Key features

MONEY BACK GUARANTEE

How this works :

At Simplilearn, we greatly value the trust of our patrons. Our courses were designed to deliver an effective learning experience, and have helped over half a million find their professional calling. But if you feel your course is not to your liking, we offer a 7-day money-back guarantee. Just send us a refund request within 7 days of purchase, and we will refund 100% of your payment, no questions asked!

For Self Placed Learning :

Raise refund request within 7 days of purchase of course. Money back guarantee is void if the participant has accessed more than 25% content.

  • 16 Hrs of High Quality e-Learning content
  • 2 Simulation Exams
  • 88 Knowledge check questions
  • 65 End of Chapter Quizzes
  • 16 CPE's Offered
  • 98.6% Pass rate

Course description

  • What’s the focus of this course?

    CISM certification training from Simplilearn, aligned to ISACA, ensures you are re-equipped on the best practices in the industry and enables you to ace the exam in the first attempt. The certification helps you develop the expertise to manage, design, oversee and/or assess an enterprise’s information security.

  • What are the course objectives?

    By the end of this training you will:
    • Be able to define the architecture, design and manage the security of your organization.
    • Acquire the relevant knowledge and skills required to clear the CISM certification exam
    •  Able to demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.
    • Earn the requisite 16 CPEs required to take up the CISM certification exam
    • Develop a working knowledge of the 4 domains areas as prescribed by ISACA –Exam Candidate Information Guide 2015.

  • Who should take this course?

    CISM certification is a globally recognized professional requirement in the IT Security domain. This certification is most suited for:
    • Security Consultant/Manager
    • IT Director/Manager
    • Security Auditor/Architect
    • Security Systems Engineer
    • Chief Information Security Officer
    • Information Security Managers
    • IS/IT Consultants
    • Chief Compliance/Privacy/Risk Officers

Course preview

    • Domain 00 - Introduction to CISM 06:59
      • 0.1 Introduction 00:18
      • 0.2 Introduction to CISM® 00:47
      • 0.3 Objectives 00:31
      • 0.4 About ISACA® 01:19
      • 0.5 ISACA® Certifications 00:36
      • 0.6 Value of CISM® 01:09
      • 0.7 Requirements for CISM® Designations 00:42
      • 0.8 CISM® Domains
      • 0.9 CISM® Exam 00:48
      • 0.10 Quiz
      • 0.11 Summary 00:40
      • 0.12 Conclusion 00:09
    • Domain 01 - Information Security Governance 56:09
      • 1.1 Welcome 00:30
      • 1.2 Objectives 00:49
      • 1.3 Tasks Statements 00:48
      • 1.4 Tasks Statements (Contd.) 00:36
      • 1.5 Knowledge Check
      • 1.6 Knowledge Statements 00:52
      • 1.7 Knowledge Statements (Contd.) 00:37
      • 1.8 Tasks and Knowledge Statement 00:30
      • 1.9 Knowledge Check
      • 1.10 Information Security Governance Overview
      • 1.11 Importance of Information Security Governance
      • 1.12 Outcomes of Information Security Governance
      • 1.13 Effective Information Security Governance 01:11
      • 1.14 Business Goals and Objectives 01:08
      • 1.15 Scope and Charter of Information Security Governance 01:35
      • 1.16 Scope and Charter of Information Security Governance 00:48
      • 1.17 Knowledge Check
      • 1.18 Roles and Responsibilities—Strategic Alignment 01:17
      • 1.19 Roles and Responsibilities 00:50
      • 1.20 Roles and Responsibilities—Value Delivery 00:48
      • 1.21 Knowledge Check
      • 1.22 Roles and Responsibilities—Resource Management 00:55
      • 1.23 Roles and Responsibilities 00:46
      • 1.24 Roles and Responsibilities 01:00
      • 1.25 Knowledge Check
      • 1.26 Governance Risk Management and Compliance 01:04
      • 1.27 The Business Model for Information Security
      • 1.28 The Business Model for Information Security
      • 1.29 Information Security Governance Metrics 00:52
      • 1.30 Information Security Governance Metrics 00:46
      • 1.31 Effective Security Metrics
      • 1.32 Knowledge Check
      • 1.33 Strategic Alignment Metrics 01:12
      • 1.34 Risk Management Metrics 01:34
      • 1.35 Knowledge Check
      • 1.36 Value Delivery Metrics 01:12
      • 1.37 Resource Management Metrics 01:10
      • 1.38 Performance Measurement Metrics 01:32
      • 1.39 Developing an Information Security Strategy 01:00
      • 1.40 Common Pitfalls in Developing an Information Security Strategy
      • 1.41 Information Security Strategy Objectives 00:46
      • 1.42 Knowledge Check
      • 1.43 Goals of Information Security Strategy 00:51
      • 1.44 Determining Current State of Security 01:45
      • 1.45 COBIT 00:37
      • 1.46 Knowledge Check
      • 1.47 Capability Maturity Model 01:17
      • 1.48 Balanced Scorecard 00:36
      • 1.49 Knowledge Check
      • 1.50 Architectural Approaches 00:55
      • 1.51 ISO IEC 27000 Series 01:09
      • 1.52 Risk Objectives 01:25
      • 1.53 Information Security Strategy Development 00:47
      • 1.54 Strategy Resources 01:25
      • 1.55 Strategy Resources 01:43
      • 1.56 Strategy Resources 01:36
      • 1.57 Strategy Resources 02:32
      • 1.58 Knowledge Check
      • 1.59 Strategy Constraints 00:44
      • 1.60 Action Plan in Strategy implementation 00:42
      • 1.61 Policy Development 01:22
      • 1.62 Knowledge Check
      • 1.63 Standards Development 01:04
      • 1.64 Training and Awareness 01:11
      • 1.65 Action Plan Metrics 01:35
      • 1.66 Information Security Program Objectives
      • 1.67 Case Study1 US Financial Institution
      • 1.68 Case Study 1 US Financial (contd.) 00:45
      • 1.69 Case Study 1 US Financial (contd.) 00:48
      • 1.70 Case Study 1 US Financial (contd.) 01:08
      • 1.71 Case Study2 TeliaSonera
      • 1.72 Case Study 2 TeliaSonera (contd.) 00:51
      • 1.73 Case Study 2 TeliaSonera (contd.) 00:39
      • 1.74 Quiz
      • 1.75 Summary 01:23
      • 1.76 Summary (contd.) 01:04
      • 1.77 concludes 00:07
    • Domain 02 - Information Risks Management and Compliance 52:08
      • 2.1 Welcome 00:25
      • 2.2 Information Risk Management 00:22
      • 2.3 Objectives 00:46
      • 2.4 Tasks Statements 00:48
      • 2.5 Tasks Statements (contd.) 00:28
      • 2.6 Knowledge Check
      • 2.7 Knowledge Statements 00:47
      • 2.8 Knowledge Statements 00:33
      • 2.9 Knowledge Statements (contd.) 00:31
      • 2.010 Knowledge Statements (contd.) 00:29
      • 2.11 Knowledge Check
      • 2.12 Risk Management 00:35
      • 2.13 Risk Assessment types
      • 2.14 Knowledge Check
      • 2.15 Risk Management 00:29
      • 2.16 Risk Management Design 00:37
      • 2.17 Knowledge Check
      • 2.18 Risk Management Outcomes 00:49
      • 2.19 Risk Management Outcomes 00:41
      • 2.20 Knowledge Check
      • 2.21 Risk Management Strategy 00:48
      • 2.22 Effective Information Risk Management 01:10
      • 2.23 Risk Management Program 00:26
      • 2.24 Risk Management Support System
      • 2.25 Knowledge Check
      • 2.26 Information Security Management 00:28
      • 2.27 Information Security Management 00:23
      • 2.28 Information Security Management 00:32
      • 2.29 Information Security Management 00:20
      • 2.30 Implementing Risk Management 00:39
      • 2.31 Risk Management Process
      • 2.32 Knowledge Check
      • 2.33 Risk Management Framework 01:04
      • 2.34 Risk Management Requirements
      • 2.35 Knowledge Check
      • 2.36 Defining External and Internal Environment 00:52
      • 2.37 Risk Management Context 00:44
      • 2.38 GAP Analysis 00:37
      • 2.39 Other Organizational Support
      • 2.40 Introduction to Risk Assessment 00:43
      • 2.41 Risk Analysis Evaluation and Management
      • 2.42 Risk Rating Matrix 03:05
      • 2.43 Knowledge Check
      • 2.44 Risk Assessment 00:49
      • 2.45 NIST Risk Assessment Methodology 00:48
      • 2.46 Knowledge Check
      • 2.47 Probabilistic Risk Assessment 00:36
      • 2.48 Factor Analysis of Information Risk
      • 2.49 Factor Analysis of Information Risk (contd.) 01:08
      • 2.50 Aggregated Risk and Cascading Risk
      • 2.51 Knowledge Check
      • 2.52 Risk Identification Methodology
      • 2.53 Threats
      • 2.54 Threats (contd.) 00:31
      • 2.55 Knowledge Check
      • 2.56 Vulnerability 01:02
      • 2.57 Risk 00:36
      • 2.58 Knowledge Check
      • 2.59 Operational Risk 01:01
      • 2.60 Qualitative Risk Analysis 00:35
      • 2.61 Qualitative Risk Analysis (contd.) 00:19
      • 2.62 Probability Scales 00:39
      • 2.63 Knowledge Check
      • 2.64 Quantitative Risk Analysis Techniques
      • 2.65 Semi-Quantitative Risk Analysis 00:28
      • 2.66 Knowledge Check
      • 2.67 Probability Distribution 00:31
      • 2.68 Probability Types
      • 2.69 Evaluation of Risk 00:34
      • 2.70 Risk Treatment 00:43
      • 2.71 Negative Risk Strategies 00:50
      • 2.72 Knowledge Check
      • 2.73 Residual Risk 00:38
      • 2.74 Residual Risk (contd.) 00:34
      • 2.75 Knowledge Check
      • 2.76 Risk Impact 00:44
      • 2.77 Legal and Regulatory Requirements 00:46
      • 2.78 Knowledge Check
      • 2.79 Cost benefit analysis 00:43
      • 2.80 Security Baseline Changes 00:43
      • 2.81 Information Resource 00:32
      • 2.82 Information Resource 00:35
      • 2.83 Information Asset 00:33
      • 2.84 Potential Loss 00:33
      • 2.85 Techniques 00:58
      • 2.86 Knowledge Check
      • 2.87 Information Classification 00:39
      • 2.88 Business Impact Analysis 00:39
      • 2.89 Impact Analysis and Risk Assessment 00:33
      • 2.90 Recovery Time Objective 00:47
      • 2.91 Recovery Point Objective 00:41
      • 2.92 Knowledge Check
      • 2.93 Integration with Life Cycle processes 01:06
      • 2.94 Security Control Baseline 01:26
      • 2.95 Knowledge Check
      • 2.96 Risk Monitoring and Communication 00:26
      • 2.97 Training and Awareness 00:54
      • 2.98 Case Study One 00:54
      • 2.99 Case Study Two 01:30
      • 2.100 Quiz
      • 2.101 Summary 01:19
      • 2.102 Summary (contd.) 01:10
      • 2.103 Summary (contd.) 01:13
      • 2.104 Conclude 00:11
    • Domain 03 - Information Security Program Development and Management 1:06:43
      • 3.1 Welcome 00:19
      • 3.2 Objectives 01:08
      • 3.3 Task Statements 00:52
      • 3.4 Task Statements (contd.) 00:30
      • 3.5 Knowledge Check
      • 3.6 Knowledge Statements 00:46
      • 3.7 Knowledge Statements (contd.) 00:48
      • 3.8 Knowledge Check
      • 3.9 Information Security Program Objectives 00:38
      • 3.10 Information Security Program Objectives (contd.) 00:28
      • 3.11 Defining Information Security Program Objectives 00:28
      • 3.12 Defining Information Security Program Objectives (contd.) 00:51
      • 3.13 Scope and Charter of Information Security Program 00:40
      • 3.14 Introducing an Information Security Program 00:44
      • 3.15 Knowledge Check
      • 3.16 Introducing an Information Security Program 00:34
      • 3.17 Introducing an Information Security Program (contd.) 00:43
      • 3.18 Introducing an Information Security Program (contd.)
      • 3.19 Information Security Management Framework 00:29
      • 3.20 COBIT
      • 3.21 COBIT (contd.)
      • 3.22 Knowledge Check
      • 3.23 ISO IEC 27001 00:47
      • 3.24 ISO IEC 27001(contd.) 00:38
      • 3.25 Components of Information Security Framework 00:18
      • 3.26 Operational Components 00:40
      • 3.27 Operational Components (contd.) 00:39
      • 3.28 Knowledge Check
      • 3.29 Management Components 00:47
      • 3.30 Objectives of Management Components 00:47
      • 3.31 Objectives of Management Components (contd.) 00:16
      • 3.32 Knowledge Check
      • 3.33 Administrative Components 00:29
      • 3.34 Educational and Informational Components
      • 3.35 Information Security Program Roadmap
      • 3.36 Elementsof Information Security Program RoadMap
      • 3.37 Development of Information Security Program Road Map 00:46
      • 3.38 Gap Analysis 00:38
      • 3.39 Knowledge Check
      • 3.40 Information Security Infrastructure and Architecture 00:27
      • 3.41 Information Security Infrastructure and Architecture (contd.) 00:29
      • 3.42 Knowledge Check
      • 3.43 Objectives of Information Security Architecture
      • 3.44 Architectural Implementation
      • 3.45 SABSA Model 00:36
      • 3.46 SABSA Model (contd.) 00:25
      • 3.47 Knowledge Check
      • 3.48 Security Program Management and Administrative Activities 00:40
      • 3.49 Information Security Program Administrative Activities 00:44
      • 3.50 Information Security Program Roles Responsibilities SkillsandCulture
      • 3.51 Knowledge Check
      • 3.52 Security Awareness Training 00:31
      • 3.53 Security Awareness Training (contd.) 00:43
      • 3.54 Documentation 00:56
      • 3.55 Documentation (contd.) 00:27
      • 3.56 Knowledge Check
      • 3.57 Project Management and Program Development 00:43
      • 3.58 Project Management and Program Development (contd.) 00:34
      • 3.59 Knowledge Check
      • 3.60 Risk Management 00:36
      • 3.61 Business Case Development 00:30
      • 3.62 Business Case Elements 00:55
      • 3.63 Business Case Process Design 00:50
      • 3.64 Knowledge Check
      • 3.65 Information Security Program Budget 00:43
      • 3.66 Information Security Program Budget Guidelines 00:34
      • 3.67 Knowledge Check
      • 3.68 Acceptable Use Policy 01:08
      • 3.69 Information Security Problem Management 00:34
      • 3.70 Vendor Management 00:52
      • 3.71 Information Security Program Management Evaluation
      • 3.72 Information Security Program Management Evaluation (contd.)
      • 3.73 Knowledge Check
      • 3.74 Legal, Physical and Environmental Factors 00:33
      • 3.75 Legal, Physical and Environmental Factors (contd.) 00:39
      • 3.76 Ethics 00:40
      • 3.77 Cultural and Regional Differences 00:47
      • 3.78 Logistics 00:42
      • 3.79 Security Program Services and Operational Activities 01:18
      • 3.80 Incident Response 00:43
      • 3.81 Security Review and Audits 01:13
      • 3.82 Knowledge Check
      • 3.83 Management of Security Technology 00:56
      • 3.84 Due Diligence 00:58
      • 3.85 Compliance Monitoring and Enforcement
      • 3.86 Knowledge Check
      • 3.87 Risk and Business Impact Assessment 00:59
      • 3.88 Resource Dependency Assessment 00:36
      • 3.89 Knowledge Check
      • 3.90 Outsourcing and Service Providers 00:36
      • 3.91 Outsourcing and Service Providers (contd.)
      • 3.92 Knowledge Check
      • 3.93 Third-party Access 00:50
      • 3.94 Third-party Access (contd.) 00:24
      • 3.95 Knowledge Check
      • 3.96 Outsourcing Contracts 00:51
      • 3.97 Outsourcing Contracts (contd.) 00:27
      • 3.98 Cloud Computing
      • 3.99 Cloud Computing (contd.) 00:38
      • 3.100 Knowledge Check
      • 3.101 Cloud Service and Deployment Models
      • 3.102 Cloud Service and Deployment Models (contd.)
      • 3.103 Knowledge Check
      • 3.104 Integration with System Life Cycle Processes 00:36
      • 3.105 Integration with System Life Cycle Processes (contd.) 00:44
      • 3.106 Change Management and Release Management 01:03
      • 3.107 Change Management and Release Management (contd.) 00:28
      • 3.108 Information Security Controls and Countermeasures 00:47
      • 3.109 Information Security Controls and Counter measure (contd.)
      • 3.110 Knowledge Check
      • 3.111 Control Design 01:11
      • 3.112 Control Strengths-and Methods
      • 3.113 Knowledge Check
      • 3.114 Elements of Control 00:35
      • 3.115 Counter measures 00:40
      • 3.116 Knowledge Check
      • 3.117 Physical and Environmental Controls 00:51
      • 3.118 Types of Control Technologies
      • 3.119 Knowledge Check
      • 3.120 Components and Architecture of Technical Control 00:44
      • 3.121 Control Testing and Modification 00:55
      • 3.122 Knowledge Check
      • 3.123 Baseline Controls 00:39
      • 3.124 Information Security Program Metrics and Monitoring 00:50
      • 3.125 Metrics Development 00:35
      • 3.126 Metrics Development (contd.)
      • 3.127 Knowledge Check
      • 3.128 Monitoring Approaches
      • 3.129 Measuring Support of Organizational Objectives 00:59
      • 3.130 Measuring Information Security Management Performance 00:37
      • 3.131 Measuring Information Security Management Performance (contd.) 00:35
      • 3.132 Knowledge Check
      • 3.133 Measuring Compliance
      • 3.134 Measuring Operational Productivity 01:00
      • 3.135 Knowledge Check
      • 3.136 Measuring Security Cost-effectiveness 00:44
      • 3.137 Measuring Organizational Awareness 00:41
      • 3.138 Measuring Effectiveness of Technical Security Architecture 00:40
      • 3.139 Knowledge Check
      • 3.140 Measuring Effectiveness of Resources 00:48
      • 3.141 Measuring Operational Performance 00:44
      • 3.142 Monitoring and Communication 00:24
      • 3.143 Common Information Security Challenges 01:02
      • 3.144 Common Information Security Challenges (contd.) 00:26
      • 3.145 Quiz
      • 3.146 Summary 01:06
      • 3.147 Summary (contd.) 00:56
      • 3.148 Summary (contd.) 00:41
      • 3.149 Concludes 00:12
    • Domain 04 - Information Security Incident Management 54:15
      • 4.1 Welcome 00:15
      • 4.2 Objectives 00:55
      • 4.3 Task Statements 00:34
      • 4.4 Task Statements 00:44
      • 4.5 Knowledge Check
      • 4.6 Knowledge Statements 00:45
      • 4.7 Knowledge Statements (contd) 00:39
      • 4.8 Knowledge Statements (contd) 00:42
      • 4.9 Incident Management Overview 00:59
      • 4.10 Knowledge Check
      • 4.11 Incident Response 00:22
      • 4.12 Incident Response (contd.) 00:32
      • 4.13 Incident Response Procedures 00:28
      • 4.14 Incident Response Procedures (contd.) 00:19
      • 4.15 Knowledge Check
      • 4.16 Incident Management Outcomes 00:46
      • 4.17 Incident Management Concepts
      • 4.18 Knowledge Check
      • 4.19 Incident Management Systems 00:59
      • 4.20 Incident Management System 00:43
      • 4.21 Incident Management Responsibilities 00:46
      • 4.22 Senior Management Commitment 00:39
      • 4.23 Incident Management Resources
      • 4.24 Outcomes of Incident Management 00:23
      • 4.25 Outcomes of Incident Management (contd.) 01:00
      • 4.26 Incident Response Team
      • 4.27 Knowledge Check
      • 4.28 Roles and Responsibilities 01:11
      • 4.29 Roles and Responsibilities (contd.) 01:00
      • 4.30 Roles and Responsibilities (contd.) 01:23
      • 4.31 Knowledge Check
      • 4.32 Roles and Responsibilities (contd.) 01:12
      • 4.33 Roles and Responsibilities (contd.) 01:11
      • 4.34 Skills for IRT 00:44
      • 4.35 Incident Management Objectives
      • 4.36 Desired State of Incident Management 00:56
      • 4.37 Incident Management Metrics and Indicators 00:35
      • 4.38 Incident Management Metrics and Indicators (contd.) 00:24
      • 4.39 Knowledge Check
      • 4.40 Strategic Alignment
      • 4.41 Knowledge Check
      • 4.42 Risk Management and Assurance Integration 01:12
      • 4.43 Value Delivery and Resource Management 00:59
      • 4.44 Knowledge Check
      • 4.45 Performance Management 00:31
      • 4.46 Defining Incident Management Procedures 00:39
      • 4.47 Detailed Plan of Action for Incident Management
      • 4.48 Knowledge Check
      • 4.49 Current State of Incident Response Capability 00:48
      • 4.50 Threats and Vulnerabilities 01:03
      • 4.51 Developing an Incident Response Plan 00:25
      • 4.52 Developing an Incident Response Plan
      • 4.53 Knowledge Check
      • 4.54 Gap Analysis 00:39
      • 4.55 Business Impact Assessment 01:21
      • 4.56 Knowledge Check
      • 4.57 Elements of Business Impact Assessment 00:38
      • 4.58 Elements of Business Impact Assessment (contd.) 00:30
      • 4.59 Benefits of Business Impact Assessment (contd.) 00:27
      • 4.60 Knowledge Check
      • 4.61 Escalation Process for Effective Incident Management 00:45
      • 4.62 Incident Management and Response Team 00:44
      • 4.63 Knowledge Check
      • 4.64 Incident Notification Process 00:43
      • 4.65 Incident Notification Process (contd.) 00:26
      • 4.66 Challenges in Developing an Incident Management Plan 00:45
      • 4.67 Recovery Planning and Business Recovery Procedures 00:36
      • 4.68 Recovery Planning and Business Recovery Procedures (contd.) 00:48
      • 4.69 Knowledge Check
      • 4.70 Recovery Strategies 00:27
      • 4.71 Recovery Strategies (contd.) 00:19
      • 4.72 Recovery Strategies (contd.) 00:23
      • 4.73 Recovery Sites
      • 4.74 Knowledge Check
      • 4.75 Criteria for Selecting Alternative Site 00:38
      • 4.76 Basis for Recovery Site Selection 00:38
      • 4.77 Reciprocal Agreements and Alternative Backup Sites 00:41
      • 4.78 Reciprocal Agreements and Alternative Backup Sites (contd.) 00:38
      • 4.79 Knowledge Check
      • 4.80 Recovery Strategy Approach 00:38
      • 4.81 Strategy Implementation 00:32
      • 4.82 Strategy Implementation 00:30
      • 4.83 Incident Recovery Plan Elements 00:40
      • 4.84 Knowledge Check
      • 4.85 Risk Acceptance and Tolerance 00:53
      • 4.86 Business Impact Analysis, RTO, and RPOs 00:45
      • 4.87 Business Impact Analysis, RTO, and RPOs (contd.)
      • 4.88 Knowledge Check
      • 4.89 Service Delivery Objective and Maximum Tolerable Outage 01:05
      • 4.90 Notification Requirements 00:31
      • 4.91 Notification Requirements (contd.) 00:43
      • 4.92 Knowledge Check
      • 4.93 Supplies and Communication Networks 00:42
      • 4.94 Supplies and Communication Networks (contd.) 00:25
      • 4.95 High Availability Considerations 00:41
      • 4.96 Insurance 00:38
      • 4.97 Knowledge Check
      • 4.98 Updating and Testing Recovery Plans 00:46
      • 4.99 Updating and Testing Recovery Plans (contd.) 00:21
      • 4.100 Types of Tests
      • 4.101 Types of Tests (contd.)
      • 4.102 Knowledge Check
      • 4.103 Types of Tests (contd.)
      • 4.104 Knowledge Check
      • 4.105 Types of Tests (contd.) 00:46
      • 4.106 Recovery Test Metrics 00:25
      • 4.107 Recovery Test Metrics (contd.)
      • 4.108 Knowledge Check
      • 4.109 Legal Aspects of Forensic Evidence 00:42
      • 4.110 Post-Incident activities and investigation 00:23
      • 4.111 Quiz
      • 4.112 Summary 00:56
      • 4.113 Summary (contd.) 00:44
      • 4.114 Summary (contd.) 00:39
      • 4.115 Summary (contd.) 00:54
      • 4.116 Conclusion 00:07
    • {{childObj.title}}
      • {{childObj.childSection.chapter_name}}
        • {{lesson.title}}
      • {{lesson.title}}

    View More

    View Less

    Exam & certification

    • How do you become a CISM certified professional?

      To be a certified CISM professional, you need to meet the following requirements:
      1. Successful completion of the CISM examination
      2. Adherence to the ISACA Code of Professional Ethics
      3. Agree to comply with the Continuing Education Policy.
      4. Work experience in the field of information security
      5. Submit an Application for CISM Certification
      For additional information on how to become a certified CISM and to understand the CISM certification requirements please refer the following link:
      http://www.isaca.org/Certification/CISM-Certified-Information-Security-Manager/How-to-Become-Certified/Pages/default.aspx

    • What are the prerequisites for CISM certification?

      To become a CISM certified professional, you need to fulfill the following criteria:
      • A completed application must be submitted within 5 years from the date of initially passing the examination.
      • All experience must be verified independently with employers.
      • This experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination.
      • Three (3) years of the five (5) years of work experience must be gained performing the role of an information security manager
      • In addition, this work experience must be broad and gained in three (3) of the four (4) CISM® domains

    FAQs

    • What all will I get as part of the training?

      You get access to our e-learning content along with the practice simulation tests that help you tackle the toughest of the exam questions. You will also get an online participant handbook with cross references to the e-learning for reinforcement of your learning.

    • Is exam fee included in the course fee?

      No. The exam fee is not included in the course fee as it is directly paid to ISACA for the membership, application and examination.

    • How many questions are there in the CISM certification exam?

      ISACA uses and reports scores on a common scale from 200 to 800. For example, the scaled score of 800 represents a perfect score with all questions answered correctly; a scaled score of 200 is the lowest score possible and signifies that only a small number of questions were answered correctly. You need to achieve a score of 450 or higher to pass the CISM® Exam.

    • What is the CISM certification cost?

      The CISM Certification cost varies between $450 - $760 based on  the mode of registration and if you are a registered member or not.

      Please click on the below link for further details :
      http://www.isaca.org/certification/pages/exam-registration.aspx

    • What certification will I receive after completing the training?

      After successful completion of the training, you will be awarded the course completion certificate along with the 16 CPE certificate from Simplilearn.

    • What is the date of the next CISM exam?

      CISM exam is conducted thrice in a year in the months of July, September and December. To find the exam locations & dates go to (www.isaca.org/examlocations)

    • Can I defer my exam?

      If you are unable to take the exam, you can request a deferral of your registration fees to the next exam date. To learn more about deferring your exam, including deferral deadlines and costs, please visit www.isaca.org/examdefer.

    • Do you provide assistance for the exam application process?

      Yes, we do provide assistance for the exam application process. You can state your queries on community.simplilearn.com and get them answered along with any other query or concern that you might have about the course.

    • How does Simplilearn assure me that the training and course material delivered are effective?

      Our CISM course is developed to deliver a first attempt pass rate of 100%. With a hands-on learning approach, the training not only gives you the confidence to clear the exam but also helps you retain the knowledge beyond the examination.

    • Can I cancel my enrollment? Will I get a refund?

      Yes, you can cancel your enrollment. We provide you a refund after deducting the administration fee. To know more, please go through our Refund Policy.

    • I’d like to learn more about this training program. Who should I contact?

      Contact us using the form on the right of any page on the Simplilearn website, or select the Live Chat link. Our customer service representatives will be able to give you more details.

    Contact Us

    +1-844-532-7688

    (Toll Free)

    Request more information

    For individuals
    For business
    Name*
    Email*
    Phone Number*
    Your Message (Optional)
    We are looking into your query.
    Our consultants will get in touch with you soon.

    A Simplilearn representative will get back to you in one business day.

    First Name*
    Last Name*
    Email*
    Phone Number*
    Company*
    /index/hidden/ - Never remove this line