Certified Information Security Manager (CISM)

Become a Certified Information Security Manager

IT Security is without question one of the hottest and most lucrative areas of Information Technology today and the CISM is one of the most valued credentials in the marketplace. This course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management.

A hand with a glowing lock on it.

Job Outlook for Information Security Analysts

According the Bureau of Labor Statistics the employment of information security analysts is expected to grow 31% during the next few years, which equals 40,900 new jobs.

The BLS also states that the average salary for these analysts is just under $104,000 per year with top earners making nearly $164,000.

  • Module 1: Information Security Governance
    Module 2: Risk Management
    Module 3: Information Security Program Development
    Module 4: Information Security Program Implementation
    Module 5: Information Security Program Management
    Module 6: Incident Management and Response

Course Objectives

Identify the tasks within the information security governance job practice area

Recognize the outcomes of information security governance

Recognize the difference between corporate governance and information security governance

Match senior management roles with their corresponding responsibilities related to information security governance

Identify the elements of the information security business model

Recognize the interconnections between the elements of the information security business model

Recognize key concepts related to information security governance

Identify the optimal reporting relationship between senior management and the information security manager

Label examples of reports about information security according to their intended recipients within an organization

Identify the goal of converging security-related functions

Identify categories of key goal indicators

Recognize key concepts related to information security management

Prerequisites and Requirements

There are no prerequisites to take this course.

This course can be taken on either a PC or Mac.

Instructor

Brandon Smith