Skip to main content

Instructor-Led CISM by GW RevU (6w)

ABOUT THIS COURSE

Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager. CISM can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators. 

This certification indicates expertise in information security governance, program development and management, incident management and risk management.  

Content in this course is: 

  • Aligned with the CISM job practice. 
  • Adapted from the CISM Review Manual 16th Edition. 
  • Reviewed by subject matter experts that hold the CISM certification. 

ISACA credentials are among the top 10 highest-paying in IT, and CISM is recognized as the preferred credential for IT Managers. 70% of certificate holders experienced on-the-job improvement, and 42% received a pay boost.

ISACA’s CISM certification is DoD 8140 Approved and aligned to the Cyber Workforce Framework (DWCF).

ISACA Logo
Logo for Certified Information Security Manager that has a green circle around the letters CISM with the text for CISM written out to the right.

Overview

Modality

Online

Format

Synchronous

Pricing

$2595.00

Partner

RevU

Topic

CyberForge

Cybersecurity

Featured Courses

Information Technology and Cybersecurity

Information Technology and Engineering

ISACA

Course Dates

  • Dates: 1/19 – 2/27, 2026
  • Live Seminars: TUE & THU (7-9 pm EST)

gw revu Learning Kit includes

Continuing Professional Education (CPE)

Learn more about ISACA’s CPE policy and CISM maintenance.

Meet Our Industry Experts

Learn from top professionals in the field, including military veterans, cybersecurity experts, and specialists in analysis and defense. These instructors bring a wealth of experience from government, industry, and academia, providing you with the most current and relevant insights.

Kevin Dulany
feldhuhn glenn

COURSE REQUIREMENTS

There are no prerequisites for this course. There are, however, specific steps that must be taken to acquire and maintain the CISM certification:

  • Pass the CISM examination;
  • Submit an application for CISM certification;
  • Adhere to the Code of Professional Ethics;
  • Dedicate to the Continuing Professional Education Program; and
  • Comply with the Information Security Standards.

COURSE SYLLABUS

Module 1 – Information Security Governance

Estimated Duration: 3 hours 30 minutes 

Session Topics:  

  • Enterprise Governance Overview 
  • Organizational Culture, Structures, Roles and Responsibilities 
  • Legal, Regulatory and Contractual Requirements 
  • Information Security Strategy 
  • Information Governance Frameworks and Standards 
  • Strategic Planning 

Learning Objectives:  

  • Describe the role of governance in creating value for the enterprise. 
  • Explain the importance of information security governance in the context of overall enterprise governance. 
  • Describe the influence of enterprise leadership, structure and culture on the effectiveness of an information security strategy. 
  • Identify the relevant legal, regulatory and contractual requirements that impact the enterprise. 
  • Describe the effects of the information security strategy on enterprise risk management.
  • Evaluate the common frameworks and standards used to govern an information security strategy. 
  • Explain why metrics are critical in developing and evaluating the information security strategy. 

Module 2 – Information Security Risk Management 

Estimated Duration: 3 hours 45 minutes 

Session Topics:  

  • Risk and Threat Landscape 
  • Vulnerability and Control Deficiency Analysis 
  • Risk Assessment, Evaluation and Analysis  
  • Information Risk Response 
  • Risk Monitoring, Reporting and Communication 

Learning Objectives:  

  • Apply risk assessment strategies to reduce the impact of information security risk.
  • Assess the types of threats faced by the enterprise. 
  • Explain how security control baselines affect vulnerability and control deficiency analysis. 
  • Differentiate between application of risk treatment types from an information security perspective. 
  • Describe the influence of risk and control ownership on the information security program.
  • Outline the process of monitoring and reporting information security risk. 

Module 3: Information Security Program Development and Management 

Estimated Duration: 6 hours 45 minutes 

Session Topics:  

  • IS Program Development and Resources 
  • IS Standards and Frameworks 
  • Defining an IS Program Road Map 
  • IS Program Metrics 
  • IS Program Management 
  • IS Awareness and Training 
  • Integrating the Security Program with IT Operations 
  • Program Communications, Reporting and Performance Management

Learning Objectives:  

  • Outline the components and resources used to build an information security program.
  • Distinguish between common IS standards and frameworks available to build an information security program. 
  • Explain how to align IS policies, procedures and guidelines with the needs of the enterprise. 
  • Describe the process of defining an IS program road map. 
  • Outline key IS program metrics used to track and report progress to senior management.
  • Explain how to manage the IS program using controls. 
  • Create a strategy to enhance awareness and knowledge of the information security program. 
  • Describe the process of integrating the security program with IT operations and third party providers. 
  • Communicate key IS program information to relevant stakeholders. 

Module 4: Information Security Incident Management 

Estimated Duration: 6 hours 0 minutes 

Session Topics:  

  • Incident Management and Incident Response Overview 
  • Incident Management and Response Plans 
  • Incident Classification/Categorization 
  • Incident Management Operations, Tools and Technologies 
  • Incident Investigation, Evaluation, Containment and Communication 
  • Incident Eradication, Recovery and Review 
  • Business Impact and Continuity 
  • Disaster Recovery Planning 
  • Training, Testing and Evaluation 

Learning Objectives:  

  • Distinguish between incident management and incident response 
  • Outline the requirements and procedures necessary to develop an incident response plan. 
  • Identify techniques used to classify or categorize incidents. 
  • Outline the types of roles and responsibilities required for an effective incident management and response team 
  • Distinguish between the types of incident management tools and technologies available to an enterprise. 
  • Describe the processes and methods used to investigate, evaluate and contain an incident. 
  • Identify the types of communications and notifications used to inform key stakeholders of incidents and tests. 
  • Outline the processes and procedures used to eradicate and recover from incidents.
  • Describe the requirements and benefits of documenting events. 
  • Explain the relationship between business impact, continuity and incident response.
  • Describe the processes and outcomes related to disaster recovery. 
  • Explain the impact of metrics and testing when evaluating the incident response plan.

Some programs may offer scholarships, senior discounts, incentives, or employer sponsorship opportunities. Federal financial aid typically does not apply to noncredit programs.

Tuition varies by program. Course fees are listed in the online catalog. Payment is usually accepted by credit card, e-check, or other approved methods.

Most lifelong learning courses are noncredit, designed for professional development or personal enrichment. Select programs may offer academic credit, or continuing education units (CEUs) or an equivalent (e.g. CEH).

A reliable internet connection, computer or tablet, and a current web browser are typically required. Some courses may require a webcam or specialized software, but these requirements will be listed in the course catalog and additional details provided in the course.

Yes, some programs provide CEUs (CEH), which may be used to meet professional licensing or credentialing requirements. CEU information will be listed in each course description.

Courses range from single-day workshops to multi-week programs. The length and schedule of each course is listed in the course catalog.

Most courses are held on the GW campuses in Washington D.C., the DMV area, or at designated learning centers. Location details, including parking and transportation options, are provided upon registration.

If you have selected a GW RevU course, you can simply click on “My Course” at the top of the page to be taken to your Dashboard where all the courses that you have registered for our listed.

On the other hand, if you are participating in a course provided by one of our partners or in a private instance (e.g. CBRNE) you would have been sent an email with the private URL to access your dashboard. Please search your full email (inbox and spam, etc.) to find the registration email from “Noodle”.

Our programs are open to adult learners from all backgrounds. Some courses may be designed for specific audiences (such as working professionals, senior learners, or pre-college students), but most do not require previous academic experience.

Generally, participants must be 18 or older. Some programs offer special enrollment opportunities for high school students or senior citizens—check individual course details for eligibility.

We offer a variety of noncredit courses, professional certificate programs, workshops, and enrichment opportunities. Options range from short seminars to multi-week courses.

Registration is available online through our course catalog. Simply select the course you’re interested in and follow the enrollment instructions.

If a course reaches capacity, you may be placed on a waitlist. We will notify you if a seat becomes available.

Most courses do not have prerequisites. If a program requires specific background knowledge or experience, it will be clearly stated in the course description.

Refunds are available if you withdraw by the published deadline, usually a few days before the course begins. After the deadline, refunds may not be granted. Please review the course-specific refund policy before registering.

Many programs award a certificate of completion. Professional programs may also issue a digital badge or CEU (or equivalent). Degrees are not awarded through lifelong learning courses.

We offer in-person, online, and hybrid courses. Delivery format will be noted in the course listing.

Yes. If you experience issues with logging in, Zoom, or accessing course materials, our support team is available to help.

You can join our mailing list, follow us on social media, or regularly check our website for updates on upcoming programs.

Yes. We partner with organizations to design and deliver customized training programs. Contact our office to discuss your organization’s needs.

Yes. We are committed to providing accessible learning experiences. Please contact us before your course begins to request accommodations. If you have any questions, please do not hesitate to contact us at revu@gwu.edu.