12 Hours 38 Minutes
298 Videos
94 Test Questions
$485.00

Certified Information Security Manager (CISM)

IT Security is without question one of the hottest and most lucrative areas of Information Technology today and the CISM Certification is one of the most valued credentials in the marketplace. This course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or CIO.

Another key course offered by ITU Online that prepares you for a ISACA certification is our Certified Information Systems Auditor (CISA)

For more information on this certification, visit the ISACA Official Certification site.

  • Course Overview
  • Modules Covered
  • Reviews

Course Overview

IT Security is without question one of the hottest and most lucrative areas of Information Technology today and the CISM Certification is one of the most valued credentials in the marketplace. This course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or CIO.

Another key course offered by ITU Online that prepares you for a ISACA certification is our Certified Information Systems Auditor (CISA)

For more information on this certification, visit the ISACA Official Certification site.

Tab 2

Domain 1: Information Security Governance
  • CISM Introduction
  • Information Security
  • Business Goals, Objectives, and Functions
  • Business Goals and Information Security
  • Information Security Threats
  • Information Security Management
  • Identity Management
  • Data Protection
  • Network Security
  • Personnel Security
  • Facility Security
  • Security Compliance and Standards
  • Information Security Strategy
  • Inputs and Outputs of the Informtion Security Strategy
  • Processes in an Information Security Strategy
  • People in an Information Security Strategy
  • Technologies in an Indormation Security Strategy
  • Logical and Physical Information Security Strategy Architectures
  • Information Security and Business Functions
  • Information Security Policies and Enterprise Objectives
  • International Standards for the Security Management
  • ISO/IEC 27000 Standards
  • International Info Government Standards
  • Information Security Government Standards in the United States
  • Methods of Coordinating Information Security Activites
  • How to Develop an Information Security Strategy
  • Information Security Governance
  • Role of the Security in Governance
  • Scope of Information Security Governance
  • Charter of Information Security Governance
  • Information Security Governance and Enterprise Governance
  • How to Align Information Security Strategy with Corporate Governance
  • Regulatory Requirements and Information Security
  • Business Impact of Regulatory Requirements
  • Liability Management
  • Liability Management Strategies
  • How to Identify Legal and Regulatory Requirements
  • Business Case Development
  • Budgetary Reporting Methods
  • Budgetary Planning Strategy
  • How to Justify Investment in Info Security
  • Organizational Drivers
  • Impact of Drivers on Info Security
  • Third Party Relationships
  • How to Identify Drivers Affecting the Organization
  • Purpose of Obtaining Commitment to Info Security
  • Methods for Obtaining Commitment
  • ISSG
  • ISSG Roles and Responsibilities
  • ISSG Operation
  • How to Obtain Senior Management's Commitment to Info Security
  • Info Security Management Roles and Responsibilities
  • How to Define Roles and Responsibilities for Info Security
  • The Need for Reporting and Communicating
  • Methods for Reporting in an Organization
  • Methods of Communication in an Organization
  • How to Establish Reporting and Communicating Channels
Domain 2: Risk Management
  • Risk
  • Risk Assessment
  • Info Threat Types
  • Info Vulnerabilities
  • Common Points of Exposure
  • Info Security Controls
  • Types of Info Security Controls
  • Common Info Security Countermeasures
  • Overview of the Risk Assessment Process
  • Factors Used in Risk Assessment and Analysis
  • Risk Assessment Methodologies
  • Quantitative Risk Assessment - Part 1
  • Quantitative Risk Assessment - Part 2
  • Qualitative Risk Assessment
  • Hybrid Risk Assessment
  • Best Practices for Info Security Management
  • Gap Analysis
  • How to Implement an Info Risk Assessment Process
  • Info Classification Schemas
  • Components of Info Classification Schemas
  • Info Ownership Schemas
  • Components of Info Ownership Schemas
  • Info Resource Valuation
  • Valuation Methodologies
  • How to Determine Info Asset Classification and Ownership
  • Baseline Modeling
  • Control Requirements
  • Baseline Modeling and Risk Based Assessment of Control Requirements
  • How to Conduct Ongoing Threat and Vulnerability Evaluations
  • BIA's
  • BIA Methods
  • Factors for Determining Info Resource Sensitivity and Critically
  • Impact of Adverse Events
  • How to Conduct Periodic BIA's
  • Methods for Measuring Effectiveness of Controls and Countermeasures
  • Risk Mitigation
  • Risk Mitigation Strategies
  • Effect of Implementing Risk Mitigation Strategies
  • Acceptable Levels of Risk
  • Cost Benefit Analysis
  • How to Identify and Evaluate Risk Mitigation Strategies
  • Life Cycle Processes
  • Life Cycle-Based Risk Management
  • Risk Management Life Cycle
  • Business Life Cycle Processes Affected by Risk Management
  • Life Cycled-Based Risk Management Principles and Practices
  • How to Integrate Risk Management Into Business Life Cycle Processes
  • Significant Changes
  • Risk Management Process
  • Risk Reporting Methods
  • Components of Risk Reports
  • How to Report Changes in Info Risk
Domain 3: Information Security Program
  • Info Security Strategies
  • Common Info Security Strategies
  • Info Security Implementation Plans
  • Conversation of Strategies Into Implementation Plans
  • Info Security Programs
  • Info Security Program Maintenance
  • Methods for Maintaining an Info Security Program
  • Succession Planning
  • Allocation of Jobs
  • Program Documentation
  • How to Develop Plans to Implement an Info Security Strategy
  • Security Technologies and Controls
  • Cryptographic Techniques
  • Symmetric Cryptography
  • Public Key Cryptography
  • Hashes
  • Access Control
  • Access Control Categories
  • Physical Access Controls
  • Technical Access Controls
  • Administrative Access Controls
  • Monitoring Tools
  • IDS's
  • Anti-Virus Systems
  • Policy-Compliance Systems
  • Common Activities Required in Info Security Programs
  • Prerequisites for Implementing the Program
  • Implementation Plan Management
  • Types of Security Controls
  • Info Security Controls Development
  • How to Specify info Security Program Activities
  • Business Assurance Function
  • Common Business Assurance Functions
  • Methods for Aligning info Security Programs with Business Assurance Functions
  • How to Coordinate Info Security Programs with Business Assurance Functions
  • SLA's
  • Internal Resources
  • External Resources
  • Services Provided by External Resources - Part 1
  • Services Provided by External Resources - Part 2
  • Skills Commonly Required for Info Security Program Implementation
  • Dentification of Resources and Skills Required for a Particular Implementation
  • Resource Acquisition Methods
  • Skills Acquisition Methods
  • How to Identify Resources Needed for Info Security Program Implementation
  • Info Security Architectures
  • The SABSA Model for Security Architecture
  • Deployment Considerations
  • Deployment of Info Security Architectures
  • How to Develop Info Security Architecture
  • Info Security Policies
  • Components of Info Security Policies
  • Info Security Policies and the Info Security Strategy
  • Info Security Policies and Enterprise Business Objectives
  • Info Security Policy Development Factors
  • Methods for Communicating Info Security Policies
  • Info Security Policy Maintenance
  • How to Develop Info Security Policies
  • Info Security Awareness Program, Training Programs, and Education Programs
  • Security Awareness, Training, and Education Gap Analysis
  • Methods for Closing the Security Awareness, Training, and Education Gaps
  • Security-Based Cultures and Behaviors
  • Methods for Establishing and Maintaining a Security-Based Culture in the Enterprise
  • How to Develop Info Security Awareness, Training, and Education Programs
  • Supporting Documentation for Info Security Policies
  • Standards, Procedures, Guidelines, and Baselines
  • Codes of Conduct
  • NDA's
  • Methods for Developing Supporting Documentation
  • Methods for Implementing Supporting Documentation and for Communicating Supporting Documentation
  • Methods for Maintaining Supporting Documentation
  • C and A
  • C and A Programs
  • How to Develop Supporting Documentation for Info Security Policies
Domain 4: Information Security Program Implementation
  • Enterprise Business Objectives
  • Integrating Enterprise Business Objectives & Info Security Policies
  • Organizational Processes
  • Change Control
  • Merges & Acquisitions
  • Organizational Processes & Info Security Policies
  • Methods for Integrating Info Security Policies & Organizational Processes
  • Life Cycle Methodologies
  • Types of Life Cycle Methodologies
  • How to Integrate Info Security Requirements Into Organizational Processes
  • Types of Contracts Affected by Info Security Programs
  • Joint Ventures
  • Outsourced Provides & Info Security
  • Business Partners & Info Security
  • Customers & Info Security
  • Third Party & Info Security
  • Risk Management
  • Risk Management Methods & Techniques for Third Parties
  • SLA's & Info Security
  • Contracts & Info Security
  • Due Diligence & Info Security
  • Suppliers & Info Security
  • Subcontractors & Info Security
  • How to Integrate Info Security Controls Into Contracts
  • Info Security Metrics
  • Types of Metrics Commonly Used for Info Security
  • Metric Design, Development & Implementation
  • Goals of Evaluating Info Security Controls
  • Methods of Evaluating Info Security Controls
  • Vulnerability Testing
  • Types of Vulnerability Testing
  • Effects of Vulnerability Assessment & Testing
  • Vulnerability Correction
  • Commercial Assessment Tools
  • Goals of Tracking Info Security Awareness, Training, & Education Programs
  • Methods for Tracking Info Security Awareness, Training, & Education Programs
  • Evaluation of Training Effectiveness & Relevance
  • How to Create Info Security Program Evaluation Metrics
Domain 5: Information Security Program Management
  • Management Metrics
  • Types of Management Metrics
  • Data Collection
  • Periodic Reviews
  • Monitoring Approaches
  • KPI's
  • Types of Measurements
  • Other Measurements
  • Info Security Reviews
Domain 6: Incident Management and Response
  • Management Metrics
  • Types of Management Metrics
  • Data Collection
  • Periodic Reviews
  • Monitoring Approaches
  • KPI's
  • Types of Measurements
  • Other Measurements
  • Info Security Reviews
  • The Role of Assurance Providers
  • Comparing Internal and External Assurance Providers
  • Line Management Technique
  • Budgeting
  • Staff Management
  • Facilities
  • How to Manage Info Security Program Resources
  • Security Policies
  • Security Policy Components
  • Implementation of Info Security Policies
  • Administrative Processes and Procedures
  • Access Control Types
  • ACM
  • Access Security Policy Principles
  • Identity Management and Compliance
  • Authentication Factors
  • Remote Access
  • User Registration
  • Procurement
  • How to Enforce Policy and Standards Compliance
  • Types of Third Party Relationships
  • Methods for Managing Info Security Regarding Third Parties
  • Security Service Providers
  • Third Party Contract Provisions
  • Methods to Define Security Requirements in SLA's, Security Provisions and SLA's, and Methods to Monitor Security
  • How to Enforce Contractual Info Security Controls
  • SDLC
  • Code Development
  • Common Techniques for Security Enforcement
  • How to Enforce Info Security During Systems Development
  • Maintenance
  • Methods of Monitoring Security Activities
  • Impact of Change and Configuration Management Activities
  • How to Maintain Info Security Within an Organization
  • Due Diligence Activities
  • Types of Due Diligence Activities
  • Reviews of Info Access
  • Standards of Managing and Controlling Info Access
  • How to Provide Info Security Advice and Guidance
  • Info Security Awareness
  • Types of Info Security Stakeholders
  • Methods of Stakeholder Education
  • Security Stakeholder Education Process
  • How to Provide Info Security Awareness and Training
  • Methods of Testing the Effectiveness of Info Security Control
  • The Penetration Testing Process
  • Types of Penetration Testing
  • Password Cracking
  • Social Engineering Attacks
  • Social Engineering Types
  • External Vulnerability Reporting Sources
  • Regulatory Reporting Requirements
  • Internal Reporting Requirements
  • How to Analyze the Effectiveness of Info Security Controls
  • Noncompliance Issues
  • Security Baselines
  • Events Affecting the Security Baseline
  • Info Security Problem Management Process
  • How to Resolve Noncompliance Issues

Tab 3

Tab 4

good*****

Besson pikulas, FR

Learning from the institute was such an enriching experience! Everything in the course was properly laid down, the content covered all aspects of hair and makeup in detail! I learnt a lot many tips and tricks from the instructor! All in all it was amazing to be a part of the course. I would reccomend the same to my friends and relatives as well!!

Amanat Bains, IN

Personal styling course by LST is in depth knowledge on the subject . Each topic is covered in details , and gives confidence while learning. Great course

Pooja Kapoor, IN

Had a great learning experience. Thank you all for the knowledge and helping me to learn so many new things.

Swagata Borah, IN

I got to learn a lots from here . Fashion styling is the best course for me . And the method of explaining in each module is was very Good 😊. I really Enjoyed ☺️😊. Thank you so much Sir and Ma'am ❤️.

Chetna mali, IN

It was great time learning .glad i got opportunity for being a part if it

Ayushi passi, IN

Really good course. I am very grateful that I came across this course. And thank you so much for the service you are providing. Love you London school of trends.

Geetanjali Kale, IN

The course was very helpful and extremely detailed,learnt so much about styling within such a shot duration.also the exercizes were extremely fun.

Sarah Haroon, IN

This course was very informative and well organised. The videos created by the tutors were well explained and detailed. Moroever the notes gave me a lot of knowledge on fashion styling. I truly recomend this course for students who are intrested in fashion styling.

aashna shah, IN

This was an amazing experience learnt alot through this course. The knowledge provided by lst was up to mark which will benifit me for ,y carieer and i am looking forward to learn more through lst online certification course. THANK YOU FOR AMAZING LEARNING EXPERIENCE.

Anuja Baburao, IN

Amazing start !!!!

Sumaiya Kazi, IN

the course was really very helpful.

Karnika Kabra, IN

EXCELLENT ONLINE CLASSES I HAVE LEARN IT FROM YOUR TEAM ON THE ONLINE CLASSES AND THANKING YOU ALL THE TEAM MEMBER AND SPECIAL THE SARA CORKER MADAM .....ITS HAS HELP ME LOT FROM YOU STAY SAFE AND BE HEALTHY REGARDS JUHI DAVE

Juhi dave, IN

Great informative course, highly recommended. Taught me more about the nutritional needs a dogs is required and more about cats diets to keep them healthy!

Carina Evans, GB

Good

Siddhi datri sahu, IN

This course has been very informative and helpful till now as it gives insight of the industry and explains its clearly. Module notes is very informative in most areas and lack some explanations in rest like how to identify the undertone. So far for me, it gave me so much knowledge and insights which i was lacking. Thank you keeping this as an online course.

SACHI BARSAGADE, IN

I enjoyed learning here. It was a good experience. I got to learn about many new things also I got to know about how all fashion blooging works. Therefore this course was helpful to me............

Jagriti Suneja, IN

I experienced a few technical hiccups while taking this course, but all in all, it was a lovely experience and I am confident to say that I learned a lot!

Aurora Raki, HR

The course has helped me gain a wide range of knowledge in the subject. A lot of practical aspect of the subject taught in the course helped me understand the subject better. Thanks to the team.

ANANYAA H, IN

I HAVE COMPLETED MY LUXURY BRAND MANAGEMENT COURSE , IT WAS AN AMAZING EXPERIENCE I HAVE RECEIVED IMMENSE KNOWLEDGE ABOUT THE LUXURY INDUSTRY .I FEEL I HAVE DONE THE BEST UTILIZATION OF THE LOCKDOWN PERIOD .

mansi jain, IN

The course was amazing and full of knowledge gaining throughout the course. Got to learn alot about the world of fashion and was very interesting throughout. Definitely worth the time and money.

SAMPURNAA SAHA, IN

l love this course n will be able to better understand the luxurious brand concepts

Alka , IN

Amazing Course, definitely recommend it!

Gael vergier, FR

This was the best course...i was able to understand each and everything. Thanks for the course and the knowledge i get to start my carrier.

Anamta Bashri, IN

Amazing Course ! very helpful to develop a sense of style.

Aayushi Rami, IN

My expectations were already high due to the tutor's (Fabio Ciqueta) know-how in the industry and the organization initially presented. However, the organization of the subjects, the practical examples and the strategic vision behind the analysis of the entire luxury industry was beyond my best expectations. Strongly recommend it!

Filipe Santana Pires, PT

Great course! Very complete and clear. Thank you!

Delfina Rodriguez Notari, AR

The course was extremely helpful as it included several real-life examples and covered all the topics regarding styling.

ISHA MOGUL, IN

Hello sir/ma'am , the course was amazing .The way you guyz explain in video and in notes are amazing and is very helpful ,i absolutely love the course . I would like to request you guyz to kindly send my e-certificate . Thank you

Mahima Agrawal, IN

best makeup&hair course. I like soo much. better knowledge London school trends best school. makeup&hair learning. thanku soo much

YOGESH KADAM, IN

Enjoyable

Sandra smith, GB

Good

Pooja A., IN

The course has been very helpful! I did learn quite a lot about the technicalities and the importance of styling.

Aathirai Rajasekar, IN

i just love this course the way professors told about the course was a bit easy to understand surely find another course from london school of trends

simran lamba, IN

I loved the course. It is very informative and industry based. It consists of all the things a beginner stylist needs to know to enter the industry.

Marguerite Kotze, ZA

The course was amazing. Gathered lot of information. But I would prefer more physical teaching, maybe vedio calls once during the course

Falak Siddique, IN

Great course,I learned a lot,would definitely recommend to people who interested in interior design

Inga VUKOBRATOVICA, IE

It was nice session and course was provided with all the material.

Vanshika , IN

It's really informative course. Very usefull for person who wants to work in fashion industry. Easily understandable and they give guidance to assignment submitted too

Khyati Parmar, IN

Hi , I´ve had really enjoy this online course . The explanation of the ten modules were very clear and neat . And thank you to the teacher as well to Fabio Ciquera that expresses himself very well in the videos . All the best :) And thank you for the magnificent service from the team ! María Cristina Loria Nayal xx

Maria Cristina, GB

my review regarding this course is was that it was very helpful to me as it was different from what i am currently pursuing, and throgh this course i will get more opportuinites in future.

ADITI VYAS, AE

Hello sir/madam, I had already completed the course 2 days before it's amazing the way you guyz explain each and every thing by giving example n those documents they are very helpful and can you please send me the certificate for course completion .

Mahima Agrawal, IN

Course was informative and easy to understand.

Nithyasri , IN

Respected Sir/Madam I really loved the course as it was extremely helpful to me. I was always interested in styling as it made me feel happy and confident but i felt i lak the proper knowledge and idea of how to go forward with it. But this entire course and the notes provided have been proved to be extremely helpful. Really thankful to London School of Trends for giving us a platform to learn and gain knowledge.

Hasti Mehta, IN

Thank LST for the learning experince.Coming from a agency background, I was always curious to know more about the luxury brand market and through this course I was able to learn alot about the luxury brands and the market. Thank you so much

Noopur Jha, IN

Hello sir , the classes are amazing and i really love the way of studying ,its amazing studying with you guyz,can u plz tell me where do i get my e-certificate

Mahima Agrawal, IN

To whom it concerns. I have just finished this course and would like to take this opportunity to say a massive thank you. I found it absolutely fascinating from beginning to end. I have picked up so many helpful tips that I will no doubt use going forward. I could not recommend this course highly enough Kind regards. Davie Nash

Davie Nash, IE

All lectures are very useful and awesome.

Srushti Tidke, IN

A very interesting and informative course. The assignments were fun to complete. Overall, I had a really great time doing the course.

Meher Kaur Sandhu, IN

The best learning school best teaching staff and each module was very useful 🌈💯

Aashi Chanchlani, IN