Close

Certified IS Management Systems Lead Implementer

C)ISMS-LI Information Security Management Systems Lead Implementer badge
C)ISMS-LI Information Security Management Systems Lead Implementer logo

Mile2’s Certified Information Security Management Systems Lead Implementer course prepares students to help any organization through the process of implementing an information security management system (“ISMS”) that is compliant with the ISO/IEC 27001:2013 standard. These standards were developed to combat increased  cybersecurity risk. Students will not only implement the ISO/IEC 27001 standard but also help organizations set up controls, processes, and procedures for using a ISMS that will facilitate enhanced information security. 

Increase Earnings Mile2 Cyber Security Certification

Annual Salary Potential

$89,862 AVG/year

The C)ISMS-LI an Elective in the Auditing Course Paths

C)ISMS-LI Key Course Information

Live Class Duration: 3 Days

Language: English

Class Formats:
*  Instructor-led

*  Self-Study

*  Live Virtual Training

Suggested Prior Knowledge:

*  12 months experience with server administration or network administration

*  General understanding of business processes

Applicable Exams:

*  Mile2 C)ISMS-LI

CPEs:  24

C)ISMS-LI Modules

  • Module 1 – Introduction to IT Security
  • Module 2 – Risk Management
  • Module 3 – Understanding of Cryptography
  • Module 4 – Understanding Identity and Access Management
  • Module 5 – Managing Data Security
  • Module 6 – Managing Network Security
  • Module 7 – Managing Server/Host Security& Scanning
  • Module 8 – Application Security for Non-Developers
  • Module 9 – Understanding Mobile Device Security (IoT)
  • Module 10 – Managing Day to Day Security
  • Module 11 – Understating Compliance and Auditing

Who Should Attend

* IS Security Officers
* IS Managers
* Risk Managers
* Auditors
* Information Systems Owners
* IS Control Assessors
* System Managers
* Government Employees

Accreditations

Upon Completion

Upon completion, the Certified Information Security Management Systems—Lead Implementer candidate will  be able to competently take the C)ISMS-LI exam but will also understand ISO/IEC 27001:2013 standards.

Re-Certification Requirements

All  Mile2 certifications will be awarded a 3-year expiration date.

There are two requirements to maintain Mile2 certification: 

1)  Pass the most current version of the exam for your respective existing certification

2)  Earn 20 CEUs (Continuing Education Units) per year. You may submit your CEUs in your Mile2 inbox. These CEUs must fall under “Qualify Continuing Educational Activities).

Visit our certification renewal page for more information.

C)ISMS-LI Exam Information

The Certified Information Security Management Systems—Lead Implementer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions.


Purchase Options:

Course FAQ's

Do I have to purchase a course to buy a certification exam?

NO.  You do not have to purchase a course to purchase a certification exam.  

Do all Mile2 courses map to a role-based career path?

All of our courses can be taken independently.  In order to help guide our students on their cybersecurity career journey we have developed the Mile2 Certification Roadmap.

This helpful resource maps specific courses to Role-based career tracks.

How to I Access My Exam?

1. Go to mile2.com/my-account

2. Select the “Courses” tab
3. Choose the course name that matches the exam you want to take

4. In the course materials, scroll to the bottom of the page to find the certifiation exam.
5.  See this helpful video:

Products Available

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission