Class Is Recorded with Unlimited Access for 90-Days
We Coach Until You Pass
100 % Exam Pass Guarantee
12-Additional Hours of Exam Review at No Charge
CISM Overview
Welcome to ISACA’s Certified Information Security Manager or CISM training and certification course. Are you considering CISM Certification? This course prepares students to pass the Certified Information Security Manager (CISM) certification exam and be recognized among the world’s most qualified information security management professionals. The CISM program at 327 Solutions is an ISACA Authorized Event. 327 Solutions is an ISACA Authorized Training Organization (ATO). Our training utilizes the latest courseware and exam prep material in the market, delivered by ISACA Authorized Trainers, and also uses 327 Solutions Persistent Training Environment. When you take a training program with 327, we will record your event, and after class, you’ll have access to your training for 3-months after we turn your event into eLearning, along with live exam review and mentoring.
The course covers all four of the CISM domains, and each section corresponds directly to the CISM job practice. It uses proven instructional design techniques, incorporating video, interactive eLearning modules, downloadable, interactive workbooks, downloadable job aids, case study activities, and pre-and post-course assessments.
Benefits:
- Pass your exam, guaranteed (if you don’t pass, you’ll be coached until you do)
- Intensive Authorized Virtual-Live Training (online live sessions)
- Post-training Virtual-Live exam mentoring and coaching sessions for 3-weeks (6 total events or 12-hours of exam coaching) via the student portal
- YOUR live class is recorded and turned into eLearning with 3-months access via the student portal
- Message your trainer in-platform until you pass
- Access mock exams, exam prep, and assessments to ensure you are ready to test
Curriculum
Domain 1 - Information Security Governance (24%)
- Explain the need for and the desired outcomes of an effective information security strategy
- Create an information security strategy aligned with organizational goals and objectives
- Gain stakeholder support using business cases
- Identify key roles and responsibilities needed to execute an action plan
- Establish metrics to measure and monitor the performance of security governance
Domain 2 – Information Risk Management (30%)
- Explain the importance of risk management as a tool to meet business needs and develop a security management program to support these needs
- Identify, rank, and respond to a risk in a way that is appropriate as defined by organizational directives
- Assess the appropriateness and effectiveness of information security controls
- Report information security risk effectively
Domain 3 – Information Security Program Development and Management (27%)
- Align information security program requirements with those of other business functions
- Manage the information security program resources
- Design and implement information security controls
- Incorporate information security requirements into contracts, agreements and third-party management processes
Domain 4 – Information Security Incident Management (19%)
- Understand the concepts and practices of Incident Management
- Identify the components of an Incident Response Plan and evaluate its effectiveness
- Understand the key concepts of Business Continuity Planning, or BCP and Disaster Recovery Planning, or DRP
- Be familiar with techniques commonly used to test incident response capabilities