Certified Information Security Manager (CISM)

ISACA’s Certified Information Security Manager (CISM) certification is for those with technical expertise and experience in IS/IT security and control and wants to make the move from team player to manager. CISM can add credibility and confidence to your interactions with internal and external stakeholders, peers and regulators.

Delivery format: Classroom, Virtual-Led
Certification: Certified Information Security Manager (CISM) 

Cybiant has exceeded my expectations in delivering this training. My instructor guided me every step of the way, and helped me prepare for the exam. Best training I have been to in a long time.

Johnathon Smith, Adecco

I completed the RPA Fundamentals training with Cybiant. Although it was a difficult training, Mike made it is almost sound easy. I am confident that I am now well prepared to pass the examination. Thank Mike!

Justin Woo, Petronas Digital

Certified Information Security Manager® (CISM®)

The ISACA Certified Information Security Manager (CISM®) certification is one of the most prestigious and globally recognized qualifications in information security. It sets the standard for excellence in security governance, risk management, and compliance, ensuring that certified professionals possess the expertise to develop, manage, and lead enterprise-wide security programs.Our intensive 4-day training program is designed to equip participants with the essential knowledge and skills required of a world-class information security manager. Not only does this course provide a deep dive into security governance, risk management, and incident response, but it also offers comprehensive preparation for the CISM exam, increasing your chances of certification success.

Why Choose This Course?

In today’s digital landscape, technology plays a pivotal role in innovation but also presents significant security risks. Many IT professionals lack the risk assessment and security management expertise that organizations now deem critical for long-term success. The CISM certification bridges this gap by ensuring professionals can:

Assess and manage IT risks effectively within an enterprise.
Develop and oversee information security programs aligned with business objectives.
Implement best practices in security governance and compliance.
Enhance incident response strategies to mitigate cyber threats.

Course Structure & Exam Readiness

The course follows the four Job Practice Areas outlined in the official ISACA CISM Review Manual, ensuring a structured and in-depth learning experience. Rather than just memorizing facts, the training emphasizes conceptual understanding through interactive discussions, case studies, and exam-style questions. This approach enables participants to confidently analyze exam scenarios and select the correct responses.

Who Should Attend?

This course is ideal for:

  • Information security managers and IT security professionals
  • Risk and compliance officers responsible for IT governance
  • Business analysts and IT auditors working with security frameworks
  • Project managers and executives looking to strengthen their cybersecurity knowledge

 

Flexible Learning Options

We also offer this course on request, allowing you to choose the format that best suits your needs. Whether you prefer in-person training, virtual sessions, or a tailored corporate program, our team is ready to assist. Contact us via chat or mail to discuss your preferred schedule and delivery format.Take the next step in your cybersecurity career and gain the CISM certification—a globally respected credential that sets you apart as a leader in information security management.

Registration

Cybiant offers the following learning options for this course:

Virtual Training – 2×2 hours per day
The virtual training option is an online class taught by a live Cybiant instructor. You will receive a meeting invitation to participate in the live lectures. Our virtual training courses are organized in 2 x 2-hour sessions per day to accommodate some other work. Official examinations are included in the pricing.

Classroom Training – full day
The classroom training option will be conducted by a Cybiant instructor in a 5-star hotel. You will participate in a live training and meet other participants. Breaks, lunch and exam voucher are included in the pricing.

You can register for the course by selecting the option of your choice below:

ImageNameFormatDatesPriceBuy
Certified Information Security Manager (CISM)Virtual3-6 March 2025RM10,030.00
Certified Information Security Manager (CISM)Classroom16-19 June 2025 Kuala LumpurRM11,130.00
Certified Information Security Manager (CISM)Virtual29 September - 2 October 2025RM10,030.00

If your preferred date is not available, please feel free to get in touch with us.

Learning Objectives

The first step to becoming CISM certified is to take and pass the CISM certification exam, consisting of 150 questions covering 4 job practice domains:

  • Information Security Governance – Affirms the expertise to establish and/or maintain an information security governance framework (and supporting processes) to ensure that the information security strategy is aligned with organizational goals and objectives. Domain 1 confirms your ability to develop and oversee an information security governance framework to guide activities that support the information security strategy.
  • Managing Information Risk – proficiency in this key realm denotes advanced ability to manage information risk to an acceptable level, in accordance with organizational risk appetite, while facilitating the attainment of organizational goals and objectives. Domain 2 demonstrates expertise in classifying information assets to ensure measures taken to protect those assets are proportional to their business value
  • Developing and Managing an Information Security Program – establishes ability to develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning with business goals. Domain 3 attests to ability to ensure the information security program adds value while supporting operational objectives of other business functions (human resources, accounting, procurement, IT, etc.)
  • Information Security Incident Management – validates capacity to plan, establish and manage detection, investigation, response and recovery from information security incidents in order to minimize business impact. Domain 4 establishes your skills in accurately classifying and categorizing information security incidents and developing plans to ensure timely and effective response.

Target Audience

The Certified Information Security Manager (CISM) certification is tailored for professionals who design, manage, and oversee enterprise information security programs. Ideal candidates include:

  • Information Security Managers: Professionals responsible for developing and managing an organization’s information security program.

  • Aspiring Information Security Managers: Individuals aiming to advance into managerial roles within the information security domain.

  • IT Directors and Managers: Leaders overseeing IT operations who seek to enhance their understanding of information security management.

  • Security Consultants and Analysts: Experts providing advisory services who wish to validate their skills and knowledge in information security management.

  • Risk Management Professionals: Individuals focused on assessing and mitigating information security risks within enterprises.

Achieving the CISM certification demonstrates a comprehensive understanding of information security governance, risk management, program development, and incident management, positioning professionals to effectively align security strategies with organizational objectives.

Exam Structure

The Certified Information Security Manager (CISM) exam is designed to assess a candidate’s expertise across four key domains, each reflecting essential areas of information security management:

  1. Information Security Governance (17%): Focuses on establishing and maintaining an information security governance framework and supporting processes to ensure that the information security strategy aligns with organizational goals and objectives.

  2. Information Security Risk Management (20%): Centers on identifying and managing information security risks to achieve business objectives.

  3. Information Security Program (33%): Involves establishing and managing the information security program, which includes implementing security controls and ensuring the program aligns with the organization’s objectives.

  4. Incident Management (30%): Addresses the development and management of the capability to respond to and recover from disruptive and destructive information security events.

The exam comprises 150 multiple-choice questions that evaluate both knowledge and practical application of information security management principles. Candidates are allotted a four-hour window to complete the exam. The CISM exam is administered in a computer-based format and is available at authorized PSI testing centers worldwide or can be taken as a remotely proctored exam. Registration is continuous, allowing candidates to schedule their exam appointments at their convenience.

Downloads

Reviews

There are no reviews yet.

Be the first to review “Certified Information Security Manager (CISM)”

Your email address will not be published. Required fields are marked *

Includes Examination

Unless otherwise specified, all courses include official examination

Expert Trainers

All Cybiant trainers are experts in their knowledge domain

14 Days Evaluation

Is your e-learning not what you expected? You get your money back.