Get ahead.


Get the online training, certification programs, and policy tool kits
you need to advance your career.

No image set

2026 CISM SuperReview (180 Days)

SKU CISM. 180-Day Subscription to Allen Keele's CISM certification exam online preparation. Use promotion code "SAVE25" at checkout to save 25%! As this is a subscription-based course, no permanent download of course materials is provided. This subscription does NOT auto-renew.
Sales price $795.95
Discount
Total discount:

Description

Use promotion code "SAVE25" at checkout to save 25%!

 Terms of Service: Unlimited utilization of this course is provided for a single user for 180 days in duration from the time of purchase according to the terms of Certified Information Security's End-User License Agreement. The subscription expires 180 days after purchase, regardless of when you first use the course. Subscription time is not banked, and cannot be "frozen", deferred, or re-scheduled. As this is a subscription-based course, no permanent download of course materials is provided.  This subscription does NOT auto-renew.
 

Online CISM Certification Exam Training for the ISACA CISM exam

Get the same preparation over 6,400 CISM candidates across the world have used to prepare for the rigorous CISM examination since 2007. With this web-based course, you will have 24x7 access to the most recognized and qualified exam preparation in the world. Personally prepared, constantly updated, and presented by #1 best-selling ISACA exam prep author Allen Keele, this course provides everything you need to be able to pass the on your first attempt.

Proven CISM certification preparation

 cism exam  Prepare with the expert. Custom prepared and narrated by the world's leading CISM training exam prep expert and authorAllen Keele. Fully updated to the latest exam revision.
cism exam Access to expert support. All questions answered by CISM exam expert Allen Keele. Direct one-on-one telephone mentoring support by CISM exam expert Allen Keele at +1 (904) 406-4311.
cism exam Guaranteed with no conditions. Free extra 6-month extension if you don't pass your exam during the first 6-months - even if you never completed your course first!
cism exam Practice exams are integrated throughout course with over 800 unique questions plus four 150-question timed mock exam simulations for final preparation. Study and practice are combined for maximum effect.
cism exam Precision streamlined to the exam. No time wasted in learning content not on the exam.
cism exam No additional study material required. 
cism exam CPE Certificate. Signed certificate awarding 40 CPE credits available upon full course completion.
Demo Button Try a real course lesson now! No registration required.

 

Course contents:

  • 4 Modules of content thoroughly covering all of the new exam objectives in all four CISM exam domains
    1. Information Security Governance
    2. Information Security Risk Management
    3. Information Security Program 
    4. Incident Management
  • Challenge yourself with an ISACA exam simulation! This course includes four timed mock CISM exams.
  • Multiple practice exams containing over 800 unique non-redundant practice questions.
cism exam Continuing Professional Education (CPE) Credit: Upon course completion, we will provide you with access to a certificate and transcript for 40 continuing professional education (CPE) credits. Once you have earned your Certified Information Security Manager credential, you need to earn 40 CPE credits per year. This is a very flexible and affordable solution for maintaining your certification. isaca cism cissp certification

Course completion calculation

The primary purpose of this course is more than to simply teach you best practices of systems auditing as advocated by ISACA. The single primary objective of this course is to ensure that you succeed in passing your ISACA certification exam. Practice exams are a core component of this certification exam preparation training. As such, passing these practice exams is absolutely essential to achieving the primary purpose of assuring your success on your ISACA official examination. Course completion requires completing all domain-ending practice exams and final comprehensive assessment practice exams with a score of 95% or greater. Individual lesson pre- and post-assessments are not recorded. Completion of a course domain is indicated by the appearance of a "✅" in the score column in your grade book. 

Obtaining your certificate

Once you have successfully completed all modules of your course, please be sure to download and retain your course completion certificate and transcript from your course grade book. The system also automatically emails you a copy of your certificate the moment your achieve fully completed status for all modules. Certificates earned are only available for the duration of your active subscription. CIS does not maintain or archive certificates for expired course subscriptions.

Note: This CISM exam preparation course is for exam preparation only. It does NOT include the ISACA CISM exam itself. The ISACA exam must be separately registered and purchased directly at www.isaca.org

separator

1. What are the requirements for CISM certification?

To be eligible for Certified Information Security Manager (CISM) certification, candidates must pass the CISM exam, have at least five years of qualifying work experience, and agree to ISACA's code of ethics and continuing education policies. 

To earn the CISM credential, you must meet the following criteria: 

  1. Pass the CISM exam. The exam has 150 multiple-choice questions covering four domains: Information security governance, information security risk management, information security program development and management, and information security incident management. You must pass within five years of applying for certification.
  2. Complete the work experience requirement. A minimum of five years of professional information security management experience within the 10 years before your application is required. This must include at least three years in an information security management role and work in at least three of the four CISM exam domains.
  3. Adhere to the Code of Professional Ethics. You must agree to and abide by ISACA's ethical guidelines.
  4. Apply for certification. Submit the CISM certification application to ISACA after meeting all requirements. 

2. How should I prepare for the CISM exam? How long does it take?

Preparation generally involves creating a study plan, using Certified Information Security's CISM SuperReview comprehensive exam preparation (this program), and developing an information security manager's perspective.

How long does it take?

Preparation time varies depending on experience. While many candidates typically spend 100 to 150 hours studying over two to six months with convential ISACA Review Manual preparation, CIS' CISM SuperReview preparation effectively reduces the preparation time required. Most students complete this certification exam preparation program in only 30 - 40 hours, and are able to pass the certification exam on the first attempt.

3. What jobs can I get with CISM?

A Certified Information Security Manager (CISM) certification can lead to a variety of senior-level management and executive roles in cybersecurity, information technology, and risk management. The certification is designed for experienced professionals who manage, design, oversee, and assess an organization's information security. 

Executive leadership

Chief Information Security Officer (CISO): A CISO is a senior-level executive who oversees the entire information security program for an organization, including designing policies, managing security teams, and ensuring compliance with regulations.

  • Chief Information Officer (CIO): A CIO is responsible for all technology initiatives and strategies within a company. The CISM's focus on IT governance and risk management is highly relevant for this role.
  • Director of Security/Information Technology: A CISM is a pathway to high-level director roles where you manage security or IT infrastructure at an enterprise level. 

Management and governance

  • Information Security Manager: This is a primary role for CISM-certified professionals. You are responsible for safeguarding the organization's IT infrastructure, developing data protection policies, and managing security operations.
  • IT Risk Manager: These professionals identify, assess, and mitigate security risks that could impact business functions. The CISM provides fundamental skills in risk assessment and translating technical vulnerabilities into business risks.
  • Information Security Program Manager: In this position, you manage the development, implementation, and maintenance of an organization's information security programs.
  • IT Audit Manager: While the Certified Information Systems Auditor (CISA) is more focused on auditing, a CISM can qualify you to manage IT audit and compliance teams. The two certifications are often complementary. 

Consulting and specialized roles

  • Information Security Consultant: As a consultant, you can provide expert advice to organizations on cybersecurity frameworks, compliance, and best practices. The CISM is highly valued for this role, especially for freelance or senior positions.
  • Governance, Risk, and Compliance (GRC) Analyst: This role focuses on ensuring an organization's security practices align with internal standards and external regulatory requirements, an area where the CISM's expertise is central.
  • Security Architect: A CISM-certified professional can leverage their managerial skills to become a security architect, designing and improving security infrastructure across the enterprise. 

Progression to management from technical roles

For those transitioning from hands-on technical positions, the CISM provides a path to leadership. This includes experienced professionals in roles such as: 

  • Cybersecurity Engineer
  • Systems Analyst
  • Security Analyst 

4. Is CISM certification worth it?

The Certified Information Security Manager (CISM) certification is widely considered a worthwhile investment for experienced cybersecurity professionals aiming for leadership roles. It is especially valuable for those who wish to move from a technical career path into a management-focused position.

Benefits of CISM certification

  • Career advancement: The CISM is explicitly designed for managers, validating your expertise in information security governance, program development, incident management, and risk management. This qualifies you for senior positions like CISO, Security Director, and IT Security Manager.
  • Higher earning potential: CISM is consistently ranked among the highest-paying IT certifications globally. In the U.S., CISM-certified professionals can earn an average salary well into six figures, with compensation increasing significantly with experience.
  • High demand: Organizations worldwide are facing a significant talent gap for security leadership. CISM certification is frequently listed as a preferred or required credential for many management openings, putting certified professionals in a strong negotiating position.
  • Increased credibility: Holding the CISM, offered by the respected ISACA organization, demonstrates to employers that you have the strategic and managerial knowledge to effectively lead and align security programs with business objectives.
  • Networking opportunities: Certification includes access to ISACA's global professional community, which offers valuable networking and career growth prospects. 

5. What are other respected certification alternatives to consider besides or in addition to CISM?

CISM certification has been around for over 20 years, and is very well-recognized accordingly. Many job opportunities consider CISM certification for candidacy, and after 20 years in the market, many people already have the credential. Consequently, the credential is not the professional differentiator it once was since so many professionals already have it.

Other popular and more exclusive high-profile professional credentials related to CISM include:

Establishing, integrating, managing, and auditing enterprise risk management

Implementing and/or auditing cybersecurity programs, risks, and controls

Establishing, integrating, managing, and auditing AI systems, risks, and controls