In-Person Classroom

Classroom styled training by a certified expert

  • Lifetime access with downloadable resources
  • Get certificate on completion by our certified experts
  • Get few Quizzes & Case studies to practice offline
  • Application assistance and support by certified staff

$ 3149

Live Online Classroom

Start instantly and learn at your own schedule

  • 100% online classes
  • Flexible deadlines
  • Earn a Certification upon completion by our globally recognized experts
  • Avail study materials, videos, practice sets, quizzes to crack the examination with 100% results.
  • Recorded lesson video for post-training learning

$ 3349

Online Self-Study

Online courses to build your skills and advance your career

  • 24*7 career support
  • Get Certified by our leading experts recognized globally
  • Get noticed by the top hiring companies
  • Exam passing tips and tricks to assist in the exam
  • Industry case studies and capstone projects

$ 899

CISM Certification Training

This Certified Information Security Manager course validates your learning and experience required to create a robust data security program.

Course Overview

The CISM Certification Training Program at Skill Rise ensures that you grasp the core theory and principles of Information Security strategy development and management along with Information Security Governance, and clear the CISM exam in your first attempt. CISM Certification is largely acknowledged worldwide which can really make your profile visible to organizations all around the world.

Course Agenda

  • Introduction

  • Priorities for the CISM

  • Priorities for the CISM Part 2

  • Priorities for the CISM Review Questions

  • Corporate Governance

  • Evaluating the Security Environment

  • Information Security Program

  • Security Strategy

  • Roles and Responsibilities

  • Reporting and Compliance

  • Code of Ethics

  • Summary and Review

  • Risk Management Intro

  • Risk Identification

  • Information Security Program Basics

  • Administrative Controls

  • Asset Threats and Vulnerabilities

  • Risk Register

  • Frameworks

  • Information Security Architecture

  • Risk Scenarios

  • Risk Scenarios Continued

  • Risk Assessment Introduction

  • Examples of Risk Analysis Techniques

  • Risk Assessment

  • BCP and DRP

  • Creation of BCP and DRP

  • Risk Mitigation Reduction and Avoidance

  • Risk Mitigation Transference and Acceptance

  • Selecting a Mitigation Strategy

  • Types of Mitigating Controls

  • Risk and Control Monitoring and Reporting

  • KRI's

  • Tools for Risk Monitoring

  • Information Security Program and Development

  • Information Security Program Concepts

  • Information Security Program Requirements

  • Essential Elements of an Information Security Program

  • Security Frameworks

  • Purpose of Architecture

  • Information Security Frameworks

  • Security Operations Event Monitoring

  • Secure Engineering and Threat Modeling

  • Protecting the Network-Segmentation

  • Protecting the Network-Wireless Security

  • Protecting the Network-Services

  • Protecting the Network through Detection and Network Access Control

  • Data and Endpoint Security

  • Identity and Access Management

  • Third-Party Governance

  • Policies Procedures Standards and Guidelines

  • Certification and Accreditation

  • Domain 3 Wrap-up

  • BCP and DRP

  • Incident Management Processes

  • Roles and Responsibilities

  • Making the case for incident response

  • Developing the Incident Response Plan-Capability Assessment

  • Incident Response Planning Processes

  • Incident Detection Devices

  • BCP steps

  • BCP Intro

  • BCP Step 1

  • Business Impact Analysis Step 2

  • BCP Step 3

  • BCP Step 4

  • Analyze and Update a Company BCP/BIA/DRP/CIRP

  • BCP Roles and Responsibilities

  • BCP sub plans

  • Testing the Plan

  • ISACA - CISM - Certified Information Security Manager