About our courses

Through years of experience working with more than 1000 top companies in the world, we ́ve architected the Readynez method for learning.
Train in any technology using the award-winning Readynez method and combine any variation of learning style, technology and place, to take learning ambitions from intent to impact.

Learn more about Readynez Training

(543 Reviews)

ISACA CISM Certification

Your personal Learning Program with everything you need to best prepare for the ISACA CISM Exam and become a Certified Information Security Manager, supported by your expert instructor.

course: ISACA CISM Certification

Duration: 4 days

Format: Virtual or Classroom

Prepares for Exam : Certified Information Security Manager (CISM)

Prepares for Certification : ISACA: Certified Information Security Manager (CISM)

The best course to get your CISM Exam and Certification - with Certification Guarantee!

Achieving the ISACA CISM certification is not an easy task, but with your Readynez Course and Learning Program we’ve done everything we can to support you from start to finish, ensuring you have the optimal conditions to succeed. That includes the best resources available to help you prepare, including relevant online courses, practice test for Exam prep, study guides, exam support and guides etc, all made easily accessible to you in our Learning Platform. If you select our Virtual Training option, you also contribute to a more sustainable world with a reduction in CO2 emission of 96% compared to the in-classroom option.

  • Includes a comprehensive set of Learning materials for the best possible Exam prep
  • Includes Practice Tests providing 500 unique Practice Questions
  • Includes access to Online CISM Course from Pluralsight written by Kevin Henry
  • Full support available helping you register, prepare for and sit your exam

Who is the ISACA CISM Certification training course for?

The ISACA CISM Certification (Certified Information Security Manager) training course is designed for IT professionals and information security managers responsible for overseeing an organization's information security program. The course covers areas such as information security governance, risk management, program development and management, incident response, and compliance. By completing the course and earning the certification, individuals demonstrate their proficiency in establishing and maintaining effective information security governance frameworks, managing risks, developing security programs, and responding to incidents. The CISM certification validates their expertise in information security management and qualifies them for leadership roles in the field.

Feedback from our CISM delegates

Stephen Ridgway

Readynez is the best training provider I've used for many years. Their customer service is first class, prices are very competitive and instruction excellent.

Maria Simon Marcos

"I attended the CISM training with Readynez and this was the best training I've ever been to! The instructor made it extremely easy to follow, providing real life examples, and it all happened online! "

Everything you need to get the results you want

Your Personal Learning Program will provide the skills you need, to help you do more of what you love. The 3-step learning program is built to teach you real applicable skills that open opportunities for you.

How we get you certified

Readynez365: Your Personal Learning Program

The Readynez365 platform provides an enhanced digital pathway for all your learning elements, from pre-studies to exam, making it the most direct route to new tech Skills. Pick what you want (and need) to get up to speed. It´s all laid out for you in Readynez365 well in advance of your courses.

Prepared Logo
Learning Designed For The Virtual Classroom

The training methodology is designed for the virtual classroom to inspire and engage you with a variation of hands-on training, presentations, labs and tests. You’ll also be glad to know that Virtual instructor-led training is loved by managers - it is the most cost-effective way to train.

Virtual Learning Logo
Expert Mentoring That Get’s You All The Way

There´s a maximum number of learners in the class to ensure your easy access to personal coaching. You’ll meet accredited expert instructors that are seasoned IT Professionals and Consultants certified to the highest level and bringing real-world experience into the classroom.

Expert Logo
Exam & Skills Focus

We´ll cover the ins and outs of the subject so that you can apply it in your day-to-day work, and you’ll even learn the specifics that you need to know for the exam. It’s your choice whether to sit the exam, or not, but with our detailed guides and hotline, we’ll make it easy to access your exam voucher, and schedule and sit the exam online

Social Learning Logo
Certification Guarantee

Your access to training is unlimited and you can train as much as you want until you successfully pass your exam.

Sustainable Learning - Train with a Clear Conscience

Train with a clear conscience with training that makes a 96% lower carbon footprint compared to in-classroom training. Our organisation operates with minimal environmental impact and we´ve reduced our Co2 emission with 96% since 2020.We are compliant with the ISO 14001 throughout our entire supply chain as your guarantee for our sustainable business practices.

What you will learn during our CISM course

- Establish and maintain an information security strategy in alignment with organizational goals and objectives to guide the establishment and ongoing management of the information security program.
- Establish and maintain an information security governance framework to guide activities that support the information security strategy.
- Integrate information security governance into corporate governance to ensure that organizational goals and objectives are supported by the information security program.
- Establish and maintain information security policies to communicate management’s directives and guide the development of standards, procedures and guidelines.
- Develop business cases to support investments in information security.
- Identify internal and external influences to the organization (for example, technology, business environment, risk tolerance, geographic location, legal and regulatory requirements) to ensure that these factors are addressed by the information security strategy.
- Obtain commitment from senior management and support from other stakeholders to maximize the probability of successful implementation of the information security strategy.
- Define and communicate the roles and responsibilities of information security throughout the organization to establish clear accountabilities and lines of authority.
- Establish, monitor, evaluate and report metrics (for example, key goal indicators [KGIs], key performance indicators [KPIs], key risk indicators [KRIs]) to provide management with accurate information regarding the effectiveness of the information security strategy.

- Establish and maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
- Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
- Ensure that risk assessments, vulnerability assessments and threat analyses are conducted periodically and consistently to identify risk to the organization’s information.
- Determine appropriate risk treatment options to manage risk to acceptable levels.
- Evaluate information security controls to determine whether they are appropriate and effectively mitigate risk to an acceptable level.
- Identify the gap between current and desired risk levels to manage risk to an acceptable level.
- Integrate information risk management into business and IT processes (for example, development, procurement, project management, mergers and acquisitions) to promote a consistent and comprehensive information risk management process across the organization.
- Monitor existing risk to ensure that changes are identified and managed appropriately.
- Report noncompliance and other changes in information risk to appropriate management to assist in the risk management decision-making process.

- Establish and maintain the information security program in alignment with the information security strategy.
- Ensure alignment between the information security program and other business functions (for example, human resources [HR], accounting, procurement and IT) to support integration with business processes.
- Identify, acquire, manage and define requirements for internal and external resources to execute the information security program.
- Establish and maintain information security architectures (people, process, technology) to execute the information security program.
- Establish, communicate and maintain organizational information security standards, procedures, guidelines and other documentation to support and guide compliance with information security policies.
- Establish and maintain a program for information security awareness and training to promote a secure environment and an effective security culture.
- Integrate information security requirements into organizational processes (for example, change control, mergers and acquisitions, development, business continuity, disaster recovery) to maintain the organization’s security baseline.
- Integrate information security requirements into contracts and activities of third parties (for example, joint ventures, outsourced providers, business partners, customers) to maintain the organization’s security baseline.
- Establish, monitor and periodically report program management and operational metrics to evaluate the effectiveness and efficiency of the information security program.

- Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents to allow accurate identification of and response to incidents.
- Establish and maintain an incident response plan to ensure an effective and timely response to information security incidents.
- Develop and implement processes to ensure the timely identification of information security incidents.
- Establish and maintain processes to investigate and document information security incidents to be able to respond appropriately and determine their causes while adhering to legal, regulatory and organizational requirements.
- Establish and maintain incident escalation and notification processes to ensure that the appropriate stakeholders are involved in incident response management.
- Organize, train and equip teams to effectively respond to information security incidents in a timely manner.
- Test and review the incident response plan periodically to ensure an effective response to information security incidents and to improve response capabilities.
- Establish and maintain communication plans and processes to manage communication with internal and external entities.
- Conduct post-incident reviews to determine the root cause of information security incidents, develop corrective actions, reassess risk, evaluate response effectiveness and take appropriate remedial actions.
- Establish and maintain integration among the incident response plan, disaster recovery plan and business continuity plan.

Meet our instructors

Meet some of the Readynez Instructors you can meet on your course. They are experts, passionate about what they do, and dedicated to give back to their industry, their field, and those who want to learn, explore, and advance in their careers.

Kevin Henry

Kevin has served for years as an authorised instructor for (ISC)2 and is renowned for his 20-year contribution to learners training for IT security skills

Friedhelm Düsterhöft

Friedhelm Düsterhöft has 30+ years of work experience in IT, Information Security and Data Privacy.

James Rowney

James is recognised for his more than 20 years of contribution to learning and certification within IT Security.

How to best be prepared for our CISM course

At Readynez, we provide many resources and have experienced experts in the field. That is why we are also very successful with many satisfied customers. You can therefore safely take your course with us. There are no formal requirements to participate in the CISM course, but to obtain the certification you must, in addition to passing your CISM exam, be able to document that the following prerequisites are in place:

Submit verified evidence of at least five years of work in information security, with at least three years of information security management work in three or more of the 4 domain areas.

The work experience must have been acquired within the 10 years preceding the date of application for certification or within 5 years from the date the exam was originally passed.

Compensation for experience

The following security-related certifications and experience in information systems can be used to fulfill the listed amount of information security work.

Two years:

  • Valid Certified Information Systems Auditor (CISA)
  • Valid Certified Information Systems Security Professional (CISSP)
  • Master's degree in information security or a related field (e.g. business administration, information systems, information security)

One year:

  • One full year of experience in information systems management
  • Skill-based security certifications (e.g. SANS Global Information Assurance Certification (GIAC), Microsoft Certified Systems Engineer (MCSE), CompTIA Security +)
  • The experience cannot replace any part of the requirement of three years of work in information security management.

Our track record

With 15 years experience and more than 50.000 happy customers from all over the world, companies such as ALSO, ATEA, Microsoft, Serco, and many more, trust Readynez to help them train and certify their staff.

  • Top rated courses, with learners most often rating their training 10/10
  • Globally recognized expert instructors, many of which are MVP's
  • 50.000 delegates trained and certified
  • Trusted provider of large training projects for many large companies

These are just some of the many major brands trusting Readynez.

Others also attended

ISC2 CISSP - Certified Information Systems Security Professional

CISSP is the gold standard credential to pursue for IT security professionals. It remains at the very top of the game and is a requirement for a majority of senior IT security roles. The CISSP certification proves you have the advanced skills, knowledge and commitment required, to command higher wages. The challenging standards require students to have at least 5 years of experience in two of the eight (ISC)2 domains. Additionally, you must complete a 100-150 multiple choice- and advanced innovative questions exam in order to be officially certified. This is no walk in the park and that’s why the Readynez CISSP course- and certification program is taught by experts who will work with you before, during and after your course to ensure you're best prepared for the exam. Although a difficult process, the return on investment makes it one of the most highly sought after courses available.

ISC2 CCSP - Certified Cloud Security Professional

Achieving the ISC2 Certified Cloud Security Professional certification is not an easy task, but with your Readynez Course and Learning Program we’ve done everything we can to support you from start to finish, ensuring you have the optimal conditions to succeed. That includes the best resources available to help you prepare, including relevant online courses, practice test for Exam prep, study guides, exam support and guides etc, all made easily accessible to you in our Learning Platform. If you select our Virtual Training option, you also contribute to a more sustainable world with a reduction in CO2 emission of 96% compared to the in-classroom option.



ISACA’s Certified Information Security Manager (CISM) certification demonstrates expertise in multiple information security disciplines, like governance, program development and management, incident management and risk management.

The ISACA CISM exam is a 200-question multiple-choice test that covers these topics: Information Security Governance (17%), Information Security Risk Management (20%), Information Security Program (33%) and Incident Management (30%).

ISACA’s Certified Information Security Manager (CISM) certification is for those with technical expertise and experience in IS/IT security and control and wants to make the move from team player to manager. 

To be eligible for the exam, candidates must have a minimum of five years of verified experience in the information security field, with at least three years of management experience in three or more of the CISM content areas. Experience must have been acquired within a ten-year period preceding the application deadline or within five years of passing the exam.

You must meet the following requirements to achieve the ISACA CISM certification.

  • Have passed the CISM Exam within the last 5 years
  • Have the relevant full-time work experience
  • Submit the CISM Certification Application including the application fee

You will learn the following:

  • Introduction to Information Security Governance
  • Security Strategy Development
  • Risk Management Concepts
  • Implementing a Risk Management Programme
  • Risk Management Life Cycle
  • Operational Risk Management
  • Information Security Programmes
  • Security Programme Management
  • Security Programme Operations
  • IT Service Management
  • Controls
  • Metrics and Monitoring
  • Security Incident Response Overview
  • Incident Response Plan Development
  • Responding to Security Incidents
  • Business Continuity and Disaster Recovery Planning

The ISACA CISM Certification exam cost $760 and $575 for ISACA members.

The CISM exam is not included in your Readynez course. 

The CISM credential has a three-year validity period. If you wish to maintain the credential, an annual maintenance fee of $45 is required if you are an ISACA member.

Typical job roles for people holding this certification are:

  • Information Security Manager
  • Chief Information Officer
  • Information Compliance Risk Specialist
  • Information System Security Officer
  • Information/Privacy Risk Consultant

The syllabus for the CISM exam includes the following domains:

  • Information Security Governance (17%)
  • Information Security Risk Management (20%)
  • Information Security Program (33%)
  • Incident Management (30%)

The Virtual Classroom is an online room, where you will join your instructor and fellow classmates in real time. Everything happens live and you can interact freely, discuss, ask questions, and watch your instructor present on a whiteboard, discuss the courseware and slides, work with labs, and review.

Yes, you can sit exams from all the major Vendors like Microsoft, Cisco etc from the comfort of your home or office.

With Readynez you do any course form the comfort of your home or office. Readynez provides support and best practices for your at-home classroom and you can enjoy learning with minimal impact on your day-to-day life. Plus you'll save the cost and the environmental burden of travelling.

Well, learning is limitless, when you are motivated, but you need the right path to achieve what you want. Readynez consultants have many years of experience customizing learner paths and we can design one for you too. We are always available with help and guidance, and you can reach us on the chat or write us at info@readynez.com.



Price: {{item.ItemPriceExVatFormatted}} {{item.Currency}}