{"id":2539,"date":"2021-12-30T16:26:33","date_gmt":"2021-12-30T13:26:33","guid":{"rendered":"https:\/\/esi.edu.sa\/?post_type=courses&#038;p=2539"},"modified":"2026-02-04T17:50:07","modified_gmt":"2026-02-04T14:50:07","slug":"certified-information-security-manager-cism","status":"publish","type":"courses","link":"https:\/\/esi.edu.sa\/en\/courses\/certified-information-security-manager-cism\/","title":{"rendered":"Certified Information Security Manager (CISM\u00ae)"},"content":{"rendered":"<h2 style=\"text-align: justify;\"><img decoding=\"async\" class=\"alignnone wp-image-20027\" src=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png\" alt=\"\" width=\"188\" height=\"40\" srcset=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png 300w, https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy-50x11.png 50w\" sizes=\"(max-width: 188px) 100vw, 188px\" \/><\/h2>\n<h2 style=\"text-align: justify;\">Course Overview<\/h2>\n<p style=\"text-align: justify;\">Certified Information Security Manager (CISM\u00ae) is a key certification for information security professionals who manage, design, oversee, and assess enterprise information security. This CISM certification course is closely aligned with ISACA&#8217;s best practices and will help you learn about IT security systems, including risk analysis and the best ways to mitigate security risks.<\/p>\n<h2 style=\"text-align: justify;\">Target Audience<\/h2>\n<p style=\"direction: ltr;\"><span style=\"font-size: inherit;\">This certification is best suited for security consultants and managers, IT directors<\/span><\/p>\n<p style=\"direction: ltr;\"><span style=\"font-size: inherit;\">and managers, security auditors and architects, security system engineers, CISOs,<\/span><\/p>\n<p style=\"direction: ltr;\"><span style=\"font-size: inherit;\">information security managers, IT consultants, and risk officers.<\/span><\/p>\n<h2 style=\"text-align: justify;\">Course Objectives<\/h2>\n<p style=\"direction: ltr;\"><span style=\"font-size: inherit;\">By the end of this online Certified Information Security Manager (CISM\u00ae) training course,<\/span><\/p>\n<p style=\"direction: ltr;\"><span style=\"font-size: inherit;\">you will have full, working knowledge of:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"direction: ltr;\">Plans and performance of information security requirements<\/li>\n<li style=\"direction: ltr;\">Information security management activities and reviews of the infrastructure<\/li>\n<li style=\"direction: ltr;\">Life-cycle-based risk management practices and principles<\/li>\n<li style=\"direction: ltr;\">Analyzing techniques for mitigating risks to acceptable levels<\/li>\n<li style=\"direction: ltr;\">Risk management steps during events that might affect security baseline<\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\">Course Content<\/h2>\n<p style=\"direction: ltr;\">Information Security Governance:-<\/p>\n<p style=\"direction: ltr;\">Lesson 1: Information Security Governance Overview<\/p>\n<p style=\"direction: ltr;\">Lesson 2: Effective Information Security Governance<\/p>\n<p style=\"direction: ltr;\">Lesson 3: Information Security Concepts and Technologies<\/p>\n<p style=\"direction: ltr;\">Lesson 4: Information Security Manager<\/p>\n<p style=\"direction: ltr;\">Lesson 5: Scope and Charter of Information Security Governance<\/p>\n<p style=\"direction: ltr;\">Lesson 6: Information Security Governance Metrics<\/p>\n<p style=\"direction: ltr;\">Lesson 7: Information Security Strategy Overview<\/p>\n<p style=\"direction: ltr;\">Lesson 8: Creating Information Security Strategy<\/p>\n<p style=\"direction: ltr;\">Lesson 9: Determining Current State Of Security<\/p>\n<p style=\"direction: ltr;\">Lesson 10: Information Security Strategy Development<\/p>\n<p style=\"direction: ltr;\">Lesson 11: Strategy Resources<\/p>\n<p style=\"direction: ltr;\">Lesson 12: Strategy Constraints<\/p>\n<p style=\"direction: ltr;\">Lesson 13: Action Plan to Implement Strategy<\/p>\n<p style=\"direction: ltr;\">Information Risk Management and Compliance<\/p>\n<p style=\"direction: ltr;\">Lesson 1: Risk Management Overview<\/p>\n<p style=\"direction: ltr;\">Lesson 2: Good Information Security Risk Management<\/p>\n<p style=\"direction: ltr;\">Lesson 3: Information Security Risk Management Concepts<\/p>\n<p style=\"direction: ltr;\">Lesson 4: Implementing Risk Management<\/p>\n<p style=\"direction: ltr;\">Lesson 5: Risk Assessment<\/p>\n<p style=\"direction: ltr;\">Lesson 6: Controls Countermeasures<\/p>\n<p style=\"direction: ltr;\">Lesson 7: Recovery Time Objectives<\/p>\n<p style=\"direction: ltr;\">Lesson 8: Risk Monitoring and Communication<\/p>\n<p style=\"direction: ltr;\">Information Security Program Development and Management<\/p>\n<p style=\"direction: ltr;\">Lesson 1: Development of Information Security Program<\/p>\n<p style=\"direction: ltr;\">Lesson 2: Information Security Program Objectives<\/p>\n<p style=\"direction: ltr;\">Lesson 3: Information Security Program Development Concepts<\/p>\n<p style=\"direction: ltr;\">Lesson 4: Scope and Charter of Information Security Program Development<\/p>\n<p style=\"direction: ltr;\">Lesson 5: Information Security Management Framework<\/p>\n<p style=\"direction: ltr;\">Lesson 6: Information Security Framework Components<\/p>\n<p style=\"direction: ltr;\">Lesson 7: Information Security Program Resources<\/p>\n<p style=\"direction: ltr;\">Lesson 8: Implementing an Information Security Program<\/p>\n<p style=\"direction: ltr;\">Lesson 9: Information Infrastructure and Architecture<\/p>\n<p style=\"direction: ltr;\">Lesson 10: Information Security Program<\/p>\n<p style=\"direction: ltr;\">Lesson 11: Security Program Services and Operational Activities<\/p>\n<p style=\"direction: ltr;\">\u00a0Information Security Incident Management<\/p>\n<p style=\"direction: ltr;\">Lesson 1: Incident Management Overview Part 1<\/p>\n<p style=\"direction: ltr;\">Lesson 2: Incident Response Procedures Part 1<\/p>\n<p style=\"direction: ltr;\">Lesson 3: Incident Management Organization<\/p>\n<p style=\"direction: ltr;\">Lesson 4: Incident Management Resources<\/p>\n<p style=\"direction: ltr;\">Lesson 5: Incident Management Objectives<\/p>\n<p style=\"direction: ltr;\">Lesson 6: Incident Management Metrics and Indicators<\/p>\n<p style=\"direction: ltr;\">Lesson 7: Current State of Incident Response Capability<\/p>\n<p style=\"direction: ltr;\">Lesson 8: Developing an Incident Response Plan<\/p>\n<p style=\"direction: ltr;\">Lesson 9: BCP\/DRP<\/p>\n<p style=\"direction: ltr;\">Lesson 10: Testing Response and Recovery Plans<\/p>\n<p style=\"direction: ltr;\">Lesson 11: Executing the Plan<\/p>\n<h2 style=\"text-align: justify;\">Pre-requisites<\/h2>\n<p style=\"text-align: justify;\">To become a (CISM) certified professional , you need to fulfill some criteria, including:<\/p>\n<p style=\"direction: ltr;\">A completed application submitted within five years from the date of initially passing the<\/p>\n<p style=\"direction: ltr;\">examination (you must ensure that all experience is independently verified by employers)<\/p>\n<p style=\"direction: ltr;\">Relevant experience must have been gained within the 10-year period preceding the<\/p>\n<p style=\"direction: ltr;\">application date for certification (or within five years of passing the examination)<\/p>\n<p style=\"direction: ltr;\">Three of the five years of work experience must be gained in the role of an information<\/p>\n<p style=\"direction: ltr;\">security manager (it must be broad and gained in three of the four CISM domains)<\/p>\n","protected":false},"author":2,"featured_media":2542,"template":"","course_category":[38],"class_list":["post-2539","courses","type-courses","status-publish","has-post-thumbnail","hentry","course_category-it-en","infinite-scroll-item","no-featured-image-padding"],"acf":[],"_links":{"self":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/2539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":12,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/2539\/revisions"}],"predecessor-version":[{"id":33939,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/2539\/revisions\/33939"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media\/2542"}],"wp:attachment":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=2539"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/course_category?post=2539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}