Certified Information Security Manager (CISM) (Voucher Included)
In the InfoSec world, security managers are the driving force behind an organization's cybersecurity policies. These key individuals typically started their IT careers in hands-on roles before earning their CISM certification and taking on managerial duties. If you're ready to earn your next IT certification, this online training course will fully prepare you for the ISACA Certified Information Security Manager (CISM) certification exam.
This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility. Proctor fees may apply, which are not included.
Certified Information Security Manager (CISM) (Voucher Included)
Details + Objectives
Course code: GES345
What you will learn
- Recognize the security role to manage and improve information security governance processes that support an information security strategy
- Interpret the methods to ensure the information security program provides benefits while supporting business operations
- Analyze the methods and strategies in classifying information assets to confirm protective measures are proportional to their business value
- Demonstrate the ability in accurately classifying and categorizing information security incidents to guarantee effective reactions
How you will benefit
- Build confidence toward successfully completing the certification exam
- Become recognized by ISACA, a global leader in certification, training, and career development
- Prove comprehensive information security knowledge to employers
How the course is taught
- Self-paced, online course
- 6 Months to complete
- Open enrollment, begin anytime
- 75 course hours
Instructors & Support
Jeff Rees
Jeff Rees has over 25 years of experience in the IT industry. Jeff's expertise covers a wide range of technical skills in the field of immersive technology, such as virtual reality, augmented reality, spatial computing, and holograms. He manages, creates, and delivers high-quality augmented and virtual reality technology experiences that enhance knowledge retention and engagement for learners.Jeff capitalizes on his multifaceted technical knowledge with his passion for implementing immersive solutions, which has given him a proven track record of producing one-of-a-kind solutions for clients.
Jeff has previously served as a senior vice president of operations, chief technology officer, and technical director for diverse technology companies. Jeff has also taught numerous computer courses during his career. Jeff holds a bachelor's degree from DeVry University in Computer Sciences with an emphasis in Simulation Design.
Requirements
Prerequisites:
While there are no prerequisites to take this course, ISACA recommends at least five years of work experience in information security. The work experience must be gained within the 10-year period preceding the application date for certification.
Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:
- Management of Information Security
Please note: You will receive a digital book if the physical book is on backorder.
More About
How to Become CISM Certified:
- Successfully pass the CISM exam.
- Adhere to ISACA's Code of Professional Ethics.
- Agree to comply with the Continuing Education Policy.
- Work experience in the field of information security.
- Submit an Application for CISM Certification.