Leader in the cybersecurity training sector.

ISACA CERTIFIED Information Security Manager

Satisfaction rate
4.9
Success rate
4.9
Strengthen your credibility in enterprise IT security management. Take your career to the next level with CISM (Certified Information Security Manager) ISACA confirms your experience and expertise in the strategic management of IT security and cybersecurity.

The target audience for training

  • CISM is aimed at information security professionals with at least five years' relevant professional experience, including at least three years in the role of information security manager. Job titles include:
    • CISO (Chief Information Security Officer)
    • CSO (Chief Security Officer)
    • Safety Director/Manager/Consultant
    • Information Technology (IT) Director/Manager/Consultant
    • Director and Compliance/Risk/Privacy Manager

What you will learn

Designed for IT professionals with technical expertise and experience in information systems (IS)/information technology (IT) security and control looking to move from the role of team member to that of manager. The CISM can add credibility and confidence to interactions with internal and external stakeholders, peers and regulators.

This certification indicates expertise in information security governance, program development and management, incident management and risk management. If you are a mid-career IT professional aspiring to senior management roles in IT security and control, the CISM can give you the visibility you need.

Training programme

  • Overview of corporate governance
  • Organisational culture, structures, roles and responsibilities
  • Legal, regulatory and contractual requirements
  • Information security strategy
  • Information governance frameworks and standards
  • Strategic planning
  • Risk and threat landscape
  • Analysis of vulnerabilities and control deficiencies
  • Risk assessment and analysis
  • Response to information-related risks
  • Risk monitoring, reporting and communication
  • Development and resources of the information security programme
  • Information security standards and frameworks
  • Definition of an information security programme roadmap
  • Performance indicators for the information security programme
  • Information security programme management
  • Information security awareness and training
  • Integration of the security programme with IT operations
  • Communications, reporting and programme performance management
  • Overview of incident management and response
  • Incident management and response plans
  • Classification/categorisation of incidents
  • Incident management operations, tools and technologies
  • Incident investigation, assessment, containment and reporting
  • Incident eradication, recovery and review
  • Impact on business and operational continuity
  • Disaster recovery planning

Training objectives

  • Learn the processes and best practices for managing and assessing information security risks.

  • Develop the skills needed to design and implement an information security programme that aligns with an organisation's objectives and strategies.

Training prerequisites

To be eligible to take the CISM exam, you must have five or more years of professional experience in information security. At least three of these years must be in a minimum of three areas of professional practice, with one year or more in each. These areas include information security management.

Contents of the official kit

Full Kit : Review Manual, QAE, Exam

Cost

2833 €

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

en_GBEnglish

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.