Learn to assess risks, implement effective governance and respond proactively to incidents.
Schönbrunn TASC is an ISACA accredited training organization (ATO). This means that you have access to official ISACA course materials and can take your CISM® exam during the course at the Schönbrunn TASC training center. If you do not pass the exam on your first attempt (which we do not expect), our performance guarantee covers you - this means you train for free the second time.
- You learn in small groups (max. 10 participants per course)
- In-house modern training room and test center in a distraction-free, quiet atmosphere (PSI/ Pearson Vue/ Kryterion)
- Experienced, constantly trained and ISACA accredited trainers guide you through the course
- You will receive comprehensive official ISACA training materials, manuals and case studies for self-study
- interactive discussions and group work to help you apply your knowledge
- A light breakfast, lunch, snacks and drinks are provided throughout the day
- hotel recommendations near the training and test center
- it is possible to take the exam at the Schönbrunn TASC test center afterwards**
There are no prescribed prerequisites to participate in the CISM®course and take the exam.
- Information Security Consultant
- Information Security Auditor
- IT Security Manager
- IT Security Consultant
- IT Manager
Domain 1- Information Security Governance
- Enterprise Governance Overview
- Organizational Culture, Structures, Roles and Responsibilities
- Legal, Regulatory and Contractual Requirements
- Information Security Strategy
- Information Governance Frameworks and Standards
- Strategic Planning
Domain 2- Information Security Risk Management
- Emerging Risk and Threat Landscape
- Vulnerability and Control Deficiency Analysis
- Risk Assessment and Analysis
- Risk Treatment/ Risk Response Options
- Risk and Control Ownership
- Risk Monitoring and Reporting
Domain 3- Information Security Program
A- Information Security Program Development
- Information Security Program Resources (People, Tools, Technologies)
- Information Asset Identification and Classification
- Industry Standards and Frameworks for Information Security
- Information Security Policies, Procedures and Guidelines
- Information Security Program Metrics
B- Information Security Program management
- Information Security Control Design and Selection
- Information Security Control Implementation and Integrations
- Information Security Control Testing and Evaluation
- Information Security Awareness and Training
- Management of External Services (e.g., Providers, Suppliers, Third Parties, Fourth Parties)
- Information Security Program Communications and Reporting
Domain 4- Incident Management
A-INCIDENT MANAGEMENT READINESS
- Incident Response Plan
- Business Impact Analysis (BIA)
- Business Continuity Plan (BCP)
- Disaster Recovery Plan (DRP)
- Incident Classification/Categorization
- Incident Management Training, Testing and Evaluation
B-INCIDENT MANAGEMENT OPERATIONS
- Incident Management Tools and Techniques
- Incident Investigation and Evaluation
- Incident Containment Methods
- Incident Response Communications (e.g., Reporting, Notification, Escalation)
- Incident Eradication and Recovery
- Post-Incident Review Practices
ISACA exam CISM®- Certified Information Security Manager®
Duration: 4 hours
Number of questions: 150
Format: Multiple Choice
Languages: English, Chinese (simplified), Japanese, and Spanish
Test areas:
- Information Security Governance (17%)
- Information Security Risk Management (20%)
- Information Security Program (33%)
- Incident Management (30%)
Requirements for CISM® certification
To obtain the CISM certification, you must fulfill the following requirements:
- Successful completion of the CISM®- Certified Information Security Manager® exam.
- Adherence to the ISACA Code of Professional Ethics
- Agreement to maintain the Continuing Professional Education (CPE) program
- At least five years of professional experience in the field of information security
Two years of professional experience
- Certified Information Systems Auditor (CISA) in good professional standing
- Certified Information Security Professional (CISSP) in good professional standing
- Academic degree in information security or a related field (e.g. business administration, information systems, information assurance)
and
One year of professional experience
- in information systems management
- in the field of general security management
- Security certifications based on the required skills (for example SANS or GIAC, Microsoft Certified Solutions (MCSE), CompTIA Security +, Disaster, Recovery Institute Certified Business Continuity Professional (CBCP), ESL IT Security Manager)
- Attendance and completion of an information security management program aligned with the model curriculum.
Exception
Two years of work in teaching as a full-time university faculty member in information security management may be accepted in lieu of one year of professional experience in information security.
Are you unsure whether you meet the requirements? We'd be happy to discuss your technical background, experience and qualifications to find out if this intensive course is right for you.
Find your date for
Certified Information Security Manager® (CISM®)
Buchen Sie noch heute online oder rufen Sie uns an unter +49 7031 2024742, wenn Sie Hilfe bei der Auswahl des richtigen Kurses benötigen oder über Firmenrabatte sprechen möchten.
Available
Few seats
Fully booked
Guaranteed date