Home / Training / Certified Information Security Manager

Certified Information Security Manager

Prepare for CISM (ISACA) certification and master information security management.

Objective

The training prepares for the internationally recognized CISM (Certified Information Security Manager) certification, issued by ISACA. This course will provide you with the necessary knowledge and understanding to be an effective member of an information security team with management responsibilities. It also prepares anyone wishing to advance in information security or a related function.

Specific objective: Define and demonstrate the core competencies and international standards expected of information security managers.

Prerequisites

  • Experience in information system security management (at least 5 years, waiver possible for 2 years)

General Information

  • Code: CISM
  • Duration: 3 days
  • Schedule: 8:30 AM - 5:30 PM
  • Location: Training Center, North Urban Center, Tunis

Target audience

  • Security professionals
  • Information security managers
  • Security consultants
  • Anyone seeking a comprehensive understanding of essential IT risks and controls

Resources

  • Course materials
  • 40% demonstration
  • 40% theory
  • 20% practical exercises

Modules taught

  • Domain 1: Information Security Governance
    • Develop a security strategy aligned with the business strategy
    • Obtain management commitment and support for IT security
    • Define roles and responsibilities in security governance
    • Establish communication channels for security governance
  • Domain 2: Information Risk Management
    • Develop a systematic and analytical approach to risk management
    • Implement risk identification and analysis
    • Define mitigation strategies
    • Report on the evolution of risk management
  • Domain 3: Information Security Program Development
    • Create and maintain plans for a security governance framework
    • Develop baselines and international standards adapted to organizational needs
    • Ensure security integration into change management
    • Integrate policies, procedures, and accountability into the organization's culture
  • Domain 4: Information Security Program Management
    • Manage contract security risks and risk transfer
    • Understand compliance needs (e.g., Sarbanes-Oxley Act)
  • Domain 5: Incident Management and Response
    • Align IT planning with organizational strategy
    • Position security management within the organization
    • Control risks related to financial IT
    • Manage risks related to social engineering, physical threats, malicious code, and software vulnerabilities
    • Integrate security into business continuity, disaster recovery, and incident response
    • Implement processes to identify, detect, and analyze security incidents

Do not hesitate to contact our experts for any additional information, free study and calculation of an audit service.

Information security is essential for any company that needs to protect and improve its information assets.

Contact us