Certified Information Security Manager (CISM) (Voucher Included)

In the InfoSec world, security managers are the driving force behind an organization's cybersecurity policies. These key individuals typically started their IT careers in hands-on roles before earning their CISM certification and taking on managerial duties. If you're ready to earn your next IT certification, this online training course will fully prepare you for the ISACA Certified Information Security Manager (CISM) certification exam.

This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility. Proctor fees may apply, which are not included.

SHARE
6 Months / 75 Course Hrs
Open Enrollment
Offered in partnership with your preferred school

George Mason University

Change School
Bundle and save
for additional information

Certified Information Security Manager (CISM) (Voucher Included)

Enroll Now

Course code: GES345

What you will learn

  • Recognize the security role to manage and improve information security governance processes that support an information security strategy
  • Interpret the methods to ensure the information security program provides benefits while supporting business operations
  • Analyze the methods and strategies in classifying information assets to confirm protective measures are proportional to their business value
  • Demonstrate the ability in accurately classifying and categorizing information security incidents to guarantee effective reactions

How you will benefit

  • Build confidence toward successfully completing the certification exam
  • Become recognized by ISACA, a global leader in certification, training, and career development
  • Prove comprehensive information security knowledge to employers

How the course is taught

  • Self-paced, online course
  • 6 Months to complete
  • Open enrollment, begin anytime
  • 75 course hours
  1. Information Security
  2. Governance and Policy
  3. Risk Management
  4. Security Management
  5. Protection and Maintenance

Jeff Rees has over 25 years of experience in the IT industry. Jeff's expertise covers a wide range of technical skills in the field of immersive technology, such as virtual reality, augmented reality, spatial computing, and holograms. He manages, creates, and delivers high-quality augmented and virtual reality technology experiences that enhance knowledge retention and engagement for learners.Jeff capitalizes on his multifaceted technical knowledge with his passion for implementing immersive solutions, which has given him a proven track record of producing one-of-a-kind solutions for clients.

Jeff has previously served as a senior vice president of operations, chief technology officer, and technical director for diverse technology companies. Jeff has also taught numerous computer courses during his career. Jeff holds a bachelor's degree from DeVry University in Computer Sciences with an emphasis in Simulation Design.

Prerequisites:

While there are no prerequisites to take this course, ISACA recommends at least five years of work experience in information security. The work experience must be gained within the 10-year period preceding the application date for certification.

Requirements:

Hardware Requirements:

  • This course can be taken on either a PC or Mac.

Software Requirements:

  • PC: Windows 8 or later.
  • Mac: macOS 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

Instructional Material Requirements:

The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:

  • Management of Information Security

Please Note: You will receive a digital book if the physical book is on backorder.

How to Become CISM Certified:

  1. Successfully pass the CISM exam.
  2. Adhere to ISACA's Code of Professional Ethics.
  3. Agree to comply with the Continuing Education Policy.
  4. Work experience in the field of information security.
  5. Submit an Application for CISM Certification.

Learn more about becoming CISM Certified.

Yes, ed2go courses are completely online. However, keep in mind that not all certifying bodies or industry-specific certifications are recognized internationally. Please review your country's regulations prior to enrolling in courses that prepare for certification.

This course will prepare you for the Certified Information System Manager (CISM) exam. Students enrolled in the "voucher included" option will also receive a prepaid voucher for the exam after completing the course and financial obligation. Learn more about CISM certification requirements.

This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.

This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive six (6) months to complete the course.

The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact the student advising team to see what options you may have available to work out a suitable completion date. Please note that an extension fee may be charged.

The course instructor will be available by email to answer any questions and provide feedback on your performance. Occasionally, your course may be supported by a team of industry experts. You will also receive support from the student advising team.

Upon successful completion of the course, you will be awarded a certificate of completion.

This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.

This course is non-credit, so it does not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more about financial assistance.

If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Contact Us" form.

ISACA
ISACA is a nonprofit, independent organization that works to implement globally accepted practices and cutting-edge knowledge throughout the information systems industry. With more than 140,000 professionals in 180 countries, ISACA is truly a worldwide association and can provide you with the credentials and prestige you need to get ahead in your career. Enroll in a course certified by ISACA and start toward a career in a lucrative and growing industry.