The Information Security Management Series is a structured progression of stackable credentials designed to provide participants with specialized knowledge and skills in various areas of information security management. By segmenting the original Certified Information Security Manager (CISM) Training Program, learners have the flexibility to acquire expertise in specific areas, earn micro-credentials for each module, and progressively stack them towards the full CISM certification.
Each module consists of lectures, practical sessions, case studies, and interactive discussions. Real-world insights are provided through engagement with industry professionals.
1. Understand and apply the principles of information security management.
2. Identify and analyze potential risks and threats to information security and devise strategies to mitigate these risks.
3. Develop and implement effective information security policies and procedures.
4. Manage various aspects of information security including data privacy, cybersecurity, incident response, and disaster recovery.
5. Understand the legal, ethical, and professional issues related to information security.
6. Effectively communicate information security concepts and issues to all levels of an organization, including senior executives.
7. Demonstrate readiness to take and pass the CISM certification exam.
Duration: 35 hours
Description:
Establish and manage the information security governance framework and supporting processes.
Learning Outcome:
Understand and apply the principles of information security governance; communicate these concepts effectively within an organization.
Duration: 40 hours
Description:
Identify and manage information security risks to achieve business objectives.
Learning Outcome:
Identify and analyze potential risks and threats to information security; devise and implement strategies to mitigate these risks.
Duration: 35 hours
Description:
Establish and manage the information security program.
Learning Outcome:
Develop and implement effective information security policies and procedures; understand the ethical and professional issues related to program development.
Duration: 40 hours
Description:
Plan, establish, and manage the capability to respond to and recover from information security incidents.
Learning Outcome:
Manage various aspects of information security including incident response and disaster recovery; communicate incident-related issues to all organizational levels.
Once participants successfully complete all four modules and pass the associated micro-credential assessments, they will be eligible to sit for the CISM certification exam. Upon passing the examination, the student becomes a Certified Information Security Manager (CISM) as issued by ISACA, a globally recognized validation of expertise in information security management.
Assessment Method: The program uses continuous assessment via quizzes and assignments at the end of each module and a final project presentation.