cism 1

Certified Information Security Manager

cism 1

Certified Information Security Manager® (CISM®) affirms your ability to assess risks, implement effective governance, and proactively respond to incidents. With a highlight on emerging technologies such as AI and blockchain, it guarantees your skillset meets evolving security threats and industry requirements. By addressing top-of-mind concerns like data breaches and ransomware attacks, crucial for IT professionals, this certification ensures you are staying ahead of the pace of change.

Course Content

Domain 1: Information Security Governance
Lesson 1.1: Governance Framework Development
5 Topics
1 Quiz
Roles of board, executives, and security steering committees
Developing and maintaining the information security strategy plan
Establishing a security governance organizational structure
Domain 1, Lesson 1.1: Governance Framework Development
Lesson 1.2: Laws & Regulations
5 Topics
1 Quiz
GDPR, CCPA, HIPAA compliance mapping
Industry standards (PCI DSS, ISO 27001) integration
Legal and regulatory compliance requirements analysis
Contractual and third-party agreement compliance
Privacy principles and data protection impact assessments
Domain 1, Lesson 1.2: Laws & Regulations
Lesson 1.3: Security Metrics & Reporting
5 Topics
1 Quiz
KRIs and KPIs for security governance
Dashboard development for executive communication
Defining and collecting baseline and performance metrics
Analyzing and reporting on governance effectiveness
Using metrics to drive strategic security investments
Domain 1, Lesson 1.3: Security Metrics & Reporting
Domain 2: Information Security Risk Management
Lesson 2.1: Risk Assessment Methodologies
5 Topics
1 Quiz
Qualitative vs. quantitative risk analysis (FAIR, OCTAVE)
Third-party risk management (TPRM) frameworks
Asset identification and valuation methodologies
Threat modeling and vulnerability analysis techniques
Risk identification, analysis, and evaluation processes
Domain 2, Lesson 2.1: Risk Assessment Methodologies
Lesson 2.2: Risk Treatment Strategies
5 Topics
1 Quiz
Risk appetite vs. tolerance statements
Insurance, outsourcing, and risk transfer options
Risk mitigation, avoidance, and acceptance strategies
Implementing and managing risk treatment plans
Continuous monitoring and review of risk treatment effectiveness
Domain 2, Lesson 2.2: Risk Treatment Strategies
Lesson 2.3: Emerging Risk Landscape
5 Topics
1 Quiz
Cloud security risks (Shared Responsibility Model)
AI/ML threat modeling
IoT and OT (Operational Technology) security challenges
Managing risks from remote work and BYOD policies
Geopolitical and supply chain risk considerations
Domain 2, Lesson 2.3: Emerging Risk Landscape
Domain 3: Information Security Program
Lesson 3.1: Program Development & Management
5 Topics
1 Quiz
Security awareness training strategies (phishing simulations)
Secure SDLC integration (DevSecOps)
Defining the program roadmap and strategic objectives
Security program scope and charter development
Program communications and stakeholder engagement
Domain 3, Lesson 3.1: Program Development & Management
Lesson 3.2: Security Controls Implementation
5 Topics
1 Quiz
Technical controls (DLP, SIEM, PAM)
Administrative controls (policies, procedures)
Physical and environmental security controls
Control testing, evaluation, and assurance methods
Domain 3, Lesson 3.2: Security Controls Implementation
Lesson 3.3: Resource & Budget Management
5 Topics
1 Quiz
Security ROI calculation
Vendor management (MSSPs, cloud providers)
Building and justifying the security budget
Security team structure, roles, and competency development
Domain 3, Lesson 3.3: Resource & Budget Management
Domain 4: Incident Management
Lesson 4.1: Incident Response Planning
5 Topics
1 Quiz
NIST SP 800-61 incident handling phases
Tabletop exercise design
Developing the Incident Response Plan (IRP) and playbooks
Establishing the Computer Security Incident Response Team (CSIRT)
Incident classification and severity categorization schemes
Domain 4, Lesson 4.1: Incident Response Planning
Lesson 4.2: Business Continuity Integration
5 Topics
1 Quiz
RTO/RPO determination
Disaster recovery testing methods
Crisis communication and public relations management
Identifying and protecting mission-critical assets and processes
Domain 4, Lesson 4.2: Business Continuity Integration
Lesson 4.3: Post-Incident Activities
5 Topics
1 Quiz
Root cause analysis (5 Whys, Fishbone)
Lessons learned workshops
Evidence preservation and forensic analysis coordination
Legal, regulatory, and contractual notification requirements
Implementing corrective actions and tracking to closure
Domain 4, Lesson 4.3: Post-Incident Activities