ISACA CISM Certification badge achieved after attending the CISM Certified Information Security Manager Certification Training

Fill-star Fill-star Fill-star Fill-star Fill-star Fill-star Fill-star Fill-star Fill-star half-star

(543 Reviews)

ISACA CISM Certification Training

Excel in Information Security Management with the CISM. Gain proficiency in governance, risk management, compliance, and incident response for optimal organizational resilience.

course: ISACA CISM Certification

Duration: 4 days

Format: Virtual or Classroom

prepare-exam Prepares for Exam : Certified Information Security Manager (CISM)

certification-icon Prepares for Certification : ISACA: Certified Information Security Manager (CISM)

ktk-icon Attend this and 60+ other Security courses for FREE with Unlimited Security Training


Forge a path to success with the ISACA CISM certification, a pinnacle in Information Security Management. Gain expert training for the CISM exam, become certified, and fortify your role as a leader in protecting information assets. Propel your career to new heights with a certification that sets you apart in the cybersecurity world. Elevate your skills, advance your career and secure a future at the forefront of information security.

This course includes
  • intructor-iconInstructor-led training
  • intructor-iconPractice test
  • intructor-iconPre-reading
  • intructor-iconPersonal Learning Path
  • intructor-iconCertification Guarantee
  • intructor-iconEmail, chat and phone support

Top companies trust Readynez

Who is this course for?

Who is the ISACA CISM Certification training course for?

The ISACA CISM Certification (Certified Information Security Manager) training course is designed for IT professionals and information security managers responsible for overseeing an organization's information security program. The course covers areas such as information security governance, risk management, program development and management, incident response, and compliance. By completing the course and earning the certification, individuals demonstrate their proficiency in establishing and maintaining effective information security governance frameworks, managing risks, developing security programs, and responding to incidents. The CISM certification validates their expertise in information security management and qualifies them for leadership roles in the field.


What you will learn during our CISM course.

  • Establish and maintain an information security strategy in alignment with organizational goals and objectives to guide the establishment and ongoing management of the information security program.
  • Establish and maintain an information security governance framework to guide activities that support the information security strategy.
  • Integrate information security governance into corporate governance to ensure that organizational goals and objectives are supported by the information security program.
  • Establish and maintain information security policies to communicate management’s directives and guide the development of standards, procedures and guidelines.
  • Develop business cases to support investments in information security.
  • Identify internal and external influences to the organization (for example, technology, business environment, risk tolerance, geographic location, legal and regulatory requirements) to ensure that these factors are addressed by the information security strategy.
  • Obtain commitment from senior management and support from other stakeholders to maximize the probability of successful implementation of the information security strategy.
  • Define and communicate the roles and responsibilities of information security throughout the organization to establish clear accountabilities and lines of authority.
  • Establish, monitor, evaluate and report metrics (for example, key goal indicators [KGIs], key performance indicators [KPIs], key risk indicators [KRIs]) to provide management with accurate information regarding the effectiveness of the information security strategy.
  • Establish and maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
  • Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
  • Ensure that risk assessments, vulnerability assessments and threat analyses are conducted periodically and consistently to identify risk to the organization’s information.
  • Determine appropriate risk treatment options to manage risk to acceptable levels.
  • Evaluate information security controls to determine whether they are appropriate and effectively mitigate risk to an acceptable level.
  • Identify the gap between current and desired risk levels to manage risk to an acceptable level.
  • Integrate information risk management into business and IT processes (for example, development, procurement, project management, mergers and acquisitions) to promote a consistent and comprehensive information risk management process across the organization.
  • Monitor existing risk to ensure that changes are identified and managed appropriately.
  • Report noncompliance and other changes in information risk to appropriate management to assist in the risk management decisionmaking process.
  • Establish and maintain the information security program in alignment with the information security strategy.
  • Ensure alignment between the information security program and other business functions (for example, human resources [HR], accounting, procurement and IT) to support integration with business processes.
  • Identify, acquire, manage and define requirements for internal and external resources to execute the information security program.
  • Establish and maintain information security architectures (people, process, technology) to execute the information security program.
  • Establish, communicate and maintain organizational information security standards, procedures, guidelines and other documentation to support and guide compliance with information security policies.
  • Establish and maintain a program for information security awareness and training to promote a secure environment and an effective security culture.
  • Integrate information security requirements into organizational processes (for example, change control, mergers and acquisitions, development, business continuity, disaster recovery) to maintain the organization’s security baseline.
  • Integrate information security requirements into contracts and activities of third parties (for example, joint ventures, outsourced providers, business partners, customers) to maintain the organization’s security baseline.
  • Establish, monitor and periodically report program management and operational metrics to evaluate the effectiveness and efficiency of the information security program.
  • Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents to allow accurate identification of and response to incidents.
  • Establish and maintain an incident response plan to ensure an effective and timely response to information security incidents.
  • Develop and implement processes to ensure the timely identification of information security incidents.
  • Establish and maintain processes to investigate and document information security incidents to be able to respond appropriately and determine their causes while adhering to legal, regulatory and organizational requirements.
  • Establish and maintain incident escalation and notification processes to ensure that the appropriate stakeholders are involved in incident response management.
  • Organize, train and equip teams to effectively respond to information security incidents in a timely manner.
  • Test and review the incident response plan periodically to ensure an effective response to information security incidents and to improve response capabilities.
  • Establish and maintain communication plans and processes to manage communication with internal and external entities.
  • Conduct postincident reviews to determine the root cause of information security incidents, develop corrective actions, reassess risk, evaluate response effectiveness and take appropriate remedial actions.
  • Establish and maintain integration among the incident response plan, disaster recovery plan and business continuity plan.


How to best be prepared for our CISM Certification training.

  • [Dictionary item: Orange-check] Two years:
  • [Dictionary item: Orange-check] Valid Certified Information Systems Auditor (CISA)
  • [Dictionary item: Orange-check] Valid Certified Information Systems Security Professional (CISSP)
  • [Dictionary item: Orange-check] Master's degree in information security or a related field (e.g. business administration, information systems, information security)
  • [Dictionary item: Orange-check] One year:
  • [Dictionary item: Orange-check] One full year of experience in information systems management
  • [Dictionary item: Orange-check] Skill-based security certifications (e.g. SANS Global Information Assurance Certification (GIAC), Microsoft Certified Systems Engineer (MCSE), CompTIA Security +)
  • [Dictionary item: Orange-check] The experience cannot replace any part of the requirement of three years of work in information security management.

Meet our instructors

Meet some of the Readynez Instructors you can meet on your course. They are experts, passionate about what they do, and dedicated to give back to their industry, their field, and those who want to learn, explore, and advance in their careers.


Kevin Henry

Kevin has served for years as an authorised instructor for (ISC)2 and is renowned for his 20-year contribution to learners training for IT security skills

Kevin Henry is a well-known and highly respected expert instructor with Readynez.

Kevin has served for many years as an authorised instructor for (ISC)2 and he is renowned for his 20-year contribution to learners training for IT security skills- and certifications such as the CISSP, CSSLP, CISM, CISA and CCSP everywhere in the world.

Kevin is a force to be reckoned with, being an authorised instructor and training no less than 9.000 online learners monthly in the fields of information security and audit, in addition to the many students that attend his instructor-led courses with Readynez

He is also one of the most highly-rated instructors and most often he is given scores of 10/10 by his delegates. 


Read Less

Friedhelm Düsterhöft

Friedhelm Düsterhöft has 30+ years of work experience in IT, Information Security and Data Privacy.

Friedhelm Düsterhöft is a Senior Information Security Consultant, Auditor, Trainer and Managing Director, and has 30+ years of work experience in IT, Information Security and Data Privacy.

He has contributed to various PECB whitepapers and articles, such as ’Information Security in Banks and Financial Institutions’, ‘What Does SIEM Stand For?’, ‘Why Organizations Fail to Pass an Audit’ and “How to Integrate ISO/IEC 27032 Cybersecurity with ISMS?’.

Read Less

James Rowney

James is recognised for his more than 20 years of contribution to learning and certification within IT Security.

James has worked on many large mission critical environments in some of the largest companies in their industries.

Understanding business requirements and drivers are essential to any strategy and design. Understanding environments are key to any application or infrastructure changes, both the immediate services they interface with and those beyond. A failure to satisfy Non Functional Requirements can not be fixed by a process.

Specialties: CISSP, CCSP, AWS Solution Architect Associate, TOGAF 9 certified 86080 member of The Association of Enterprise Architects (AEA) - 27519830. BCS Solution & Enterprise Architect Certified - AMBCS - 990529878, Linux RHCE V5 expired, RHCVA Unix, Storage, SAN, Netbackup, Clusters, Design and Delivery of Infrastructure.


Read Less


FAQs for the ISACA CISM course.

The Certified Information Security Manager (CISM) certification, offered by ISACA, validates expertise in information security governance, risk management, program development, and management. It signifies a professional's ability to design and oversee an enterprise's information security program.

Prepare for CISM success with our comprehensive course. Designed by experts, our training ensures you're ready to ace the ISACA CISM Certification exam. Join Readynez and equip yourself for certification triumph. We specialize in guiding individuals and teams through effective exam preparation, helping you gain the skills and confidence needed for success in the challenging CISM certification journey.

To qualify for the Certified Information Security Manager (CISM) certification, candidates typically need:

  • A minimum of five years of work experience in information security management, with at least three years in at least three of the CISM domains.
  • Successfully pass the CISM examination.

Candidates enrolling in the CISM Exam have to pay an exam fee of $575 for ISACA members and $760 for non-members.

The Certified Information Security Manager (CISM) exam syllabus by ISACA covers four key domains related to information security management:

  • Information Security Governance (24%)
  • Information Risk Management (30%)
  • Information Security Program Development and Management (27%)
  • Information Security Incident Management (19%)

The Certified Information Security Manager (CISM) certification from ISACA is highly regarded in the field of information security and can be immensely beneficial for your career. CISM signifies expertise in information security governance, risk management, program development, and management – crucial skills in today's cybersecurity landscape. Holding this certification can enhance your professional credibility, open new career opportunities, and potentially lead to higher earning potential.

The time it takes to become Certified Information Security Manager (CISM) certified by ISACA can vary based on individual factors such as your prior experience, the time you can dedicate to studying, and your familiarity with the exam domains. On average, candidates might spend several months preparing for the CISM exam.

ISACA's CISM certification exams are computer-based and administered at authorized PSI testing centers globally or as remotely proctored exams.

The difficulty of passing the Certified Information Security Manager (CISM) exam by ISACA can vary based on individual factors such as your experience, knowledge, and preparation. The CISM exam is known for its comprehensive coverage of information security management domains, and candidates are required to demonstrate a solid understanding of governance, risk management, program development, and incident management.

Scores are calculated on a scale of 200 to 800 points; to pass the exam, you must achieve at least 450/800.

Maintaining your ISACA CISM certification involves accumulating 120 Continuing Professional Education (CPE) credits over a three-year period, with a minimum of 20 credits annually. Adherence to the ISACA Code of Professional Ethics and the payment of annual maintenance fees are essential to ensuring the continued relevance and validity of your certification.

The salary for individuals with an ISACA Certified Information Security Manager (CISM) certification can vary based on factors such as experience, location, industry, and specific job roles. On average, professionals holding a CISM certification tend to earn competitive salaries, often above the industry average for information security roles. Salaries can range from around $100,000 to well over $150,000 annually, depending on the factors mentioned.


Feedback from our CISM delegates.


Stephen Ridgway

Readynez is the best training provider I've used for many years. Their customer service is first class, prices are very competitive and instruction excellent.


Maria Simon Marcos

"I attended the CISM training with Readynez and this was the best training I've ever been to! The instructor made it extremely easy to follow, providing real life examples, and it all happened online! "

Why Pay More??

Go beyond one certification Achieve Complete Masterymedal-icon

Why settle for just one certification course when you can attend ALL certification courses for the price of less than one single course?

  • [Dictionary item: Orange-check] 60+ Courses for the price of less than one
  • [Dictionary item: Orange-check] LIVE Instructor-led courses
  • [Dictionary item: Orange-check] Expert Instructors at your fingertips
  • [Dictionary item: Orange-check] Money-back Guarantee
  • [Dictionary item: Orange-check] Flexible payment options

A perfect tool to help us develop the skills and competencies we need for success

it's-IT Kasper Meyer Christensen

A training solution so good that it pays for itself


Businesses leveraging Readynez Unlimited save at least 50% on their training and certifications - and many up to 80%

2.4 x

Unlimited license holders attend on average 2.4 courses per year

Get more for less with Unlimited Training



For the price of less than one course.



Just cheaper and more flexible.



The easiest, most flexible and cheapest way to get Certified.



Attend as many courses you want - no limitations!

Money Gaurantee


Refund provided if license costs surpass the value of your training.



Interact 1-on-1 with 50+ seasoned instructors.



Price: {{item.ItemPriceExVatFormatted}} {{item.Currency}}