Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. New Horizons Learning
  4. New Horizons Certified Information Security Manager (CISM)

New Horizons Certified Information Security Manager (CISM)

Designed for IT professionals with technical >Information risk management

Information security program development
Information security program management
Incident management and response
expertise and experience in IS/IT security and control looking to transition from team player to manager. CISM can add credibility and confidence to interactions with internal and external stakeholders, peers and regulators.
This certification indicates expertise in information security governance, program development and management, incident management and risk management. If you are a mid-career IT professional aspiring to senior management roles in IT security and control, CISM can get you the visibility you need

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Prerequisites

CISM is intended for information security professionals with at least five years of relevant work experience and at least three years in the role of information security manager.

Training Purpose
Skill Development
Specific Audience
All
Delivery Method
Online, Instructor-Led
Classroom
Course Location

707 Landa Street
Suite 110
New Braunfels, TX 78130

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Online, Instructor-Led
  • Classroom

Learning Objectives

Explain the relationship between executive leadership, enterprise governance and information security governance.
Outline the components used to build an information security strategy.
Explain how the risk assessment process influences the information security strategy.
Articulate the process and requirements used to develop an effective information risk response strategy.
Describe the components of an effective information security program.
Explain the process to build and maintain an enterprise information security program.
Outline techniques used to assess the enterprise’s ability and readiness to manage an information security incident.
Outline methods to measure and improve response and recovery capabilities.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: