CISM - Certified Information Security Manager


Course Code EDCVITSC04

Course Overview

A distance learning course is the ideal way to gain a CISM - Certified Information Security Manager Certification. Whether you're looking to go on to further education, improve your job prospects or expand your knowledge, distance learning CISM Course is a flexible and convenient course, which allows you to comprehensively prepare for the CISM - Certified Information Security Manager Certification exam through home study. What's more, because the distance learning CISM Course is a fully comprehensive course, no prior knowledge is required.

The demand for skilled information security management professionals is on the rise. It is without question one of the hottest and most lucrative areas of Information Technology today, and the CISM certification is the globally accepted standard of achievement in this area. Earning a CISM designation will give you a competitive advantage. Many enterprises and government agencies increasingly recognize, require and expect their IS and IT professionals to hold this certification.

The CISM program is developed particularly for experienced information security managers and those who have information security management responsibilities. Individuals earning the CISM certification become part of a best peer network, attaining a one-of-a-kind credential. Those who hold this designation join a network of professionals known for their expertise in information security management, IT governance and risk management.

The Certified Information Security Manager certification demonstrates that you have the required skills to become a security architect, security engineer, security specialist and/or network administrator. Putting this certification on your CV broadens your future opportunities


Who should take this course?

This course is best suited to:

  • Information Security Managers
  • Aspiring Information Security Managers
  • IS/IT Consultants


Advantages of the CISM Certification

Having a CISM certification:

  • Demonstrates your understanding of the relationship between an information security program and broader business goals and objectives
  • Distinguishes you as having not only information security expertise, but also knowledge and experience in the development and management of an information security program
  • Puts you in an elite peer networks considered essential to ongoing education, career progression and value delivery to enterprises.

Course Features

Your CISM - Certified Information Security Manager Course:

    The CISM certification is the globally accepted standard of achievement in the area of Information Security Management. Earning a CISM designation will give you a competitive advantage.

Study Time

Study Hours are an approximate figure and are dependant upon how much time you can dedicate to your studies and how well you grasp the learning concepts in the course material. Furthermore, at the end of each lesson there is a question paper that needs to be completed and returned to your tutor. You should allow at least 1 - 2 hours of study to complete each question paper.

The approximate amount of time required to complete the CISM - Certified Information Security Manager course is: Self Paced

Study Time
Please select the average number of hours you can study per week.
Hours per Week
Completion Time (weeks)
* Please note that these are approximate figures.
Key Topics

The CISM course is divided into following modules:

  • DOMAIN 1: Information Security Governance
  • DOMAIN 2 Risk Management
  • DOMAIN 3: Information Security Program
  • DOMAIN 4: Information Security Program Inplementation
  • DOMAIN 5 Information Security Program Management
  • DOMAIN 6: Incident Management and Response

This CISM course will prepare you for following certification :
ISACA-CISM Certification

To help you with Exam Preparations, we provide you with full length practice tests. These tests closely follow the exam objectives and are designed to simulate real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure that learners are prepared for the certification exam.

Entry Requirements
No Entry Requirements

ISACA has the following pre-requisites for CISM:

  • Attain and report an annual minimum of twenty (20) CPE hours. These hours must be appropriate to the currency or advancement of the CISM's knowledge or ability to perform CISM-related tasks. The use of these hours towards meeting the CPE requirements for multiple ISACA certifications is permissible when the professional activity is applicable to satisfying the job-related knowledge of each certification.
  • Submit annual CPE maintenance fees to ISACA International Headquarters in full.
  • Attain and report a minimum of one hundred and twenty (120) CPE hours for a three-year reporting period.
  • Submit required documentation of CPE activities if selected for the annual audit.
  • Comply with ISACA's Code of Professional Ethics.

Home Study Support

Expert Instructor-Led Training
eDistance Learning uses the content from the finest publishers and only the IT industry’s finest instructors who have a minimum of 15 years real-world experience and are subject matter experts in their fields. You can study at your own pace which creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

Visual Demonstrations & Multimedia Presentations: Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor.

Flash Cards & Educational Games:
We provide Flash Cards and Education Games throughout our courses which will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.

Quizzes & Exam Simulators:
The practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. The courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

Social Learning & Networking:
This course is designed with a world class Learning Management System (LMS). This system allows you to interact and collaborate with other students and employees, form study groups, engage in discussions in our forums, rate and “like” different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features.

Home Study Resources

Expert Instructor-Led Training
eDistance Learning uses the content from the finest publishers and only the IT industry’s finest instructors who have a minimum of 15 years real-world experience and are subject matter experts in their fields. You can study at your own pace which creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

Key Features

In addition to instructor led training, we provide you with following features :

  • Exercise Questions
  • Flash Cards and Educational Games
  • Quizzes and Exam Simulators


This CISM - Certified Information Security Manager course will prepare you for following certification:

Certified Information Security Manager (CISM)

The CISM certification is a distinctive management focused certification. The certification is targeted at professionals who manage designs, oversees and assesses an enterprise's information security. The Certified Information Security Manager certification demonstrates that you have the required skills to become a security architect, security engineer, security specialist and/or network administrator. Putting this certification on your CV broadens your future opportunities.

Possible Career Path
  • Information Security Consultant
  • Information Security Manager
  • Senior Security Consultant
  • Senior Security Analyst
What's Included

Our online courses are fully digitised so you can study on any smart device. Your learning programme is completely flexible so you can study at a pace that suits you. All our content is broken down into bite size chunks to make your learning more manageable and effective. Your course of study is broken down into units and sections, each of which contains lessons, activities and test papers. Courses are delivered on our Digital Learning Environment allowing you to study from anywhere on any smart device as long as you have access to the Internet. The course concludes by preparing you for examination using past papers in your chosen subject.

As a student, your course fee covers everything you will need to successfully complete the CISM home study course and earn your award:

  • Online study materials to enable the student to successfully complete the course.
  • Expert Instructor-Led Training
  • Interactive Exercises
  • Exercises, Quizzes & Flashcards
  • Practice Test Sets
  • Exam Simulators
  • State of the Art Educator Tools
  • Award Winning Learning Platform (LMS)

You can also choose to pick from following while you are enrolling and avail the services at a highly discounted price for our students.


Makes your assignment submission and study on the move an absolute breeze. Available at a reduced price of £69.99 (RRP £99) to all students who enrol on 2 or more courses and pay for their course in full at the time of enrolment. Download your study materials and turn commuting time into profitable study time.

See the Specifications of the 'Android Tablet'


Reordering a course pack, if you have damaged yours, can be costly. You can usually expect to pay a huge price for a copy. The 12 month insurance Cover will meet the cost for you if your pack was damaged. We will send out another Course Pack at no extra cost if you send us a proof of the damaged course.

See the details of '12 Month Course Insurance'.


We support our students even after they have graduated from the college. Learning for Life Services include:

  • 1. Academic Reference: We are often asked to provide references for students by employers or colleges and universities. The aims of an academic reference are to confirm facts (confirm accuracy of statements made in any application) and to provide relevant opinion on the candidate's aptitude and ability.

  • 2. CV Refresh Service: When you successfully complete your course you will be entitled to our CV refresh service. We will update your current CV to ensure that your new skills and achievements are presented to the highest standard. We will also add your CV to databank of our sister company

  • 3. 25% off Courses: *(This offer cannot be used in conjunction with any other offers)

    For all students who successfully complete their course, you will be entitled to 25% off any future courses through eDistance Learning or it's partners.

    Furthermore this offer will be extended to your family and friends.

  • See details on 'Learning for Life'

Further Information
Award Level: Training Course

Awarding Body: ISACA

Format: Online

If your course is being delivered online, please ensure you meet the minimum requirements below.

For Windows:
Windows 98, 2000, XP, Vista, Windows 7 - Acrobat Reader 4.0 and above

For Macintosh:
Mac OS X, Mac OS 9.2 - Acrobat Reader 4.0 and above

From time to time we may enrol our students with our partner sites; this is dependent on the number of students enrolling on a particular course and course material availability. If this happens, nothing changes for you other than the name of the college administering your course. We will continue to be your point of contact; you will get the exact same course you have enrolled on with the same high level of quality content and support.

This course can be enrolled upon by students internationally. There are no deadlines for enrolments.


Step One: It's simple - all you need to do now is choose whether you want to pay in instalments or in full and then click on the relevant enrolment button at the top of this page.

Step Two: Once you have selected your payment option to enrol you will be redirected (this can take a few seconds) to our PayPal payment page for you to select your payment method and complete your enrolment.

Step Three: Within 7 days (normally 48 hours) your enrolment papers and course materials will be with you. A tutor and a dedicated support advisor will also be allocated to you.

That's it..... Thanks and wishing you the best of luck with your studies.

Professional Membership


As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only. ISACA membership and its certification programs are globally accepted and recognized. Holding an ISACA designation enhances professional recognition, credibility and earning potential.


What are the prerequisites for this exam?

ISACA has the following pre-requisites for CISM:
  • Attain and report an annual minimum of twenty (20) CPE hours. These hours must be appropriate to the currency or advancement of the CISM's knowledge or ability to perform CISM-related tasks. The use of these hours towards meeting the CPE requirements for multiple ISACA certifications is permissible when the professional activity is applicable to satisfying the job-related knowledge of each certification.
  • Submit annual CPE maintenance fees to ISACA International Headquarters in full.
  • Attain and report a minimum of one hundred and twenty (120) CPE hours for a three-year reporting period.
  • Submit required documentation of CPE activities if selected for the annual audit.
  • Comply with ISACA's Code of Professional Ethics.

What is the exam registration fee?

  • For Member: USD 535
  • For Non-Member: USD 710
Net price does not include applicable taxes, vouchers, promotions you may have. Click here to get information on exam fees.

Where do I take the exam?

The CISM is administered by ISACA itself at testing centers worldwide. Click here to find a testing center near you.

What is the format of the exam?

The exam consists of liner and multiple choice questions.

How many questions are asked in the exam?

The exam contains 200 questions.

What is the duration of the exam?

240 minutes

What is the passing score?

(on a scale of 450-800)

What is the exam's retake policy?

For CISM exam, ISACA's retake policy is:
  • A candidate receiving a score of less than 450 will not pass and can retake the exam by registering and paying the appropriate exam fee for any future exam administration.
  • To assist with future study, the results letter of each candidate will include a score analysis by content area. There are no limits to the number of times a candidate can take the exam.

What is the validity of the certification?

CISA certification expires three years from date of issue, after which the certification holder will need to renew their certification. Click here for more information.

Where can I find more information about this exam?

To know more about the CISM exam, click here.

How long do I have to complete the course?

Most courses are for 12 months from the date of purchase and we actively encourage you to complete within this time frame.

Can I extend my tutor support if I do not complete within 12 months?

Yes, we can extend your course for a further 6 months for a fee. We only allow one extension per course.

How does distance learning work?

To ensure studying is flexible and convenient, most of our courses are divided into sections. You work through each section at your own pace and time. Once completed, send the test paper back to your personal tutor for marking. You will then move onto the next section once successfully completing the previous section. The support period is dependent on the type of course you choose; our minimum support period is one year.

When can I start the course?

The answer is simple, when YOU want; you can start the course at any time we do not have any set enrolment dates. Most of our courses don’t require any previous experience or qualifications. All you need is a desire and motivation to succeed. You can even start right now - call and speak to one of our Professional Course Advisors.

How long do the courses take?

This is dependent upon your choice of course and how fast you want to learn. A full breakdown of the course is available in your course literature. We do provide estimated number of study hours; ask our course advisors for details.

I want to buy a course that is not on the course list. What do I do?

Our website has an excellent list of the most popular courses on the market. However, we do have access to a more in-depth portfolio should you not find the course you are looking for. You can call our course advisors and discuss the course you are interested in.

I wish to cancel my course. How do I do this?

If you have decided that this is not the right type of course for you you may cancel your course, in writing, within the first seven days of having received it. You then need to return your materials to the address printed on the course pack. This is at your own expense and we would advise that you return the materials by a traceable service, as this is your responsibility until we receive the materials. Once we have received the materials, in good condition, we will organise a refund cheque to be sent to you. Please note that an admin fee will apply. If you required your materials to be delivered abroad, the additional postage charge will not be refunded.

Do I have to buy any other materials?

Our comprehensive course materials are designed to be self-contained with all the relevant information you require to complete the course and gain the relevant certification. However some of our students undertake additional reading via relevant textbooks/study guides and/or the Internet to add value to their studies.

I’m not sure of what course I should take? Can you help?

Yes we can, it is important that you pursue a course which you will enjoy. Although we cannot make this decision for you, we employ a team of dedicated Professional Course Advisors, who will guide you towards making the right choice. Whether you want specific information, or just a chat about what’s available, contact us now.

Why choose eDistance Learning?

The breadth and depth of our portfolio of courses means that we will have a course to interest you. We are committed to your success, and offer advice and support through every step of the process. We have a dedicated team of Professional Course Advisors that can give you access to career and recruitment advice, whilst offering excellent value and quality courses.

Please contact us if you have not found the answer you are looking for.

Course Outline

How is the Course Structured?

DOMAIN 1: Information Security Governance

  • CISM Introduction
  • Information Security
  • Business Goals Objectives and Functions
  • Business Goals and Information Security
  • Information Security Threats
  • Information Security Management
  • Identity Management
  • Data Protection
  • Network Security
  • Personnel Security
  • Facility Security
  • Security Compliance and Standards
  • Information Security Strategy
  • Inputs and Outputs of the Information Security Strategy
  • Process in an Information Security Strategy
  • People in an Information Security Strategy
  • Technologies in an Information Security Strategy
  • Logical And Physical Information Security Strategy Architectures
  • Information Security And Business Functions
  • Information Security Policies And Enterprise Objectives
  • International Standards For The Security Management
  • I S O- I E C27000 Standards
  • International Info Government Standards
  • Information Security Government Standards In The United States
  • Methods Of Coordinating Information Security Activities
  • How To Develop An Information Security Strategy
  • Information Security Governance
  • Role Of The Security In Governance
  • Scope Of Information Security Governance
  • Charter Of Information Security Governance
  • Information Security Governance And Enterprise Governance
  • How To Align Information Security Strategy With Corporate Governance
  • Regulatory Requirements And Information Security
  • Business Impact Of Regulatory Requirements
  • Liability Management
  • Liability Management Strategies
  • How To Identify Legal And Regulatory Requirements
  • Business Case Development
  • Budgetary Reporting Methods
  • Budgetary Planning Strategy
  • How To Justify Investment In InfOSecurity
  • Organizational Drivers
  • Impact Of Drivers On InfOSecurity
  • Third Party Relationships
  • How To Identify Drivers Affecting The Organization
  • Purpose Of Obtaining Commitment To InfOSecurity
  • Methods For Obtaining Commitment
  • I S S G
  • I S S G Roles And Responsibilities
  • I S S G Operation
  • How To Obtain Senior Managements Commitment To InfOSecurity
  • InfOSecurity Management Roles And Responsibilities
  • How To Define Roles And Responsibilities For InfOSecurity
  • The Need For Reporting And Communicating
  • Methods For Reporting In An Organization
  • Methods Of Communication In An Organization
  • How To Establish Reporting And Communicating Channels

DOMAIN 2 Risk Management

  • Risk
  • Risk Assessment
  • Info Threat Types
  • Info Vulnerabilities
  • Common Points of Exposure
  • InfOSecurity Controls
  • Types Of InfOSecurity Controls
  • Common InfOSecurity Countermeasures
  • Overview Of The Risk Assessment Process
  • Factors Used In Risk Assessment And Analysis
  • Risk Assessment Methodologies
  • Quantitative Risk Assessment- Part1
  • Quantitative Risk Assessment- Part2
  • Qualitative Risk Assessment
  • Hybrid Risk Assessment
  • Best Practices For InfOSecurity Management
  • Gap Analysis
  • How To Implement An Info Risk Assessment Process
  • Info Classification Schemas
  • Components Of Info Classification Schemas
  • Info Ownership Schemas
  • Components Of Info Ownership Schemas
  • Info Resource Valuation
  • Valuation Methodologies
  • How To Determine Info Asset Classification And Ownership
  • Baseline Modeling
  • Control Requirements
  • Baseline Modeling And Risk Based Assessment Of Control Requirements
  • How To Conduct Ongoing Threat And Vulnerability Evaluations
  • B I As
  • B I A Methods
  • Factors For Determining Info Resource Sensitivity And Critically
  • Impact Of Adverse Events
  • How To Conduct Periodic B I As
  • Methods For Measuring Effectiveness Of Controls And Countermeasures
  • Risk Mitigation
  • Risk Mitigation Strategies
  • Effect Of Implementing Risk Mitigation Strategies
  • Acceptable Levels Of Risk
  • Cost Benefit Analysis
  • How To Identify And Evaluate Risk Mitigation Strategies
  • Life Cycle Processes
  • Life Cycle- Based Risk Management
  • Risk Management Life Cycle
  • Business Life Cycle Processes Affected By Risk Management
  • Life Cycled- Based Risk Management Principles And Practices
  • How To Integrate Risk Management Into Business Life Cycle Processes
  • Significant Changes
  • Risk Management Process
  • Risk Reporting Methods
  • Components Of Risk Reports
  • How To Report Changes In Info Risk

DOMAIN 3: Information Security Program

  • InfOSecurity Strategies
  • Common InfOSecurity Strategies
  • InfOSecurity Implementation Plans
  • Conversation Of Strategies Into Implementation Plans
  • InfOSecurity Programs
  • InfOSecurity Program Maintenance
  • Methods For Maintaining An InfOSecurity Program
  • Succession Planning
  • Allocation Of Jobs
  • Program Documentation
  • How To Develop Plans To Implement An InfOSecurity Strategy
  • Security Technologies And Controls
  • Cryptographic Techniques
  • Symmetric Cryptography
  • Public Key Cryptography
  • Hashes
  • Access Control
  • Access Control Categories
  • Physical Access Controls
  • Technical Access Controls
  • Administrative Access Controls
  • Monitoring Tools
  • I D Ss
  • Anti- Virus Systems
  • Policy- Compliance Systems
  • Common Activities Required In InfOSecurity Programs
  • Prerequisites For Implementing The Program
  • Implementation Plan Management
  • Types Of Security Controls
  • InfOSecurity Controls Development
  • How TOSpecify InfOSecurity Program Activities
  • Business Assurance Function
  • Common Business Assurance Functions
  • Methods For Aligning InfOSecurity Program With Business Assurance Functions
  • How To Coordinate InfOSecurity Programs With Business Assurance Functions
  • S L As
  • Internal Resources
  • External Resources
  • Services Provided By External Resources- Part1
  • Services Provided By External Resources- Part2
  • Skills Commonly Required For InfOSecurity Program Implementation
  • Identification Of Resources And Skills Required For A Particular Implementation
  • Resource Acquisition Methods
  • Skills Acquisition Methods
  • How To Identify Resources Needed For InfOSecurity Program Implementation
  • InfOSecurity Architectures
  • The S A B S A Model For Security Architecture
  • Deployment Considerations
  • Deployment Of InfOSecurity Architectures
  • How To Develop InfOSecurity Architectures
  • InfOSecurity Policies
  • Components Of InfOSecurity Policies
  • InfOSecurity Policies And The InfOSecurity Strategy
  • InfOSecurity Policies And Enterprise Business Objectives
  • InfOSecurity Policy Development Factors
  • Methods For Communicating InfOSecurity Policies
  • InfOSecurity Policy Maintenance
  • How To Develop InfOSecurity Policies
  • InfOSecurity Awareness Program Training Programs And Education Programs
  • Security Awareness Training And Education Gap Analysis
  • Methods For Closing The Security Awareness Training And Education Gaps
  • Security- Based Cultures And Behaviors
  • Methods For Establishing And Maintaining A Security- Based Culture In The Enterprise
  • How To Develop InfOSecurity Awareness Training And Education Programs
  • Supporting Documentation For InfOSecurity Policies
  • Standards Procedures Guidelines And Baselines
  • Codes Of Conduct
  • N D As
  • Methods For Developing Supporting Documentation
  • Methods For Implementing Supporting Documentation And For Communicating Supporting Documentation
  • Methods For Maintaining Supporting Documentation
  • C And A
  • C And A Programs
  • How To Develop Supporting Documentation For InfOSecurity Policies

DOMAIN 4: Information Security Program Inplementation

  • Enterprise Business Objectives
  • Integrating Enterprise Business Objectives And InfOSecurity Policies
  • Organizational Processes
  • Change Control
  • Merges And Acquisitions
  • Organizational Processes And InfOSecurity Policies
  • Methods For Integrating InfOSecurity Policies And Organizational Processes
  • Life Cycle Methodologies
  • Types Of Life Cycle Methodologies
  • How To Integrate InfOSecurity Requirements Into Organizational Processes
  • Types Of Contracts Affected By InfOSecurity Programs
  • Joint Ventures
  • Outsourced Provides And InfOSecurity
  • Business Partners And InfOSecurity
  • Customers And InfOSecurity
  • Third Party And InfOSecurity
  • Risk Management
  • Risk Management Methods And Techniques For Third Parties
  • S L As And InfOSecurity
  • Contracts And InfOSecurity
  • Due Diligence And InfOSecurity
  • Suppliers And InfOSecurity
  • Subcontractors And InfOSecurity
  • How To Integrate InfOSecurity Controls Into Contracts
  • InfOSecurity Metrics
  • Types Of Metrics Commonly Used For InfOSecurity
  • Metric Design Development And Implementation
  • Goals Of Evaluating InfOSecurity Controls
  • Methods Of Evaluating InfOSecurity Controls
  • Vulnerability Testing
  • Types Of Vulnerability Testing
  • Effects Of Vulnerability Assessment And Testing
  • Vulnerability Correction
  • Commercial Assessment Tools
  • Goals Of Tracking InfOSecurity Awareness Training And Education Programs
  • Methods For Tracking InfOSecurity Awareness Training And Education Programs
  • Evaluation Of Training Effectiveness Relevance
  • How To Create InfOSecurity Program Evaluation Metrics

DOMAIN 5 Information Security Program Management

  • Management Metrics
  • Types Of Management Metrics
  • Data Collection
  • Periodic Reviews
  • Monitoring Approaches
  • K P Is
  • Types Of Measurements
  • Other Measurements
  • InfOSecurity Reviews
  • The Role Of Assurance Providers
  • Comparing Internal And External Assurance Providers
  • Line Management Technique
  • Budgeting
  • Staff Management
  • Facilities
  • How To Manage InfOSecurity Program Resources
  • Security Policies
  • Security Policy Components
  • Implementation Of InfOSecurity Policies
  • Administrative Processes And Procedures
  • Access Control Types
  • A C M
  • Access Security Policy Principles
  • Identity Management And Compliance
  • Authentication Factors
  • Remote Access
  • User Registration
  • Procurement
  • How To Enforce Policy And Standards Compliance
  • Types Of Third Party Relationships
  • Methods For Managing InfOSecurity Regarding Third Parties
  • Security Service Providers
  • Third Party Contract Provisions
  • Methods To Define Security Requirements In S L As Security Provisions
  • How To Enforce Contractual InfOSecurity Controls
  • S D L C
  • Code Development
  • Common Techniques For Security Enforcement
  • How To Enforce InfOSecurity During Systems Development
  • Maintenance
  • Methods Of Monitoring Security Activities
  • Impact Of Change And Configuration Management Activities
  • How To Maintain InfOSecurity Within An Organization
  • Due Diligence Activities
  • Types Of Due Diligence Activities
  • Reviews Of Info Access
  • Standards Of Managing And Controlling Info Access
  • How To Provide InfOSecurity Advice And Guidance
  • InfOSecurity Awareness
  • Types Of InfOSecurity Stakeholders
  • Methods Of Stakeholder Education
  • Security Stakeholder Education Process
  • How To Provide InfOSecurity Awareness And Training
  • Methods Of Testing The Effectiveness Of InfOSecurity Control
  • The Penetration Testing Process
  • Types Of Penetration Testing
  • Password Cracking
  • Social Engineering Attacks
  • Social Engineering Types
  • External Vulnerability Reporting Sources
  • Regulatory Reporting Requirements
  • Internal Reporting Requirements
  • How To Analyze The Effectiveness Of InfOSecurity Controls
  • Noncompliance Issues
  • Security Baselines
  • Events Affecting The Security Baseline
  • InfOSecurity Problem Management Process
  • How To Resolve Noncompliance Issues

DOMAIN 6: Incident Management and Response

  • Incident Response Capability
  • Components of Incident Response
  • BCP
  • BIA Phose
  • Coop
  • DRP
  • Alternate Sites
  • Develop ABCP
  • Develop ADRP
  • MTD
  • RPO
  • RTO
  • Data Backup Strategies
  • Data Backup Types
  • Data Restoration Strategies
  • Info Incident Management Practices
  • IRP
  • trigger Events nd Tpes of Trigger Events
  • Methods of Containing Damage
  • How to Develop an IRP
  • Escalation Process
  • Notification Process
  • IRT
  • crisis Communication
  • How to Establish an Escalation Process
  • Internal Reporting Requirements
  • External Reporting Requirements
  • Communication Process
  • How to Develop a Communication Process
  • IRP and DRP
  • IRP and BCP
  • Methods of Identifying Business Resources Essential to Recovery
  • How to Integrate an IRP
  • Role of Primary IRT Members and Role of Additional IRT Members
  • Response Team Tools and Equipment
  • How to Develop IRT's
  • BCP Testing
  • Disaster Recovery Testing
  • Schedule Disaster Recovery Testing
  • Refine IRP
  • How to Test an IRP
  • Damage Assessment
  • Business Impacts Caused by Security Incidents
  • How To Manage Responses To InfOSecurity Incidents
  • Computer And Digital Forensics
  • Forensic Requirements For Responding To InfOSecurity Incidents
  • Evidence Life Cycle
  • Evidence Collection
  • Evidence Types
  • Five Common Rules Of Evidence
  • Chain Of Custody
  • How To Investigate An InfOSecurity Incident
  • P I R Methods
  • Security Incident Review Process
  • Investigate Cause Of A Security Incident
  • Identify Corrective Actions
  • Reassess Security Risks After A Security Incident
  • How To Conduct A Post- Incident Review
  • Pre Test- Test Strategy
  • Post Test

Course Fees

Our aim is to provide you with the best deal available, therefore any registration fee, certification fee and full tutor support is included in the course price for you. The enrolment fee for the CISM home study course is £225, though for a limited time we are offering you the opportunity to pay only £180 which is a 20% discount if you enrol online and pay in full.

Please Note: The course fee needs to be paid in full. There is no installment option for our IT courses.

Custom Payment Plan

You can propose a custom payment plan below in order to pay for your course. Please use the sliders above the table to configure your custom plan and then fill out the attached form. One of our course advisors will contact you with a decision regarding your plan.

Custom Payment Calculator

Please select the amount you would like to pay each month

Please selection the amount of months you wish to pay over

Monthly Amount
Payment Length (months)

*Please note: One of our course advisors will attempt to create an instalment agreement based on the figures you have entered above, however the actual amount and length of the agreement may vary.

Submit Proposal

Custom Payment Plan

Please enter your details below and one of our course advisors will contact you regarding your request for a custom payment plan

Your suggested monthly payment is & your suggested payment length is months

Delivery Options

With paper and cd-rom course formats, we offer delivery options to many different countries. Please see the table below for more information.

Free £30 £60

Write a review

Your Name:

Your Review: Note: HTML is not translated!

Rating: Bad           Good

Enter the code in the box below:

About Us

About Us

We bring together professionals in the distance learning market with around 50 years’ experience in both home learning and customer service, to bring you excellence. We have a comprehensive database of courses, containing the most sought-after national and international qualifications with high quality course content.

We offer the solution to the dilemma faced by most adults wishing to further their education :- “how do I fit learning into an already-busy life?”. With Home Study Expert it’s easy. Our courses are all taught via ‘supported home learning’ – so you have the freedom of being able to study any time at any place, with the peace of mind of knowing that a dedicated tutor is on hand. We use the latest and most varied methods – you can contact your tutor by mail, phone, fax or email. And we have formats of courses to best suit you, available in paper, cd-rom form or online.

Find Out More

Support Centre

Signing up for a distance learning course can be a big step but so worthwhile, you will not just improve your earning power, but gain confidence and transferable skills as well!

We want to ensure the end to end experience with Home Study Expert is as simple and straight forward as possible, and have provided a summary of helpful information and links to ease your journey into a new career.

  • Get In TouchGet In Touch

    We are always happy to hear from you, call, email, fax, live chat or complete an online form. We have a strict SLA to respond to an enquiry within 4 working hours.

  • Get In TouchPayment & Delivery

    Information regarding accepted payment types, terms of payment, delivery times and any associated charges.

  • Get In TouchPrivacy Policy

    Your privacy is important to us so we have set out a detailed charter on customer privacy and how we handle your data and how we protect it.

  • Get In TouchTerms & Conditions

    We always encourage our customers to review our terms and conditions before enroling on a course. This is to protect you as well as to ensure there is a clear understanding of our agreement with you.

  • Get In TouchGift Vouchers

    What a great idea for a business incentive or just as a present - do you know someone who could benefit with enroling on a distance learning course?

  • Get In TouchStudent Registration

    Once you have signed up for your course, we will send you your student enrolment number, which will then allow you to sign up to the student portal to access tutor support, forums, study guides and meet and chat to other students.

  • Get In TouchQualifications

    We understand the importance of having the right qualifications that will allow you to advance your career. This is the standard that an employer will benchmark your success upon. view our nationally recognised qualifications.

  • Get In TouchFAQ's

    Visit this section to get answers to the most commonly asked questions, if you can't find the answer to a questions - please do get in touch. You'll frequently asked questions relating to this course in the course features section above.

Course Finder

Use our search function below to find a course that's specific to your needs.

Course Options
Course Attributes

Home Study Experts

Home Study Experts

If you would like to talk to us about your choice of course please don't hesitate to contact one of our team of Course Advisors to discuss your options.

Complete the enquiry form opposite with the details of the course you are interested in and a specialist advisor in your chosen subject will call you back at your requested time.

Alternatively, talk to a Course Advisor through our Live Chat facility to the right hand side of this page, you can call us on local rate 0844 357 1110 or call us free on Skype. 8.00am-8.00pm seven days a week.

If you are calling from outside the UK, please call 0044 705 006 2221, use Live Chat or complete the enquiry form and we will call you back.

verification image, type it in the box

Easy Payment Plan

Easy Payment Plan

Are you looking to spread the cost of your course? Pay a deposit online and then spread the balance over four monthly payments.

We aim to make it as easy as possible for you to get started on your chosen course. Simply download the instalment agreement below, complete in full and return the signed agreement to accept the terms and conditions as set out here. Upon receipt of this agreement we will dispatch your course materials, tutor contact details, study guide and student portal login information within 48 hours.

Find Out More

Business Customers

Business Customers

Home Study Expert delivers high-quality online and paper based distance learning training services. Transform the skills of your employees and improve business performance and profitability.

Discover the benefits of learning with eDistance Learning and see how we can help your company. Call 0844 357 1110 or fill in the contact form below.

Once we understand what your business needs are, we can offer you expert training and funding advice. The helpline is open from 8am to 8pm, everyday.

Find Out More

Price Match

Price Match

When you enrol with us we want you to know you're getting the best course with the most comprehensive support structure at the best price. We're proud to offer you our Price Match Guarantee.

It's simple. We're so confident that we're offering you a fantastic deal - we'll refund the difference if you find the exact same course on any other UK website within 7 days of your purchase.

To request a price match refund, please fill out the form below including: the name of the website where the product is cheaper, your full name, telephone number and email if available. You will receive an automated acknowledgment of your request, and we will review the details and reply to you via email within three business days.

Upon our acceptance of your refund request, please allow 14 days for delivery of your refund which will be credited as a second transaction on your credit or debit card. The time taken for the refund to appear on your credit or debit card statement varies so the amount may not show on your next statement.

Please note: to avoid potential abuse and to enable us to honour our price-match refund guarantee to genuine customers, the acceptance of all refund requests is ultimately at the discretion of Home Study Expert, who will at all times act reasonably and in good faith.

verification image, type it in the box

Ask A Question

Course Code
Award Level Training Course
Format Online
Study Time Self Paced
Entry Requirements No Entry Requirements
£225.00 £180.00
£180.00 deposit + 4 monthly payments of £36.00 £0.00 £0.00 £0.00
Ex Tax: £180.00

Choose Your Enrolment Options

* Payment Option:

* Course Format:

* Delivery Options:

Add Ons:

Enrol Now
Next Step Next Step Next Step Next Step Previous Step Previous Step Previous Step Previous Step
Download Course Brochure
Notice: Undefined variable: downloads in /home4/tribecag/public_html/edistance/catalog/view/theme/journal2/template/product/product.tpl on line 2318