CISM Exam Preps


This Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge, practice, and copious amounts of experience in the field of information security management.

The demand for skilled information security management professionals is increasing, hence this credential fulfills business needs. CISM has been accepted as the universal standard to strive towards within the sphere of information security, 

Who is this course intended for?

This training course is designed for experienced Information Security Managers, and others involved in directing information security programs. This course would particularly benefit Information Security Managers, aspiring Information Security Managers, IT Consultants, and Chief Information Officers.



There are no prerequisites for this CISM training course, however, candidates will thrive if they have some information security experience.


Training Outline

This CISM training course covers the following areas:

Introduction to Certified Infromation Security Manager (CISM)

  • Objectives and Expectations

  • What is Information Security?

  • The Goals of Information Security

  • Principles for Information Security Professionals

Domain 1 – Information Security Governance

  • Outline

  • Knowledge Statements

  • Introduction to Information Security Governance

  • Effective Information Security Governance

  • Governance and Third Party Relationships

  • Information Security Metrics

  • Information Security Governance Metrics

  • Information Security Strategy

  • Information Security Strategy Development

  • Strategy Resources and Constraints

  • Other Frameworks

  • Compliances

  • Action Plans to Implement Strategy

  • Governance of Enterprise IT


Domain 3 – Information Security Program Development and Management

  • Task and Knowledge Statements

  • Information Security Program Management Overview

  • Information Security Program Objectives

  • Information Security Program Concepts

  • Information Security Program Technology Resources

  • Information Security Program Development

  • Information Security Program Framework

  • Information Security Program Roadmap

  • Enterprise Information Security Architecture (EISA)

  • Security Program Management and Administration

  • Security Program Services and Operational Activities

  • Controls

  • Security Program Metrics and Monitoring

  • Measuring Operational Performance

  • Common Information Security Program Challenges

Domain 4 – Information Security Incident Management

  • Task and Knowledge Statements

  • Incident Management Overview

  • Incident Management Procedures

  • Incident Management Resources

  • Incident Management Objectives

  • Incident Management Metrics and Indicators

  • Defining Incident Management Procedures

  • Business Continuity and Disaster Recovery Procedures

  • Post Incident Activities and Investigation

Domain 2 – Information Risk Management and Compliance

  • Information Risk Management

  • Task and Knowledge Statements

  • Risk Management Overview

  • Risk Assessment

  • Information Asset Classification

  • Assessment Management

  • Information Resource Valuation

  • Recovery Time Objectives

  • Security Control Baselines

  • Risk Monitoring

  • Training and Awareness

  • Information Risk Management Documentation​

Pay for CISM Class Here

 Email:  Address:  (Ghana) Achiaa Hse (Eco-Bank Building, New Achimota, Accra

© 2021 by  CYBERGHANA CyberLabs. 

Digital Adress: GW-1007-4724
  • White Twitter Icon
  • White Google+ Icon