CISM - Certified Information Security Manager

CISM
CISM - Certified Information Security Manager
ISBN : 978-1-61691-183-6
Gain hands-on expertise in the CISM exam with Certified Information Security Manager course. The course contains interactive lessons and test preps that covers all the domains of information security management that are information risk management, information security governance, incident management, program development and management.

Here's what you will get

The CISM exam is a standalone certification from ISACA with the exam code CISM.

ISACA CISM is accredited credential of ANSI. CISM is considered essential for ongoing education, career progression and value delivery to enterprises. CISM certified candidates have the skills to plan, and implement security management procedures. CISM certified professionals are capable of analyzing, implementing and assessing the security management principles. This one-of-a-kind credential can make you a part of the best peer network.

Lessons
5+
Exercises
530+
Quizzes
115+
Flashcards
107+
Glossary of terms
107+
Pre-assessment Questions
15+
Full Length Tests
3+
Post-Assessment Questions
150+

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Videos
347+
Hours
12:57+
Exam FAQs
What is the exam registration fee?
  • ISACA Member: USD 575
  • ISACA Non-Member: USD 760
Where do I take the exam? ISACA
What is the format of the exam? The exam consists of multiple choice questions.
What are the pre-requisites of the exam?

ISACA has the following pre-requisites for CISM:

  • Attain and report an annual minimum of twenty (20) CPE hours. These hours must be appropriate to the currency or advancement of the CISM’s knowledge or ability to perform CISM-related tasks. The use of these hours towards meeting the CPE requirements for multiple ISACA certifications is permissible when the professional activity is applicable to satisfying the job-related knowledge of each certification.
  • Submit annual CPE maintenance fees to ISACA International Headquarters in full.
  • Attain and report a minimum of one hundred and twenty (120) CPE hours for a three-year reporting period.
  • Submit required documentation of CPE activities if selected for the annual audit.
  • Comply with ISACA’s Code of Professional Ethics.
How many questions are asked in the exam? The exam contains 150 questions.
What is the duration of the exam? 240 minutes
What is the passing score? 450

(on a scale of 200-800)

What is the exam's retake policy?

Here are the retake policies:

  • Retake is allowed after registering and paying the fee of the exam for any future testing window.
  • Candidates are only permitted to take the exam one time per testing window, and if unsuccessful can register for and take the exam in the following window.
What is the validity of the certification? CISM certification expires after three years from date of issue, after which the certification holder will need to renew their certification. Click here for more information.
Where can I find more information about this exam? To know more about the CISM, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • Chief Information Officers
  • Information Security Managers
  • Information Security Consultants
  • Information Technology Consultants

Here's what you will learn

  • Security Strategy
  • Information Security Governance framework
  • Integrating security governance into corporate governance
  • Security Policies: standards, procedures, and guidelines
  • Business cases to support investments
  • Internal and external influences on information security strategy
  • Management and other stakeholder commitment
  • Roles and Responsibilities
  • Measuring the effectiveness of the information security strategy
  • Information asset classification
  • Risk management, assessments, vulnerability assessments and threat analyses
  • Risk treatment options
  • Manage risk of noncompliance
  • Information security controls
  • Current and desired risk levels: Gap analysis
  • Monitoring risk
  • Alignment of IS program with information security strategy
  • Information security manager's role and responsibilities in alignment
  • Information security frameworks
  • Information security architectures
  • Evaluating the effectiveness and efficiency of the IS program
  • Integrating the IS program with IT processes
  • Integrating the IS program into contracts and activities of third parties
  • Controls and countermeasures
  • Security Program Metrics and Monitoring
  • Organizational definition and severity hierarchy for security incidents
  • Incident response plan
  • Processes for timely identification
  • Testing and review
  • Investigating and documenting information security incidents
  • Integration of incident response plan, disaster recovery plan and business continuity plan
  • Introduction
  • Information Security Threats, Management, And Protection
  • Security Compliance And Strategy
  • Business Functions And Policies
  • Security Standards, Activities, And Strategy Development
  • Information Security Governance Framework
  • Regulatory Requirements And Liability Management
  • Business Case, Budgetary Reporting Methods And Planning Strategy
  • Organizational Drivers And Their Impacts
  • Commitment To Info Security
  • Management Roles And Responsibilities
  • Reporting And Communicating
  • Risks Assessment
  • Information: Classification, Ownership, And Resource Valuation
  • Baseline And BIAs
  • Risk: Countermeasures, Mitigation Strategies, And Life Cycle
  • Risk: Management And Reporting
  • Information Security Strategies And Programs
  • Security Technologies, Cryptography, And Access Controls
  • Monitoring Tools, Security Programs And Controls
  • Business Assurance Function And SLAs
  • Resources, Services, And Skills
  • Security Architecture, Model, And Deployment
  • Info Security: Policies, Awareness And Training Programs
  • Documentation
  • Organizational Processes
  • Contracts, Joint Ventures, Business Partners And Customers
  • Third Parties, Suppliers, And Subcontractors
  • Info Security Metrics
  • Goals And Methods Of Evaluating Info Security Controls
  • Vulnerability
  • Assessment Tools And Tracking Info Security Awareness Training And Education Programs
  • Evaluation And Management Metrics
  • Data Collection, Reviews, And Measurement
  • Assurance Providers, Line Management, Budgeting, And Staff Management
  • Facilities And Program Resources
  • Security Policy, Administrative Processes, And Procedures
  • Access Control, Access Security Policy Principles, And Identity Management
  • Authentication, Remote Access And User Registration
  • Procurement And Enforcing Policy Standard and Compliance
  • Third Party Relationships
  • SLAs, SDLC, And Security Enforcement
  • Maintenance, Monitoring, And Configuration Management
  • Maintaining Info Security And Due Diligence Activities
  • Info Access, Security Advice, Guidance, And Awareness
  • Stakeholders
  • Testing Info Security Control
  • Noncompliance Issues And Security Baselines
  • Incident Response And Continuity Of Operations
  • Disaster Recovery And Business Continuity Plan
  • Incident Management And Response Plan
  • Processes, Requirements, And Plans
  • Incident Response, Disaster Recovery And Business Continuity Plans
  • Forensics Procedures And Incident Review Process
  • Conclusion

Copyright © 2002-2017 uCertify / All Rights Reserved.