere in the world
Access days:
180 Days
$399

 

Key Features

  • 16 Hrs of High Quality e-Learning content
  • 2 CISM Simulation Exams
  • 88 knowledge check questions
  • 65 Chapter-End Quizzes
  • Downloadable e-book Included
  • Course Completion Certificate
  • 16 Hrs of High Quality e-Learning content
  • 2 CISM Simulation Exams
  • 88 knowledge check questions
  • 65 Chapter-End Quizzes
  • Downloadable e-book Included
  • Course Completion Certificate
Specials Offer(s) Available

Flat 30% Off on All Online courses + details Flat 30% Off on All Online courses
Use Coupon: OSL30 valid till 4th Sep
Use Coupon:OSL30

About Course

Course Preview

    • Domain 00 - Introduction to CISM 14:58
      • 0.1 Introduction 1:18
      • 0.2 Introduction to CISM® 1:47
      • 0.3 Objectives 1:31
      • 0.4 About ISACA® 2:19
      • 0.5 ISACA® Certifications 1:36
      • 0.6 Value of CISM® 2:9
      • 0.7 Requirements for CISM® Designations 1:42
      • 0.8 CISM® Domains 0:0
      • 0.9 CISM® Exam 1:48
      • 0.10 Quiz 0:0
      • 0.11 Summary 1:40
      • 0.12 Conclusion 1:9
    • Domain 01 - Information Security Governance 113:18
      • 1.1 Welcome 1:30
      • 1.2 Objectives 1:49
      • 1.3 Tasks Statements 1:48
      • 1.4 Tasks Statements (Contd.) 1:36
      • 1.5 Knowledge Check 0:0
      • 1.6 Knowledge Statements 1:52
      • 1.7 Knowledge Statements (Contd.) 1:37
      • 1.8 Tasks and Knowledge Statement 1:30
      • 1.9 Knowledge Check 0:0
      • 1.10 Information Security Governance Overview 0:0
      • 1.11 Importance of Information Security Governance 0:0
      • 1.12 Outcomes of Information Security Governance 0:0
      • 1.13 Effective Information Security Governance 2:11
      • 1.14 Business Goals and Objectives 2:8
      • 1.15 Scope and Charter of Information Security Governance 2:35
      • 1.16 Scope and Charter of Information Security Governance 1:48
      • 1.17 Knowledge Check 0:0
      • 1.18 Roles and Responsibilities—Strategic Alignment 2:17
      • 1.19 Roles and Responsibilities 1:50
      • 1.20 Roles and Responsibilities—Value Delivery 1:48
      • 1.21 Knowledge Check 0:0
      • 1.22 Roles and Responsibilities—Resource Management 1:55
      • 1.23 Roles and Responsibilities 1:46
      • 1.24 Roles and Responsibilities 1:0
      • 1.25 Knowledge Check 0:0
      • 1.26 Governance Risk Management and Compliance 2:4
      • 1.27 The Business Model for Information Security 0:0
      • 1.28 The Business Model for Information Security 0:0
      • 1.29 Information Security Governance Metrics 1:52
      • 1.30 Information Security Governance Metrics 1:46
      • 1.31 Effective Security Metrics 0:0
      • 1.32 Knowledge Check 0:0
      • 1.33 Strategic Alignment Metrics 2:12
      • 1.34 Strategic Alignment Metrics 2:34
      • 1.35 Knowledge Check 0:0
      • 1.36 Value Delivery Metrics 2:12
      • 1.37 Resource Management Metrics 2:10
      • 1.38 Performance Measurement Metrics 2:32
      • 1.39 Developing an Information Security Strategy 1:0
      • 1.40 Common Pitfalls in Developing an Information Security Strategy 0:0
      • 1.41 Information Security Strategy Objectives 1:46
      • 1.42 Knowledge Check 0:0
      • 1.43 Goals of Information Security Strategy 1:51
      • 1.44 Determining Current State of Security 2:45
      • 1.45 COBIT 1:37
      • 1.46 Knowledge Check 0:0
      • 1.47 Capability Maturity Model 2:17
      • 1.48 Balanced Scorecard 1:36
      • 1.49 Knowledge Check 0:0
      • 1.50 Architectural Approaches 1:55
      • 1.51 ISO IEC 27000 Series 2:9
      • 1.52 Risk Objectives 2:25
      • 1.53 Information Security Strategy Development 1:47
      • 1.54 Strategy Resources 2:25
      • 1.55 Strategy Resources 2:43
      • 1.56 Strategy Resources 2:36
      • 1.57 Strategy Resources 3:32
      • 1.58 Knowledge Check 0:0
      • 1.59 Strategy Constraints 1:44
      • 1.60 Action Plan in Strategy implementation 1:42
      • 1.61 Policy Development 2:22
      • 1.62 Knowledge Check 0:0
      • 1.63 Standards Development 2:4
      • 1.64 Training and Awareness 2:11
      • 1.65 Action Plan Metrics 2:35
      • 1.66 Information Security Program Objectives 0:0
      • 1.67 Case Study1 US Financial Institution 0:0
      • 1.68 Case Study 1 US Financial (contd.) 1:45
      • 1.69 Case Study 1 US Financial (contd.) 1:48
      • 1.70 Case Study 1 US Financial (contd.) 2:8
      • 1.71 Case Study2 TeliaSonera 0:0
      • 1.72 Case Study 2 TeliaSonera (contd.) 1:51
      • 1.73 Case Study 2 TeliaSonera (contd.) 1:39
      • 1.74 Quiz 0:0
      • 1.75 Summary 2:23
      • 1.76 Summary (contd.) 2:4
      • 1.77 concludes 1:7
    • Domain 02 - Information Risks Management and Compliance 100:44
      • 2.1 Welcome 1:25
      • 2.2 Information Risk Management 1:22
      • 2.3 Objectives 1:46
      • 2.4 Tasks Statements 1:48
      • 2.5 Tasks Statements (contd.) 1:28
      • 2.6 Knowledge Check 0:0
      • 2.7 Knowledge Statements 1:47
      • 2.8 Knowledge Statements 1:33
      • 2.9 Knowledge Statements (contd.) 1:31
      • 2.010 Knowledge Statements (contd.) 1:29
      • 2.11 Knowledge Check 0:0
      • 2.12 Risk Management 1:35
      • 2.13 Risk Assessment types 0:0
      • 2.14 Knowledge Check 0:0
      • 2.15 Risk Management 1:29
      • 2.16 Risk Management Design 1:37
      • 2.17 Knowledge Check 0:0
      • 2.18 Risk Management Outcomes 1:49
      • 2.19 Risk Management Outcomes 1:41
      • 2.20 Knowledge Check 0:0
      • 2.21 Risk Management Strategy 1:48
      • 2.22 Effective Information Risk Management 2:10
      • 2.23 Risk Management Program 1:26
      • 2.24 Risk Management Support System 0:0
      • 2.25 Knowledge Check 0:0
      • 2.26 Information Security Management 1:28
      • 2.27 Information Security Management 1:23
      • 2.28 Information Security Management 1:32
      • 2.29 Information Security Management 1:20
      • 2.30 Implementing Risk Management 1:39
      • 2.31 Risk Management Process 0:0
      • 2.32 Knowledge Check 0:0
      • 2.33 Risk Management Framework 2:4
      • 2.34 Risk Management Requirements 0:0
      • 2.35 Knowledge Check 0:0
      • 2.36 Defining External and Internal Environment 1:52
      • 2.37 Risk Management Context 1:44
      • 2.38 GAP Analysis 1:37
      • 2.39 Other Organizational Support 0:0
      • 2.40 Introduction to Risk Assessment 1:43
      • 2.41 Risk Analysis Evaluation and Management 0:0
      • 2.42 Risk Rating Matrix 4:5
      • 2.43 Knowledge Check 0:0
      • 2.44 Risk Assessment 1:49
      • 2.45 NIST Risk Assessment Methodology 1:48
      • 2.46 Knowledge Check 0:0
      • 2.47 Probabilistic Risk Assessment 1:36
      • 2.48 Factor Analysis of Information Risk 0:0
      • 2.49 Factor Analysis of Information Risk (contd.) 2:8
      • 2.50 Aggregated Risk and Cascading Risk 0:0
      • 2.51 Knowledge Check 0:0
      • 2.52 Risk Identification Methodology 0:0
      • 2.53 Threats 0:0
      • 2.54 Threats (contd.) 1:31
      • 2.55 Knowledge Check 0:0
      • 2.56 Vulnerability 2:2
      • 2.57 Risk 1:36
      • 2.58 Knowledge Check 0:0
      • 2.59 Operational Risk 2:1
      • 2.60 Qualitative Risk Analysis 1:35
      • 2.61 Qualitative Risk Analysis (contd.) 1:19
      • 2.62 Probability Scales 1:39
      • 2.63 Knowledge Check 0:0
      • 2.64 Semi-Quantitative Risk Analysis 1:28
      • 2.66 Knowledge Check 0:0
      • 2.67 Probability Distribution 1:31
      • 2.68 Probability Types 0:0
      • 2.69 Evaluation of Risk 1:34
      • 2.70 Risk Treatment 1:43
      • 2.71 Negative Risk Strategies 1:50
      • 2.72 Knowledge Check 0:0
      • 2.73 Residual Risk 1:38
      • 2.74 Residual Risk (contd.) 1:34
      • 2.75 Knowledge Check 0:0
      • 2.76 Risk Impact 1:44
      • 2.77 Legal and Regulatory Requirements 1:46
      • 2.78 Knowledge Check 0:0
      • 2.79 Cost benefit analysis 1:43
      • 2.81 Information Resource 1:32
      • 2.82 Information Resource 1:35
      • 2.83 Information Asset 1:33
      • 2.84 Potential Loss 1:33
      • 2.85 Techniques 1:58
      • 2.86 Knowledge Check 0:0
      • 2.88 Business Impact Analysis 1:39
      • 2.89 Impact Analysis and Risk Assessment 1:33
      • 2.90 Recovery Time Objective 1:47
      • 2.91 Recovery Point Objective 1:41
      • 2.92 Knowledge Check 0:0
      • 2.93 Integration with Life Cycle processes 2:6
      • 2.94 Security Control Baseline 2:26
      • 2.95 Knowledge Check 0:0
      • 2.96 Risk Monitoring and Communication 1:26
      • 2.98 Case Study One 1:54
      • 2.99 Case Study Two 2:30
      • 2.100 Quiz 0:0
      • 2.101 Summary 2:19
      • 2.102 Summary (contd.) 2:10
      • 2.103 Summary (contd.) 2:13
      • 2.104 Conclude 1:11
    • Domain 03 - Information Security Program Development and Management 134:26
      • 3.1 Welcome 1:19
      • 3.2 Objectives 2:8
      • 3.3 Task Statements 1:52
      • 3.4 Task Statements (contd.) 1:30
      • 3.5 Knowledge Check 0:0
      • 3.6 Knowledge Statements 1:46
      • 3.7 Knowledge Statements (contd.) 1:48
      • 3.8 Knowledge Check 0:0
      • 3.9 Information Security Program Objectives 1:38
      • 3.10 Information Security Program Objectives (contd.) 1:28
      • 3.11 Defining Information Security Program Objectives 1:28
      • 3.12 Defining Information Security Program Objectives (contd.) 1:51
      • 3.13 Scope and Charter of Information Security Program 1:40
      • 3.14 Introducing an Information Security Program 1:44
      • 3.15 Knowledge Check 0:0
      • 3.16 Introducing an Information Security Program 1:34
      • 3.17 Introducing an Information Security Program (contd.) 1:43
      • 3.18 Introducing an Information Security Program (contd.) 0:0
      • 3.19 Information Security Management Framework 1:29
      • 3.20 COBIT 0:0
      • 3.21 COBIT (contd.) 0:0
      • 3.22 Knowledge Check 0:0
      • 3.23 ISO IEC 27001 1:47
      • 3.24 ISO IEC 27001(contd.) 1:38
      • 3.25 Components of Information Security Framework 1:18
      • 3.26 Operational Components 1:40
      • 3.27 Operational Components (contd.) 1:39
      • 3.28 Knowledge Check 0:0
      • 3.29 Management Components 1:47
      • 3.30 Objectives of Management Components 1:47
      • 3.31 Objectives of Management Components (contd.) 1:16
      • 3.32 Knowledge Check 0:0
      • 3.33 Administrative Components 1:29
      • 3.34 Educational and Informational Components 0:0
      • 3.35 Information Security Program Roadmap 0:0
      • 3.36 Elementsof Information Security Program RoadMap 0:0
      • 3.37 Development of Information Security Program Road Map 1:46
      • 3.38 Gap Analysis 1:38
      • 3.39 Knowledge Check 0:0
      • 3.40 Information Security Infrastructure and Architecture 1:27
      • 3.41 Information Security Infrastructure and Architecture (contd.) 1:29
      • 3.42 Knowledge Check 0:0
      • 3.43 Objectives of Information Security Architecture 0:0
      • 3.44 Architectural Implementation 0:0
      • 3.45 SABSA Model 1:36
      • 3.46 SABSA Model (contd.) 1:25
      • 3.47 Knowledge Check 0:0
      • 3.48 Security Program Management and Administrative Activities 1:40
      • 3.49 Information Security Program Administrative Activities 1:44
      • 3.50 Information Security Program Roles Responsibilities SkillsandCulture 0:0
      • 3.51 Knowledge Check 0:0
      • 3.52 Security Awareness Training 1:31
      • 3.53 Security Awareness Training (contd.) 1:43
      • 3.54 Documentation 1:56
      • 3.55 Documentation (contd.) 1:27
      • 3.56 Knowledge Check 0:0
      • 3.57 Project Management and Program Development 1:43
      • 3.58 Project Management and Program Development (contd.) 1:34
      • 3.59 Knowledge Check 0:0
      • 3.60 Risk Management 1:36
      • 3.61 Business Case Development 1:30
      • 3.62 Business Case Elements 1:55
      • 3.63 Business Case Process Design 1:50
      • 3.64 Knowledge Check 0:0
      • 3.65 Information Security Program Budget 1:43
      • 3.66 Information Security Program Budget Guidelines 1:34
      • 3.67 Knowledge Check 0:0
      • 3.68 Acceptable Use Policy 2:8
      • 3.69 Information Security Problem Management 1:34
      • 3.70 Vendor Management 1:52
      • 3.71 Information Security Program Management Evaluation 0:0
      • 3.72 Information Security Program Management Evaluation (contd.) 0:0
      • 3.73 Knowledge Check 0:0
      • 3.74 Legal, Physical and Environmental Factors 1:33
      • 3.75 Legal, Physical and Environmental Factors (contd.) 1:39
      • 3.76 Ethics 1:40
      • 3.77 Cultural and Regional Differences 1:47
      • 3.78 Logistics 1:42
      • 3.79 Security Program Services and Operational Activities 2:18
      • 3.80 Incident Response 1:43
      • 3.81 Security Review and Audits 2:13
      • 3.82 Knowledge Check 0:0
      • 3.83 Management of Security Technology 1:56
      • 3.84 Due Diligence 1:58
      • 3.85 Compliance Monitoring and Enforcement 0:0
      • 3.86 Knowledge Check 0:0
      • 3.87 Risk and Business Impact Assessment 1:59
      • 3.88 Resource Dependency Assessment 1:36
      • 3.89 Knowledge Check 0:0
      • 3.90 Outsourcing and Service Providers 1:36
      • 3.91 Outsourcing and Service Providers (contd.) 0:0
      • 3.92 Knowledge Check 0:0
      • 3.93 Third-party Access 1:50
      • 3.94 Third-party Access (contd.) 1:24
      • 3.95 Knowledge Check 0:0
      • 3.96 Outsourcing Contracts 1:51
      • 3.97 Outsourcing Contracts (contd.) 1:27
      • 3.98 Cloud Computing 0:0
      • 3.99 Cloud Computing (contd.) 1:38
      • 3.100 Knowledge Check 0:0
      • 3.101 Cloud Service and Deployment Models 0:0
      • 3.102 Cloud Service and Deployment Models (contd.) 0:0
      • 3.103 Knowledge Check 0:0
      • 3.104 Integration with System Life Cycle Processes 1:36
      • 3.105 Integration with System Life Cycle Processes (contd.) 1:44
      • 3.106 Change Management and Release Management 2:3
      • 3.107 Change Management and Release Management (contd.) 1:28
      • 3.108 Information Security Controls and Countermeasures 1:47
      • 3.109 Information Security Controls and Counter measure (contd.) 0:0
      • 3.110 Knowledge Check 0:0
      • 3.111 Control Design 2:11
      • 3.112 Control Strengths-and Methods 0:0
      • 3.113 Knowledge Check 0:0
      • 3.114 Elements of Control 1:35
      • 3.115 Counter measures 1:40
      • 3.116 Knowledge Check 0:0
      • 3.117 Physical and Environmental Controls 1:51
      • 3.118 Types of Control Technologies 0:0
      • 3.119 Knowledge Check 0:0
      • 3.120 Components and Architecture of Technical Control 1:44
      • 3.121 Control Testing and Modification 1:55
      • 3.122 Knowledge Check 0:0
      • 3.123 Baseline Controls 1:39
      • 3.124 Information Security Program Metrics and Monitoring 1:50
      • 3.125 Metrics Development 1:35
      • 3.126 Metrics Development (contd.) 0:0
      • 3.127 Knowledge Check 0:0
      • 3.128 Monitoring Approaches 0:0
      • 3.129 Measuring Support of Organizational Objectives 1:59
      • 3.130 Measuring Information Security Management Performance 1:37
      • 3.131 Measuring Information Security Management Performance (contd.) 1:35
      • 3.132 Knowledge Check 0:0
      • 3.133 Measuring Compliance 0:0
      • 3.134 Measuring Operational Productivity 1:0
      • 3.135 Knowledge Check 0:0
      • 3.136 Measuring Security Cost-effectiveness 1:44
      • 3.137 Measuring Organizational Awareness 1:41
      • 3.138 Measuring Effectiveness of Technical Security Architecture 1:40
      • 3.139 Knowledge Check 0:0
      • 3.140 Measuring Effectiveness of Resources 1:48
      • 3.141 Measuring Operational Performance 1:44
      • 3.142 Monitoring and Communication 1:24
      • 3.143 Common Information Security Challenges 2:2
      • 3.144 Common Information Security Challenges (contd.) 1:26
      • 3.145 Quiz 0:0
      • 3.146 Summary 2:6
      • 3.147 Summary (contd.) 1:56
      • 3.148 Summary (contd.) 1:41
      • 3.149 Concludes 1:12
    • Domain 04 - Information Security Incident Management 109:30
      • 4.1 Welcome 1:15
      • 4.2 Objectives 1:55
      • 4.3 Task Statements 1:34
      • 4.4 Task Statements 1:44
      • 4.5 Knowledge Check 0:0
      • 4.6 Knowledge Statements 1:45
      • 4.7 Knowledge Statements (contd) 1:39
      • 4.8 Knowledge Statements (contd) 1:42
      • 4.9 Incident Management Overview 1:59
      • 4.10 Knowledge Check 0:0
      • 4.11 Incident Response 1:22
      • 4.12 Incident Response (contd.) 1:32
      • 4.13 Incident Response Procedures 1:28
      • 4.14 Incident Response Procedures (contd.) 1:19
      • 4.15 Knowledge Check 0:0
      • 4.16 Incident Management Outcomes 1:46
      • 4.17 Incident Management Concepts 0:0
      • 4.18 Knowledge Check 0:0
      • 4.19 Incident Management Systems 1:59
      • 4.20 Incident Management System 1:43
      • 4.21 Incident Management Responsibilities 1:46
      • 4.22 Senior Management Commitment 1:39
      • 4.23 Incident Management Resources 0:0
      • 4.24 Outcomes of Incident Management 1:23
      • 4.25 Outcomes of Incident Management (contd.) 1:0
      • 4.26 Incident Response Team 0:0
      • 4.27 Knowledge Check 0:0
      • 4.28 Roles and Responsibilities 2:11
      • 4.29 Roles and Responsibilities (contd.) 1:0
      • 4.30 Roles and Responsibilities (contd.) 2:23
      • 4.31 Knowledge Check 0:0
      • 4.32 Roles and Responsibilities (contd.) 2:12
      • 4.33 Roles and Responsibilities (contd.) 2:11
      • 4.34 Skills for IRT 1:44
      • 4.35 Incident Management Objectives 0:0
      • 4.36 Desired State of Incident Management 1:56
      • 4.37 Incident Management Metrics and Indicators 1:35
      • 4.38 Incident Management Metrics and Indicators (contd.) 1:24
      • 4.39 Knowledge Check 0:0
      • 4.40 Strategic Alignment 0:0
      • 4.41 Knowledge Check 0:0
      • 4.42 Risk Management and Assurance Integration 2:12
      • 4.43 Value Delivery and Resource Management 1:59
      • 4.44 Knowledge Check 0:0
      • 4.45 Performance Management 1:31
      • 4.46 Defining Incident Management Procedures 1:39
      • 4.47 Detailed Plan of Action for Incident Management 0:0
      • 4.48 Knowledge Check 0:0
      • 4.49 Current State of Incident Response Capability 1:48
      • 4.50 Threats and Vulnerabilities 2:3
      • 4.51 Developing an Incident Response Plan 1:25
      • 4.52 Developing an Incident Response Plan 0:0
      • 4.53 Knowledge Check 0:0
      • 4.54 Gap Analysis 1:39
      • 4.55 Business Impact Assessment 2:21
      • 4.56 Knowledge Check 0:0
      • 4.57 Elements of Business Impact Assessment 1:38
      • 4.58 Elements of Business Impact Assessment (contd.) 1:30
      • 4.59 Benefits of Business Impact Assessment (contd.) 1:27
      • 4.60 Knowledge Check 0:0
      • 4.79 Knowledge Check 1:45
      • 4.62 Incident Management and Response Team 1:44
      • 4.63 Knowledge Check 0:0
      • 4.64 Incident Notification Process 1:43
      • 4.65 Incident Notification Process (contd.) 1:26
      • 4.66 Challenges in Developing an Incident Management Plan 1:45
      • 4.67 Recovery Planning and Business Recovery Procedures 1:36
      • 4.68 Recovery Planning and Business Recovery Procedures (contd.) 1:48
      • 4.69 Knowledge Check 0:0
      • 4.70 Recovery Strategies 1:27
      • 4.71 Recovery Strategies (contd.) 1:19
      • 4.72 Recovery Strategies (contd.) 1:23
      • 4.73 Recovery Sites 0:0
      • 4.74 Knowledge Check 0:0
      • 4.75 Criteria for Selecting Alternative Site 1:38
      • 4.76 Basis for Recovery Site Selection 1:38
      • 4.77 Reciprocal Agreements and Alternative Backup Sites 1:41
      • 4.78 Reciprocal Agreements and Alternative Backup Sites (contd.) 1:38
      • 4.80 Recovery Strategy Approach 1:38
      • 4.81 Strategy Implementation 1:32
      • 4.82 Strategy Implementation 1:30
      • 4.83 Incident Recovery Plan Elements 1:40
      • 4.84 Knowledge Check 0:0
      • 4.85 Risk Acceptance and Tolerance 1:53
      • 4.86 Business Impact Analysis, RTO, and RPOs 1:45
      • 4.87 Business Impact Analysis, RTO, and RPOs (contd.) 0:0
      • 4.88 Knowledge Check 0:0
      • 4.89 Service Delivery Objective and Maximum Tolerable Outage 2:5
      • 4.90 Notification Requirements 1:31
      • 4.91 Notification Requirements (contd.) 1:43
      • 4.92 Knowledge Check 0:0
      • 4.93 Supplies and Communication Networks 1:42
      • 4.94 Supplies and Communication Networks (contd.) 1:25
      • 4.95 High Availability Considerations 1:41
      • 4.96 Insurance 1:38
      • 4.97 Knowledge Check 0:0
      • 4.98 Updating and Testing Recovery Plans 1:46
      • 4.99 Updating and Testing Recovery Plans (contd.) 1:21
      • 4.100 Types of Tests 0:0
      • 4.101 Types of Tests (contd.) 0:0
      • 4.102 Knowledge Check 0:0
      • 4.103 Types of Tests (contd.) 0:0
      • 4.104 Knowledge Check 0:0
      • 4.105 Types of Tests (contd.) 1:46
      • 4.106 Recovery Test Metrics 1:25
      • 4.107 Recovery Test Metrics (contd.) 0:0
      • 4.108 Knowledge Check 0:0
      • 4.109 Legal Aspects of Forensic Evidence 1:42
      • 4.110 Post-Incident activities and investigation 1:23
      • 4.111 Quiz 0:0
      • 4.112 Summary 1:56
      • 4.113 Summary (contd.) 1:44
      • 4.114 Summary (contd.) 1:39
      • 4.115 Summary (contd.) 1:54
      • 4.116 Conclusion 1:7
    • {{childObj.title}}
      • {{lesson.title}}

    View More

    View Less

  • What is the course all about?

    Certified Information Security ManagerTM (CISM®) is an information security certification awarded to Information Security Managers. This is an internationally recognized professional certification targeted to information security managers as well as those who offer consulting services on information security. CISM® credential is issued by the ISACA (Information Systems Audit and Control Association), an independent, nonprofit, global association, that provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems.

    Information security is a vital aspect for not only information security managers but also for executive management to know how their company is protected from internal and external threats to the information security. Simplilearn's CISM® training, provided in both classroom and online modes, is designed to provide a common body of knowledge in Information Security. The training focuses on Risk Management, Information security governance, and Managing Incidents. This training program will enable professionals to effectively develop, manage, and oversee an enterprise’s information security.

  • Why is this certification most sought-after?

    CISM is one of the most globally acknowledged certifications that attests the professional’s expertise in Information Security.

    The CISM certification is most sought-after for the following reasons:
    • The certification establishes the professional’s ability to secure a company's information security by preventing external or internal threats.
    • The certification attests to the professional’s understanding of the equation between the Information security and the company's broader goals and objectives.
    • The CISM certification ensures the professional's ability to develop and manage an information security program and clearly distinguishes the professional as the one with expertise in the field of Information Security.

  • What are the learning benefits of this course?

    The demand for ISM's is on the rise and CISM credential is the globally accepted standard of achievement in this area. The CISM certification course from Simplilearn aims to meet this demand and enables participants to develop, build, and manage enterprise information security programs.

    At the end of Simplilearn’s training in CISM®, participants will be able to:
    • Gain in-depth knowledge to develop an information security strategy, governance, and metrics.
    • List information security strategy objectives, the current state of security, and risk management strategy.
    • Describe effective information security risk management
    • Develop a risk monitoring and communication plan
    • Understand the scope and charter of an information security program
    • Describe the information security management framework
    • Define security program metrics and monitoring
    • List the common information security program challenges
    • Discuss incident management in an organization, including resources, metrics, and indicators
    • Understand business continuity and disaster recovery procedures

  • What are the career benefits in-store for you?

    The CISM® certification is most sought-after by experienced security managers, as it is management-focused and created for individuals who develop, build, and manage enterprise information security programs. It helps an ISM to:
    • Build organizational credibility with a strong Information Security system
    • Bring about organizational success by integrating the Information security aspect
    • Identify critical issues and customize company-specific practices to support the governance of information and related technologies
    • Analyze information systems security management and their relationship with business goals and objectives
    • Prevent external threats to the information hence gaining the trust of clients and providing a sense of assurity
    • Ensure that there is improved alignment between the organization's information security program and its broader goals and objectives
    • Provide the enterprise with a certification for information security management that is recognized by multinational clients and enterprises, lending credibility to the enterprise.
    • Demonstrate, to enterprise customers, their commitment to compliance, security, and integrity; ultimately contributing to the attraction and retention of customers

  • Who should do this course?

    The CISM® certification training is ideal for aspirants who desire to begin their career in Information Security. However, this course is most suited for the following professionals:
    • CEOs/CFOs
    • Chief Audit Executives
    • Audit Partners
    • Audit Heads
    • CIOs/CISOs
    • Chief Compliance/Privacy/Risk Officers
    • Security Managers/Directors/Consultants
    • IT Directors/Managers/Consultants
    • Audit Directors/Managers/Consultants

  • Why Simplilearn?

    • Simplilearn is the World’s Largest Certification Training Provider, with over 400,000+ professionals trained globally
    • Trusted by the Fortune 500 companies as their learning provider for career growth and training
    • 2000+ certified and experienced trainers conduct trainings for various courses across the globe
    • All our Courses are designed and developed under a tried and tested Unique Learning Framework that is proven to deliver 98.6% pass rate in the first attempt
    • Accredited, Approved and Recognized as a training organization, partner, education provider and examination center by globally renowned names like Project Management Institute of USA, APMG, CFA Institute, GARP, ASTQB, IIBA and others.

Exam & Certification

  • How do I become a CISM Professional?

    To earn the CISM® designation, information security professionals are required to:
    • Successfully pass the CISM® exam
    • Adhere to ISACA Code of professional ethics
    • Agree to comply with CISM® continuing education policy
    • Submit verified evidence of five (5) years of work experience in the field of information security
    • Three (3) years of the five (5) years of work experience must be gained performing the role of an information security manager
    • In addition, this work experience must be broad and gained in three (3) of the four (4) CISM® domains

FAQs

  • How do I enroll for the online training?

    You can enroll for the online training through our website. You can make online payment using any of the following options:
    • Visa debit/credit card
    • American Express and Diners Club cards
    • Master Card
    • PayPal
    Once the online payment is done, you will automatically receive payment receipt, via email.

  • What will I get along with this training?

    In this training, you will have access to online e-learning and practice tests.

  • Do you provide money back guarantee for the training programs?

    Yes! We do provide money back guarantee for some of our training programs. Contact support@simplilearn.com for more information.

  • Can I cancel my enrollment? Do I get a refund?

    Yes! You can cancel your enrollment. We provide you complete refund after deducting the administration fee. To know more, please go through our Refund Policy.

  • Where and how can I access the e-learning content? Are there any limitations?

    Once you register with us for a course by paying the course fee, you can have 24/7 access to the e-learning content on our website. An automated course purchase confirmation mail from our side will guide you through the process.

  • I am not able to access the online course. Whom should I contact for a solution?

    Please send an email to support@simplilearn.com. You can also chat with us to get an instant solution.

  • How do I track the hours already spent on the course?

    You can track the number of hours spent on the course by accessing your LMS home.

  • Can I extend the access period?

    Yes! You can extend the access period by paying an additional fee. Contact support@simplilearn.com for more information.

  • Do you provide any group discounts for online training programs?

    Yes! We have group discount packages for online training programs. Contact support@simplilearn.com to know more about the group discounts.

  • How does Simplilearn assure that the material and the training delivered are effective?

    Simplilearn follows a Global Learning Framework which has been proven to deliver results and has been perfected by our training experience.

  • Do you provide any course completion certificate?

    Yes! We offer course completion certificate after you successfully complete the training program.

  • Is exam fee included in the course fee?

    No! Exam fee is not included in this course. Participants can pay the exam fee while applying for the exam.

Drop us a Query
Name *
Email *
Your Query *
Looking for a training for
Myself My team/organization
I agree to be contacted over email
1800-232-5454(9am-7pm)
We are looking into your query.
Our consultants will get in touch with you soon.
 
Group Buy

corporatesales@simplilearn.com

Knowledge Bank

Request for a custom quote

Please fill in the details and our inhouse support team will get back to you within 1 business day

Name*

Email*

Phone*

Course*
Company
Looking for*
Online license
training
Onsite
training
Online Virtual
training
Please select one of the above
Your Query
I agree to be contacted over mail
Please accept to proceed
/index/hidden/ - Never remove this line
  • Query