Lifetime
An ITU Online Training exclusive. The only Buy Once, Never Pay for IT training again program available. Plus, get all new and updated content for life.
With an All-Access Pass, you get access to every current and future ITU course. Access over 2,500 hours of on-demand IT Training 24/7. With over 13,000 on-demand training videos and 19,000+ practice questions, you'll have the tools to excel in the critical IT skills needed to elevate your IT Career. Our All-Access pass is available in three affordable plans.
Paris is the capital of France.
Tokyo is the capital of Japan.
Most Popular
Categories
With an All-Access Pass, you get access to every current and future ITU course. Access over 2,500 hours of on-demand IT Training 24/7. With over 13,000 on-demand training videos and 19,000+ practice questions, you'll have the tools to excel in the critical IT skills needed to elevate your IT Career. Our All-Access pass is available in three affordable plans.
ITU provides a vast array of IT-focused on-demand training designed to help you excel in both entry-level and advanced IT skills. Browse our most popular training or take a deper dive into our robust catalog of training categories.
Popular Courses All CategoriesCompTIA Train for a globally recognized IT certification with our comprehensive CompTIA courses. A+ | Network+ | Security+ Cybersecurity Master the art of combating cybersecurity threats and become a cyber hero. Ethical Hacking (CEH) | CISSP | CISM Cloud Computing An essential skill set in today's IT environments. Learn cloud computing platforms Azure Administrator | Google Cloud | AWS Practitioner Project Management Key to successful projects, learn the skills and methodolgy behind project management. PMP | Risk Mgmt | Agile PM Adobe Business & Management Cisco Cloud Computing CompTIA Computer Support Cybersecurity Data Administration Data Analysis Development & Programming Marketing & Social Media Medical Coding & Billing Microsoft Microsoft Office Network Administration Networking & Software Project Management Web Development
The CISM certification training course is designed to provide on-the-job skills, as well as knowledge to pass the Certified Information System Manager (CISM) certification exam. This cybersecurity training focuses on more advanced topics and should be completed after various certifications in Cisco and Microsoft have been earned, such as PenTest+ or CySA+.
Included In This Course
Closed Captions
Certificate of Completion
Course Description
The CISM Certification Training Course is your one-stop solution for mastering the skills required to become a Certified Information Security Manager. This advanced-level CISM online training focuses on equipping you with on-the-job skills and the knowledge you need to pass the CISM certification exam. The course is an excellent investment, especially considering the CISM exam cost.
The CISM Training – Certified Information Systems Manager course instructor is Roger St Hilaire, with 30+ years of experience and CISM, CGEIT, MOF, TOGAF & PSP-Rainmaker Foundation Certifications.
The CISM (Certified Information Security Manager) certification is a highly respected credential in the field of information security management. Offered by ISACA (Information Systems Audit and Control Association), this certification is designed for IT professionals who manage and oversee an organization’s information security.
Key aspects of the CISM certification include:
CISM is recognized worldwide as a symbol of excellence in information security management. It’s particularly suited for IT professionals in managerial or supervisory positions in the field of information security, including CISOs, IT managers, and security consultants. The certification process involves passing an exam and meeting certain work experience requirements. It also requires adherence to a code of professional ethics and ongoing education to maintain the certification.
The CISM Certification Training covers four main domains essential for information security management:
Before embarking on the journey to become a Certified Information Security Manager (CISM), it’s crucial to understand the eligibility criteria and prerequisites that you must meet. This certification is not just about passing an exam; it’s about having the right blend of experience and skills in information security management. The following section outlines the types of roles that are most suited for this certification, as well as the specific experience and other requirements you’ll need to fulfill to be eligible for the CISM exam. By ensuring you meet these criteria, you’ll be well-positioned to make the most of the training and successfully pass the certification exam.
By meeting these eligibility and pre-requisites, you can ensure that you are well-prepared to take the CISM certification exam and excel in your career in information security management.
The cost of the Certified Information Security Manager (CISM) exam varies depending on several factors, including membership status with ISACA, the organization that offers the certification. Here is a general breakdown:
It’s essential to check the latest fees on the ISACA website or other official sources, as prices are subject to change.
Each of these blogs offers a unique perspective on topics that are relevant to CISM training, making them excellent resources for anyone interested in cybersecurity.
Understanding the key terms related to Certified Information Systems Manager (CISM) training is crucial for anyone aspiring to excel in information security management. This knowledge base will not only help in comprehending the course material effectively but also in applying these concepts in real-world scenarios. These terms encompass a broad range of topics including risk management, information security governance, incident management, and more, providing a foundational vocabulary for professionals in this field.
Term | Definition |
---|---|
Information Security Governance | The collection of practices related to supporting, defining, and directing the security efforts of an organization. |
Risk Management | The process of identifying, assessing, and controlling threats to an organization’s capital and earnings. |
Information Security Program Development | The process of establishing and maintaining a framework to provide assurance that information security strategies are aligned with organizational objectives. |
Incident Management | The process of identifying, managing, recording, and analyzing security threats or incidents in real-time. |
Information Risk Assessment | The process of identifying and evaluating risks for information assets, considering the impact of confidentiality, integrity, and availability breaches. |
Information Security Strategy | The set of policies and plans for reducing information security risks to an acceptable level. |
Business Impact Analysis (BIA) | The process of determining the potential impacts resulting from the interruption of time-sensitive or critical business processes. |
Compliance Management | The process of ensuring that the organization conforms to regulatory and legal requirements. |
Security Architecture | The framework and components that make up an organization’s information security system. |
Disaster Recovery Planning | The process of creating a strategy to maintain and recover IT infrastructure in the event of a disaster. |
Security Awareness Training | Training provided to employees to enhance their understanding of the importance of information security. |
Information Asset Management | The process of ensuring that information assets receive an appropriate level of protection. |
Change Management | The process of managing changes to the IT environment in a controlled manner. |
Vulnerability Management | The process of identifying, classifying, remediating, and mitigating vulnerabilities in software and network systems. |
Threat Assessment | The process of identifying and evaluating threats to an organization. |
Security Policies | Guidelines and rules set by an organization to ensure information security. |
Encryption | The method of converting information or data into a code to prevent unauthorized access. |
Access Control | The process of granting or denying specific requests to obtain and use information. |
Security Auditing | The process of evaluating the effectiveness of an organization’s information security measures. |
Cybersecurity | The practice of protecting systems, networks, and programs from digital attacks. |
These terms form the backbone of the CISM curriculum and are essential for anyone involved in information security management.
he CISM (Certified Information Security Manager) certification is a highly respected credential in the field of information security management. Offered by ISACA (Information Systems Audit and Control Association), this certification is designed for IT professionals who manage and oversee an organization’s information security.
A CISM (Certified Information Security Manager) certification is valid for three years. To maintain the certification, holders are required to participate in continuing professional education (CPE) activities. ISACA, the organization that offers the CISM certification, mandates that certified professionals earn and report a minimum of 120 CPE credits over a three-year period. Additionally, a minimum of 20 CPE credits must be earned and reported annually.
The course instructor is Roger St Hilaire. He brings 30+ years of experience in IT and various certifications including CISM, CGEIT, MOF, TOGAF, and PSP-Rainmaker Foundation. Roger has a proven track record of designing and managing large-scale technology systems and has achieved remarkable results in various domains of IT.
To undertake this course, you should already have some experience in information security management. Specifically, you need to submit evidence verifying at least five years of experience in data security, with a 3-year information security management requirement dedicated to security experience spread across multiple security business model disciplines. This job practice analysis should be completed within 10 years leading up to your CISM application date or within 5 years from when you initially passed the exam​.
The CISM Training Course consists of six modules: Information Security Governance, Information Security Risk Management, InfoSec Program Development and Management, Information Security Incident Management, and Exam Prep. Each module comes with a variety of sub-topics to give you a comprehensive understanding of the subject matter.
The CISM Training Online Course provides a mix of 48 on-demand videos and 100 prep questions for comprehensive learning. You’ll cover six topics across 17 training hours, ensuring you are well-prepared for the CISM certification exam. The course also includes closed captions for accessibility.
Course Outline
Roger is an experienced IT professional with a proven track record of designing and managing large-scale technology systems. Successfully designed the first knowledge engine for UNDP Sub-Regional Resource Facility, known as the Request Tracker, which facilitated workflow-based tracking of queries and increased productivity. Managed and grew a $70 million USD dual data centre national network system for the Trinidad and Tobago government, expanding it from 400+ sites to 512 and increasing customer satisfaction. Skilled in vendor negotiations, securing approximately $200K USD in committed support during a crisis event. Adept in saving clients money and improving their operations, saving one BPR client $60K USD and improving their security processes. Committed to driving positive change and delivering results in fast-paced and dynamic environments.
Start this course for free with our 10-day trial of the all-access subscription providing access to over 2,600 hours of training.
$49.00
Monthly All-Access Subscription
7 Days Free - $39.00 / month
A great option at an affordable monthly price.
Annual All-Access Subscription
$229 / year
A discounted price when paying for your All Access library on an annual basis.
Lifetime All-Access Library
$379 One time payment
Exceptional Value. Pay once, never have to buy IT training again.
$49.00
This exam prep IT course will provide you with the knowledge and skills required to configure, manage, operate, and troubleshoot a Linux environment by using security best practices, scripting, and automation computing models. This online course will teach you critical skills needed and objectives covered in the CompTIA Linux+ certification exam.
$49.00
The Ethical Hacking v10 course is the perfect platform to become an expert “White-Hat” hacker. We prepare you comprehensively with lessons and labs so that you can get certified in the EC-Council exam ECC 312-50, a globally renowned ethical hacking of networks and system penetration testing qualification.
$49.00
The CompTIA CASP + exam ascertains the knowledge and abilities essential for designing, engineering, and conceptualizing secure solutions in complex corporate scenarios for Advanced Security Practitioner. This IT course necessitates utilizing critical thinking across a vast array of security disciplines to develop and put into practice solutions that fulfill enterprise needs while also managing risk.
Unlock endless learning opportunities with over 2,500 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
Mary Beth helped me. She was wonderful.