CISM - Certified Information Security Manager
Build a Strategic Team
Prove you can manage information security programs
and become a strategic asset to enterprise leadership.
ISACA’s Certified Information Security Manager (CISM) certification indicates expertise in information security governance, program development and management, incident management and risk management. Take your career out of the technical realm to management!
Why Choose Us?
- We are an affiliate partner of ISACA Lahore Chapter
- 32 hours of instructor led training per batch
- ISACA Accredited instructors with relevant industry’s experience
- Digital Copy of ISACA Exam Review Manual included
- Official CISM Review questions & Explanation database
- 90% pass rate
- Course Completion Certificate
- Industry-based case studies
- Instructor’s assistance, when needed
CISM (Certified Information Security Manager) is a key certification for information security professionals who manage, design, oversee, and assess enterprise information security. This CISM certification course, closely aligned with ISACA’s best practices, helps you learn about IT security systems.
Training Options
Online Boot Camp
- Live, online classroom training by top instructors and practitioners
- Enterprise grade Learning Management System (LMS)
Corporate Training
- Customized to your team’s needs
- On-premises or live, online classroom training by top instructors and practitioners
- Enterprise grade Learning Management System (LMS)
Course Curriculum
The CISM certification promotes international practices and validates your knowledge and experience around effective security management and consulting. The four CISM domains include:
- Security governance: To effectively address the challenges of protecting an organization’s assets, senior management must define the desired outcomes of the information security program.
- Risk management: Asset classification and valuation is an essential part of an effective risk management program — the greater the value, the greater the impact, the greater the risk.
- Information security program development and management: The purpose of this area is to implement management’s governance strategy — the “due diligence” and “due care” of protecting the corporation’s assets.
- Information security incident management: This area focuses on effectively managing unexpected (and expected) events, which may or may not be disruptive, and can be summed up in five words: identify, protect, detect, respond and recover.
Who Should Attend
- Information security managers
- Information security consultants
- Chief information officers
- Chief information security officers
- Anyone interested in learning information security management skills and getting certified
Looking for Training, we know how
Either you are looking for individual or corporate training, we are here to help you.