CISM
Certified Information Security Manager
This track is built to help you think like a security manager — the way ISACA expects on the CISM exam. Not memorization. Not checklists. Decision-driven reasoning across governance, risk, program management, and incident response.
0 of 35 modules completed (0%)
What You’ll Learn
- Understand information security governance from a management perspective
- Build decision frameworks for risk management scenarios under uncertainty
- Learn what ISACA expects when evaluating security programs and incident response
- Develop structured readiness self-assessments to know when you’re exam-ready
Domain 1 — Information Security Governance
Enterprise governance, organizational culture, legal and regulatory requirements, and information security strategy development.
Section A — Enterprise Governance
- 1 Organizational Culture Available
- 2 Legal, Regulatory, and Contractual Requirements Available
- 3 Organizational Structures, Roles, and Responsibilities Available
- ✓ Section A Review: Enterprise Governance Available
Section B — Information Security Strategy
- 4 Information Security Strategy Development Available
- 5 Information Governance Frameworks and Standards Available
- 6 Strategic Planning Available
- ✓ Section B Review: Information Security Strategy Available
Domain 1 Review
Domain 2 — Information Security Risk Management
Risk identification, assessment, response, and monitoring aligned to organizational objectives and risk appetite.
Section A — Information Security Risk Assessment
- 7 Emerging Risk and Threat Landscape Available
- 8 Vulnerability and Control Deficiency Analysis Available
- 9 Risk Assessment and Analysis Available
- ✓ Section A Review: Information Security Risk Assessment Available
Section B — Information Security Risk Response
- 10 Risk Treatment / Risk Response Options Available
- 11 Risk and Control Ownership Available
- 12 Risk Monitoring and Reporting Available
- ✓ Section B Review: Information Security Risk Response Available
Domain 2 Review
Domain 3 — Information Security Program
Program development, resource management, control design and implementation, awareness training, and external service management.
Section A — Information Security Program Development
- 13 Information Security Program Resources Available
- 14 Information Asset Identification and Classification Available
- 15 Industry Standards and Frameworks for Information Security Available
- 16 Information Security Policies, Procedures, and Guidelines Available
- 17 Information Security Program Metrics Available
- ✓ Section A Review: Information Security Program Development Available
Section B — Information Security Program Management
- 18 Information Security Control Design and Selection Available
- 19 Information Security Control Implementation and Integrations Available
- 20 Information Security Control Testing and Evaluation Available
- 21 Information Security Awareness and Training Available
- 22 Management of External Services Available
- 23 Information Security Program Communications and Reporting Available
- ✓ Section B Review: Information Security Program Management Available
Domain 3 Review
Domain 4 — Incident Management
Incident management readiness, response planning, business continuity, disaster recovery, and post-incident review.
Section A — Incident Management Readiness
- 24 Incident Response Plan Available
- 25 Business Impact Analysis (BIA) Available
- 26 Business Continuity Plan (BCP) Available
- 27 Disaster Recovery Plan (DRP) Available
- 28 Incident Classification/Categorization Available
- 29 Incident Management Training, Testing, and Evaluation Available
- ✓ Section A Review: Incident Management Readiness Available
Section B — Incident Management Operations
- 30 Incident Management Tools and Techniques Available
- 31 Incident Investigation and Evaluation Available
- 32 Incident Containment Methods Available
- 33 Incident Response Communications Available
- 34 Incident Eradication and Recovery Available
- 35 Post-Incident Review Practices Available
- ✓ Section B Review: Incident Management Operations Available