ISACA CISM
Master everything you need to know in order to pass the ISACA CISM certification exam.
PURCHASE NOW
Course Introduction
In today’s enterprise environments, information security requires more than technical defenses—it demands strong governance, risk management, and alignment with business strategy. This course prepares you for the Certified Information Security Manager (CISM) certification from ISACA, validating your ability to design, manage, and oversee enterprise information security programs that support organizational objectives.
You’ll begin with Information Security Governance, where you’ll learn how to establish and maintain an effective security governance framework. This includes aligning security strategies with business goals, defining roles and responsibilities, developing policies, and ensuring that information security initiatives support overall organizational direction.
Next, in Information Risk Management, you’ll focus on identifying, assessing, and managing information security risks across the enterprise. You’ll learn how to conduct risk assessments, prioritize mitigation strategies, and integrate risk management practices into broader organizational processes to ensure informed decision-making.
The Information Security Program Development and Management module explores how to design, implement, and manage a comprehensive information security program. You’ll learn how to allocate resources, implement security controls, measure program effectiveness, and continuously improve security operations while maintaining alignment with business needs.
Finally, in Incident Management, you’ll develop the skills needed to plan for, detect, respond to, and recover from security incidents. This includes building incident response capabilities, coordinating response efforts, minimizing business impact, and ensuring lessons learned are incorporated into future security improvements.
By the end of this course, you’ll be prepared to lead and manage enterprise information security initiatives—demonstrating the strategic, governance, and risk management expertise required to confidently earn your CISM certification and operate as a senior information security manager.
What you'll learn
Information Security Governance
Identify and assess information security risks using structured risk management practices to prioritize mitigation strategies and support informed decision-making.
Enterprise Information Risk Management
Identify and assess information security risks using structured risk management practices to prioritize mitigation strategies and support informed decision-making.
Security Program Development & Management
Design and manage a comprehensive information security program that includes policies, standards, and controls to support organizational security objectives.
Security Operations & Incident Management
Develop and coordinate incident management processes to detect, respond to, and recover from security incidents while minimizing business impact.
Compliance, Governance & Regulatory Alignment
Ensure information security programs align with legal, regulatory, and contractual requirements while supporting enterprise governance frameworks.
Security Strategy & Organizational Leadership
Lead information security initiatives across the enterprise, integrating security into business processes and organizational decision-making.
Course Pricing
LIFETIME ACCESS
WHATS INCLUDED
Course Curriculum
Example Curriculum
- Information Security Governance Intro (21:15)
- Information Security Governance Overview (19:31)
- Effective Information Security Governance (30:12)
- Governance and Third-party Relationships (1:44)
- Information Security Governance Metrics (41:21)
- Information Security Strategy Overview (6:23)
- Common Pitfalls (2:54)
- Information Security Strategy Objectives (37:50)
- Determining Current State of Security (8:17)
- Information Security Strategy Development (16:06)
- Strategy Resources (40:17)
- Strategy Constraints (28:08)
- Action Plan to Implement Strategy (30:25)
- Implementing Security Governance Example (6:38)
- Action Plan Intermediate Goals (3:30)
- Information Security Program Objectives (3:42)
- Domain 1 Practice Questions (14:52)
- Domain 2 Exam Relevance (9:48)
- Risk Management Overview (16:30)
- Risk Management Strategy (0:49)
- Effective Information Security Risk Management (4:31)
- Information Security Risk Management Concepts (20:11)
- Implementing Risk Management (15:14)
- Recovery Time Objectives (15:14)
- Risk Assessment (44:53)
- Information Resource Valuation Methodologies (8:00)
- Integration with Life Cycle Processes (3:14)
- Security Control Baselines (1:58)
- Reporting Significant Changes in Risk (2:11)
- Training and Awareness (1:25)
- Documentation (5:44)
- Domain 2 Practice Questions (12:59)
- Domain 3 Exam Relevance (6:04)
- Information Security Program Management Overview (6:04)
- Information Security Program Objectives (2:09)
- Information Security Program Concepts (17:35)
- Scope and Charter of an Information Security Program (2:28)
- The Information Security Management Framework (6:34)
- Defining an Information Security Program Road Map (8:18)
- Operational Components (6:13)
- Information Infrastructure and Architecturre (5:23)
- Architecture Implementation (2:21)
- Personnel, Roles and Responsibilities and Skills (37:57)
- Information Security Liaison Responsibilities (5:50)
- Controls and Countermeasures (18:20)
- Security Program Metrics and Monitoring (4:19)
- Common Information Security Program Challenges (2:58)
- Domain 3 Practice Questions (15:16)
- Domain 4 Exam Relevance (15:11)
- Incident Management Overview (4:02)
- Incident Response Procedures (15:41)
- Incident Management Organization (9:56)
- Incident Management Resources (23:04)
- Defining Objectives (6:57)
- Performance Measurement (3:08)
- Defining Incident Management Procedures (8:42)
- Current State of Incident Response Capability (3:32)
- Developing an Incident Response Plan (18:28)
- Business Continuity and Disaster Recovery Plans (33:05)
- Ensuring Execution as required (2:39)
- Postincident Activities and Investigation (5:35)
- Domain 4 Practice Questions (12:58)
Start Your Learning
Journey Today
Learn how to govern, manage risk, and lead enterprise information security programs aligned with business objectives.





