Certified Information Security Manager (CISM) (Voucher Included)

In the InfoSec world, security managers are the driving force behind an organization's cybersecurity policies. These key individuals typically started their IT careers in hands-on roles before earning their CISM certification and taking on managerial duties. If you're ready to earn your next IT certification, this online training course will fully prepare you for the ISACA Certified Information Security Manager (CISM) certification exam.

This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility. Proctor fees may apply, which are not included.

SHARE
6 Months / 75 Course Hrs
Open Enrollment
Offered in partnership with your preferred school

George Mason University

Change School
Bundle and save

for additional information

Course code: GES345

What you will learn

  • Recognize the security role to manage and improve information security governance processes that support an information security strategy
  • Interpret the methods to ensure the information security program provides benefits while supporting business operations
  • Analyze the methods and strategies in classifying information assets to confirm protective measures are proportional to their business value
  • Demonstrate the ability in accurately classifying and categorizing information security incidents to guarantee effective reactions

How you will benefit

  • Build confidence toward successfully completing the certification exam
  • Become recognized by ISACA, a global leader in certification, training, and career development
  • Prove comprehensive information security knowledge to employers

How the course is taught

  • Self-paced, online course
  • 6 Months to complete
  • Open enrollment, begin anytime
  • 75 course hours
  1. Information Security
  2. Governance and Policy
  3. Risk Management
  4. Security Management
  5. Protection and Maintenance

Jeff Rees

Jeff Rees has over 25 years of experience in the IT industry. Jeff's expertise covers a wide range of technical skills in the field of immersive technology, such as virtual reality, augmented reality, spatial computing, and holograms. He manages, creates, and delivers high-quality augmented and virtual reality technology experiences that enhance knowledge retention and engagement for learners.Jeff capitalizes on his multifaceted technical knowledge with his passion for implementing immersive solutions, which has given him a proven track record of producing one-of-a-kind solutions for clients.

Jeff has previously served as a senior vice president of operations, chief technology officer, and technical director for diverse technology companies. Jeff has also taught numerous computer courses during his career. Jeff holds a bachelor's degree from DeVry University in Computer Sciences with an emphasis in Simulation Design.

Prerequisites:

While there are no prerequisites to take this course, ISACA recommends at least five years of work experience in information security. The work experience must be gained within the 10-year period preceding the application date for certification.

Requirements:

Hardware Requirements:

  • This course can be taken on either a PC or Mac.

Software Requirements:

  • PC: Windows 8 or later.
  • Mac: macOS 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

Instructional Material Requirements:

The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:

  • Management of Information Security

Please note: You will receive a digital book if the physical book is on backorder.

How to Become CISM Certified:

  1. Successfully pass the CISM exam.
  2. Adhere to ISACA's Code of Professional Ethics.
  3. Agree to comply with the Continuing Education Policy.
  4. Work experience in the field of information security.
  5. Submit an Application for CISM Certification.

Learn more about becoming CISM Certified.

The ISACA CISM training course is truly like no other you will find. You will be taught by a live instructor who can answer questions and provide advice. You will receive access to the Skills Library for 12 months after your enrollment into the training course. You will also receive peace of mind from the ISACA Certification Success Program paired with our provided prep materials, boot camp sessions, and post-work. In this program, if your first attempt is unsuccessful, you may be eligible to take the certification exam a second time with no additional fee.

The Certified Information Security Manager (CISM) certification validates your expertise in information security governance, program development and management, incident management, and risk management. It is designed for professionals with technical expertise and experience in IS/IT security who want to move from an integral team player up to manager. The CISM certification will help you gain credibility and will add confidence to your interactions with stakeholders, regulators, and peers.

The average certified professional CISM salary ranges. Entry-level positions will garner a salary at the lower end of the spectrum. In contrast, candidates who have successfully handled complex projects and are placed at a senior level can expect a significantly higher five or six-figure salary. According to ZipRecruiter, the average salary for a CISM professional is $130,645 overall, and Glassdoor reports the average compensation for Certified Information Security Managers to be $107,015 as of December 2022. Your relevant work experience and the nature of the IT security projects you have worked on will influence your compensation regardless of your job title.

CISM requirements include a minimum of 5 years of professional information security management work experience—as described in the CISM job practice areas. Any work experience must be acquired within the 10-year period preceding the application for certification. Candidates will have up to 5 years from the date they pass the CISM exam to gain the required work experience and apply for certification.

Upon earning your CISM, you may qualify for additional IT and IS roles, including information security manager, information security consultant, chief information officer, and chief information security officer. The CISM is a great addition to the resume of anyone interested in learning information security management skills and getting certified.

Yes, ed2go courses are completely online. However, keep in mind that not all certifying bodies or industry-specific certifications are recognized internationally. Please review your country's regulations prior to enrolling in courses that prepare for certification.

This course will prepare you for the Certified Information System Manager (CISM) exam. Students enrolled in the "voucher included" option will also receive a prepaid voucher for the exam after completing the course and financial obligation. Learn more about CISM certification requirements.

This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.

This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive six (6) months to complete the course.

The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact the student advising team to see what options you may have available to work out a suitable completion date. Please note that an extension fee may be charged.

The course instructor will be available by email to answer any questions and provide feedback on your performance. Occasionally, your course may be supported by a team of industry experts. You will also receive support from the student advising team.

Upon successful completion of the course, you will be awarded a certificate of completion.

This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.

This course is non-credit, so it does not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more about financial assistance.

If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Contact Us" form.

ISACA
ISACA is a nonprofit, independent organization that works to implement globally accepted practices and cutting-edge knowledge throughout the information systems industry. With more than 140,000 professionals in 180 countries, ISACA is truly a worldwide association and can provide you with the credentials and prestige you need to get ahead in your career. Enroll in a course certified by ISACA and start toward a career in a lucrative and growing industry.
;