Skip to Main Content
CISMP Training Course

CISMP Training Course

  • Learn CISMP concepts, approaches and technique in order to give delegates relevant knowledge of information security management.
  • Develop the foundations required for progression towards the CISSP® and CISM® examinations.
  • Train without the travel with our Live Online courses giving you all the benefits of classroom study without the hassle, uncertainty and cost of travel.
  • Passing the course exam, you will achieve the internationally recognised BCS Foundation Certificate in Information Security Management Principles qualification.
Step 1 - Select location
Step 2 - Select date
Precio 2.525,00 €
Step 3 - Select quantity

CISMP training course outline

CISMP covers a range of information security concepts, approaches and techniques. It is a globally established and internationally recognised Foundation-level qualification that demonstrates a good knowledge of information security management.

Accredited by the BCS, the Chartered Institute for IT, this course demonstrates your knowledge and understanding of information security principles and should be attended by anybody whose job has any information security elements or those looking to move into a career in information security. Delivered by an experienced cyber security consultant, our five-day training course prepares you for the CISMP exam and enables you to put your new knowledge and skills to work instantly.

CISMP is acknowledged across the UK and is approved by the government in the Certified Professional (CCP) training scheme.

CISMP instructor-led online training course benefits

 A complete introduction to BCS

You’ll receive detailed instruction in all areas of the BCS syllabus, preparing you for the CISMP exam.

 Delivered by professionals

The course is delivered by an experienced cyber security consultant.

Who should attend this course?

This course is suitable for individuals who have information security responsibilities on a daily basis, or who are considering moving into an information security role.  

  • GRC consultant
  • IT/information security manager
  • IT/information security analyst
  • Director
  • IT manager
  • Project manager
  • Consultant
  • Infrastructure engineer

Your learning path

Find out how the CISMP Training Course will help you start or enhance your knowledge and career.

This course is an essential component of the following learning paths:

Image containing Information Security Learning Path

Why choose IT Governance for your training needs?

  • We’re internationally recognised as the authority on ISO 27001 – Our team led the world’s first ISO 27001 certification project, and since then we have trained more than 8,000 professionals on information security management system (ISMS) implementations and audits.
  • Trained by industry experts – our trainers are working consultants with years of practical, hands-on experience.
  • Choose the method that suits you – we offer classroom, Live Online, distance learning, e-learning and in-house training options.
  • Access your training anywhere – all our course materials are provided as a digital copy, allowing you to access them anywhere and at any time. Documents will be made available 20 days before your course.
  • Business solutions to suit you – whether you’re a multinational wanting us to manage all your training needs or a small business wishing to boost your workforce skills, we offer a range of training solutions.
Course details

What does this training course cover?

Participants gain a solid understanding of risk management, technical controls, legal frameworks, physical security, international standards and business continuity. You will learn:

  • Why information security is becoming increasingly important not only in the IT community but also in the business community at large;
  • The threats and vulnerabilities that result in risks;
  • The threats and vulnerabilities that apply specifically to IT systems;
  • How an organisation must assess risks in terms of the impact on the organisation should the risk materialise;
  • How to determine the most appropriate response to a risk and the activities required to effectively manage risks over time;
  • How risk management should be implemented in an organisation;
  • The controls that may be used to manage risks;
  • The importance of appropriate training for all those involved with information;
  • Threats from malware;
  • The impact of those threats on networks and other communications systems;
  • The different approaches to information security required when dealing with outsourced or other external facilities providers;
  • The importance of effective information security in all networked environments where there is information storage, processing or access being provided;
  • The importance of appropriate audit and review processes, of effective change control and of configuration management;
  • The differences between open source and proprietary solutions, commercial off-the-shelf and bespoke systems, and certified and noncertified systems – and what they mean for security;
  • The techniques involved in reducing security risks in the development of code;
  • The environmental risks to information in terms of the need, for example, for appropriate power supplies, protection from natural risks (fire, flood, etc.), and in an organisation’s everyday operations;
  • The differences between and the need for business continuity and disaster recovery;
  • The important aspects of incident investigation and how forensic evidence may be preserved; and
  • The basic concepts and uses of cryptography.

What’s included in this course?

  • Full course materials (digital copy provided as a PDF file).
  • The BCS Information Security Management Principles textbook.
  • The BCS Foundation Certificate in Information Security Management Principles exam.
  • A certificate of attendance.

What equipment should I bring?

This course is delivered as a WebEx Live Online session. Anyone booked on this course is expected to have a reliable Internet connection at their home or office. You will need to take the exam on a PC, Mac or laptop. Docked devices cannot be used when sitting the exam.

To ensure that the WebEx client works properly on your computer, we recommend using the test session functionality offered by WebEx.

The exam is taken via Questionmark. For more information about logging in for your exam, click here.

The exam is remotely proctored. There is information about taking the exam within the course materials, but you can read more about remotely proctored exams from BCS here >>

Course duration and times

Day 1: 9:30 am–4:30 pm
Day 2: 9:15 am–4:30 pm
Day 3: 9:15 am–4:30 pm
Day 4: 9:15 am–4:30 pm
Day 5: 9:15 am–3:00 pm

CPD/CPE points

This course is equivalent to 35 CPD/CPE points.

If you work in the public sector, or supply services to the public sector, then the CISMP qualification is particularly important. It is part of the CCP Scheme, licensed by the NCSC (the National Cyber Security Centre, which is a part of GCHQ, the Government Communications Headquarters). The CCP Scheme has been developed to provide independent assessment and verification of information assurance professionals working in the public sector. It also provides a clearly defined career development path.

In addition, all successful BCS candidates are eligible for a year’s free Associate Membership, enabling them to get more from their professional certification and support their career development.

Exams and qualifications

CISMP exam

IT Governance is a BCS Accredited Training Partner and is authorised to manage the exam for the BCS Foundation Certificate in Information Security Management Principles.

The exam is taken via the BCS E-Professional Portal at the end of day 5. Candidates must correctly answer a minimum of 65 out of 100 questions.

  • Delivery method: Online
  • Duration: 120 minutes
  • Questions: 100
  • Format: Multiple choice
  • Pass mark: 65%

This course is equivalent to:


CPD points

What qualifications will I receive?

BCS Foundation Certificate in Information Security Management Principles.

This qualification is recognised across the UK as an essential first step on the ladder to a successful information security career and is approved by the UK government and the MOD in the CCP Scheme.

The CCP Scheme is an independent assessment and verification process for those working in cyber and information security. It is the UK government’s approved standard of competence.

Do I need to bring proof of identity?

Delegates must have a form of photographic ID with them as the invigilator may request to check it prior to the exam.

How will I receive my exam results and certificates?

  • Provisional exam results will be available immediately on completion of the exam. Confirmed exam results will be issued within ten working days from the date of the exam.
  • Certificates for those who have achieved a passing grade will be issued within ten working days from the date of the exam.
  • Results notifications and certificates are sent directly to candidates by the relevant exam board in electronic format; please note that hard copy exam certificates are not issued.

Can exams be retaken?

Yes, if you are unsuccessful on the first attempt you can retake the exam for an additional fee. You can email us to schedule the retest for the exam.


Are there any prerequisites for this course?

Although there are no formal entry requirements, we assume that all participants have some IT knowledge.

Is there any recommended reading?

As well as reading the BCS Information Security Management Principles, provided free with this course, we recommend you read one of the following:

Opiniones de clientes