The CISM Certification Training is an excellent step for you to sharpen your skillset as an IT Security professional. This Certified Information Security Manager course validates your learning and experience required to create a robust data security program. The CISM Course outline at Vinsys covers everything right from ‘What is Information Security’, IS Governance, Risk Management, and Security Program Development to ISACA’s Laws and Regulations of Information Security. The CISM Training at Vinsys follows an all-encompassing approach. It is a 5-days, comprehensive, and instructor-led corporate certification training program every IT Security Professional must go for!
The CISM Certification Training Program at Vinsys ensures that you grasp the core theory and principles of Information Security strategy development and management along with Information Security Governance, and clear the CISM exam in your first attempt. This CISM Certification builds a great base for your future as an Information Security Manager.
ISACA’s CISM Certification is largely acknowledged worldwide which can really make your profile visible to organizations all around the world. The CISM Certification is one of the most –in-demand accreditations around the globe that not just showcases your proficiency in the area, but also makes you more confident and adept as a team leader.
So, demonstrate your expertise as an Information Security Management professional and be prepared for global opportunities coming your way. Get your tailor-made CISM Certification Training in your city today!
After the completion of the CISM Training Program at Vinsys, the participants would be able to:
‘The ISACA Exam Candidate Information Guide 2018’.
The CISM Certification course is designed for those with five years of experience in Information Security. It is necessary that candidates should have minimum of three years of actual work experience in the field and in addition, three or more years of experience in Information Security practice analysis areas. Professionals with the following designations who meet ISACA’s criteria may apply for a CISM Certification Training and CISM Exam.
ISACA has set rules and regulations for experienced security professionals who wish to apply for CISM Certification Training and Exam.
To successfully qualify the CISM Certification, professionals are required to consider and abide by these important four ‘E’ aspects:
CPE Policy as per ISACA:
The CISM CPE policy requires the attainment of CPE hours over an annual and three-year certification period. CISMs must comply with the following requirements to retain certification:
Code of Professional Ethics as per ISACA:
ISACA sets forth this Code of Professional Ethics to guide the professional and personal conduct of members of the association and/or its certification holders.
Members and ISACA certification holders shall:
(Failure to comply with this Code of Professional Ethics and CPE Policy can result in an investigation into a member's or certification holder's conduct and, ultimately, in disciplinary measures.)
Domain 1: Information Security Governance
1.2 Priorities for the CISM
1.3 Priorities for the CISM Review Questions
1.4 Corporate Governance
1.5 Evaluating the Security Environment
1.6 Information Security Program
1.7 Security Strategy
1.8 Roles and Responsibilities
1.9 Reporting and Compliance
1.10 Code of Ethics
Domain 2: Information Risk Management
2.1 Risk Management
2.2 Risk Identification
2.3 Information Security Program Basics
2.4 Administrative Controls
2.5 Asset Threats and Vulnerabilities
2.6 Risk Register
2.7 Information Security Architecture
2.8 Risk Scenarios
2.9 Risk Assessment
2.10 Risk Analysis Techniques
2.11 BCP and DRP
2.12 Risk Mitigation Reduction and Avoidance
2.13 Risk Mitigation Transference and Acceptance
2.14 Selecting a Mitigation Strategy
2.15 Types of Mitigating Controls
2.16 Risk and Control Monitoring and Reporting
2.18 Tools for Risk Monitoring
Domain 3: Information Security Program Development and Management
3.1 Information Security Program and Development
3.2 Information Security Program Concepts
3.3 Information Security Program Requirements
3.4 Essential Elements of an Information Security Program
3.5 Security Frameworks
3.6 Purpose of Architecture
3.7 Information Security Frameworks
3.8 Security Operations Event Monitoring
3.9 Secure Engineering and Threat Modeling
3.10 Protecting the Network-Segmentation
3.11 Protecting the Network-Wireless Security
3.12 Protecting the Network-Services
3.13 Protecting the Network
3.14 Data and Endpoint Security
3.15 Identity and Access Management
3.16 Third-Party Governance
3.17 Policies Procedures Standards and Guidelines
3.18 Certification and Accreditation
Domain 4: Information Security Incident Management
4.1 BCP (Business Continuity Plan) and DRP (Disaster Recovery Plan)
4.2 Incident Management Processes
4.3 Roles and Responsibilities
4.4 Making the case for incident response
4.5 Developing the Incident Response Plan-Capability Assessment
4.6 Incident Response Planning Processes
4.7 Incident Detection Devices
4.8 BCP introduction and steps
4.10 BCP Roles and Responsibilities
4.11 DRP basics
The purpose of the CISM Training and Certificate is to confirm that the candidate has adequate knowledge and understanding of the CISM’s IT Security Techniques. CISM develops an awareness of cybersecurity among businesses and IT enterprises. With this facilitation program in IT Security, the candidate will be able to successfully evaluate and reconstruct the current state of information security in his/ her organization.
CISM training covers end-to-end aspects of security and governance, assisting you with effective solutions to govern and manage a team of IT security professionals in an enterprise IT.
Below listed are some of the objectives of taking a CISM Certification Training and Exam. The participant must aim to:
Mr. Sandeep Sehgal, CISSP, ISO 27001 LI, PMP, ITIL v3 Foundation & IBM Certified Sr. PM
Senior SME – IT Security Management Frameworks
Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.
CISM Certification is an acronym for Certified Information Security Manager.
The Certified Information Security Manager (CISM) is an industry-recognized certification. CISM is an asset that will distinguish your profile in the job market and enhance your credibility and effectiveness working in the IT Security domain. CISM is a key certification for information security professionals who manage, design, oversee and assess enterprise information security.
CISM requires you to possess a minimum of five years of direct, full-time information security work experience. The waiver is available for a maximum of two years.
Training duration is 3 days (23 Contact Hours).
Yes, at the end of the program, every participant receives a soft copy of the facilitation course completion certificate on your email which states that you have successfully completed the course.
All open house sessions are conducted only on weekends for the convenience of working professionals who wish to attend.
At Vinsys, we create our schedules as per your preferences of location and time. You can put in a request to arrange a training program in your organization and we will be there to provide you with the best corporate training experience of your life!
At Vinsys, we offer the most cost-effective, professional IT training programs. If you are an individual or a working professional, please do check our updated course calendar for CISM Certification Training Program here.
For our Tailor-made (as per your team’s availability and convenience) and specially scheduled CISM programs, write to us on email@example.com or fill out the inquiry form.
Along with the training sessions, we provide the required course material, a set of practice questions for your exam preparation and access to our tech-enabled Learning Labs to create a dynamic learning experience for you.
Following is the CISM Certification cost as per ISACA which may be subject to change. Please get in touch with us for queries.
For Early registration:
ISACA Member: US $525
Non-member: US $710
For Final registration:
ISACA Member: US $575
Non-member: US $760
Training sessions at Vinsys are conducted by certified experts who have practical working experience as well as training experience. Our facilitators hold 20+ years of experience in Information Security Management and are recognized globally for their expertise in the field of Information Security Management.
In this training program, you will gain a thorough understanding of CISM IT Security and Governance including the techniques, frameworks and tools. Grasping the CISM fundamentals will be the perfect foundation for you to work efficiently as an Information Security Manager.
• Why choose Vinsys for CISM Certification Training?
• What is the format of the CISM Certification Exam?
It is a multiple-choice question exam paper and has 200 questions in it. The duration to solve the paper is 4 hours.
• What are the passing marks for the CISM Certification Exam?
Clearing the exam requires you to secure the score of at least 450 marks out of 800, which means the candidates need to achieve at least 65% to pass the exam.
• Is CISM Certification Exam a closed book test?
Yes, it is a closed book test.
• How is the CISM Certification Exam carried out?
Vinsys follows a high integrity exam procedure wherein everything is supervised by ISACA accredited personnel.
• Can I take a paper-based exam for CISM?
No, CISM is a computer-based exam.
The CISM Exam consists of 200 questions. The duration of this exam is 4 hours.
The questions are in multiple-choice item format and incorporate job practice areas in the most recent job practice analysis.
Following is the domain-wise weightage:
In order to successfully pass the CISM exam, the candidate is expected to secure at least 450 out of 800 marks, that is, 65% out of 100.
Working as an Information Security Manager, I enrolled in the CISM Certification training. I am now able to take a comprehensive view of information systems security management and their relationship to materialise it to organizational success
Being an Information Security Manager, attending the CISM program enabled me to demonstrate to enterprise customers their commitment to compliance, security and integrity; ultimately contributing to the attraction and retention of customers. Thank you Vinsys for the wide-ranging study material that made it easier for me to understand.
Ensuring that there is improved alignment between the organization's information security program and its broader goals and objectives I had been newly appointed as an Information Security Manager. Thus I decided to increase my skills and joined Vinsys’ CISM Certification Training Program. The program has really helped me and I was able to get my certification easily.
PRINCE2® and ITIL® are registered trademarks of AXELOS Limited. Used under licence from AXELOS Limited. All rights reserved.
The Swirl logo™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.
COBIT® 5 is a registered trademark of ISACA in United States and other countries. DevOps Foundation®, Certified Agile Service Manager (CASM)®, Certified Agile Process Owner (CAPO)® & Agile Service Management® are registered marks of the DevOps Institute.
PMBOK®, Project Management Institute® PMI®, Certified Associate in Project Management (CAPM)®, Project Management Professional (PMP)®, Program Management Professional (PgMP)®, Portfolio Management Professional (PfMP)®, PMI Agile Certified Practitioner (PMI-ACP)®, PMI Professional in Business Analysis (PMI-PBA)®, PMI Risk Management Professional (PMI-RMP)®, PMI Scheduling Professional (PMI-SP)® are the Registered Marks of the Project Management Institute, Inc.
TOGAF® is a registered trademark of The Open Group