CSM Cyber I Certification

Develop the knowledge and skills to protect the end points. Cybersecurity and SAM are two emerging practices as an organization begins to secure their IT environment.  SAM and IT Security practitioners must Protect the End Points, and securing and managing software properly is essential to such a mission.  This course is designed to give those managing software and IT infrastructures the knowledge necessary to develop both controls and policies to help create one’s organizational environment as safe as possible from cyber-attacks.  Notes:  Student is suggested to have already completed the CSM.  The CSM Cyber I is its own certification, but may count towards the ESM Pro accreditation.

What You Will Learn

Who Should Attend

  • How SAM Relates to Cybersecurity
  • Understanding Security Vulnerabilities when Software Assets are Mismanaged
  • Roles of SAM and IT Security
  • Preventative Deployment Tactics and Tagging
  • Develop a Plan to Create a Proactive Secure Software Asset Management Initiative

Employees that are involved with the management of software and concerned about IT Security:  Software Asset Managers; Software Licensing Managers; Software Compliance Managers; IT Administrators; IT Asset Managers; IT Procurement Managers; IT Service Managers; Purchasing Agents; Legal Representatives; HR Personnel; and Chief Security Officers.

CSM Cyber I Syllabus

Unit I: Cybersecurity and Relation to SAM

  • Definition of Cybersecurity
  • How Cybersecurity Relates to the SAM Practitioner
  • Course Objectives
  • Hypothetical:  Non-Secure SAM Organization

Unit II: Understanding the Landscape

  • Data Protection and Integrity
  • Adversaries – SAM on Offense
  • Defenders – Protecting the End Points
  • Users – Human Elements
  • Technology – Clean Up and Defense
  • Hypothetical:  User Interference Simulation

Unit III: Protecting the End Points

  • Malware to Phishing – Concerns for the SAM Practitioner
  • Challenges to SAM
  • Patch Management Relevance
  • Essential Admin Controls
  • Exercise:  Spear Phishing Bait

Unit IV: Deter, Protect, Detect, Adapt

  • Deter Attacks
  • Protect Devices to Users to Data
  • Technical Detection
  • Adapt to Attacks and Set Up Proactive Controls
  • Hypothetical:  Patchwork Mess

Unit V: Securing the Cloud

  • SaaS Stipulations for Major Contracts
  • Validating Hosting Security
  • Multiple Authenticating Check Points
  • Hypothetical:  Lazy Password Mishaps
  • Quiz – Knowledge Check

Unit VI: Preventative Deployment

  • Deployment Procedures
  • Comply and Secure the Software
  • Tagging One’s Environment
  • Hypothetical:  Secure Environment/Tagged Environment

Unit VII: Roles of SAM and IT Security

  • Secure Software Management Team
  • Roles of Each Team Member
  • Evaluate Organization Current Security Status
  • Hypothetical:  Organization Open Environment – From BYOD to Loose Install Checks

Unit VIII: Planning Ahead

  • Building Blocks to a Secure Software Environment
  • Risk Management
  • Contingency Planning
  • Awareness, Education, Enforcement
  • Hypothetical:  SOS We Need a Plan
  • Quiz – Final Knowledge Check

Pricing and Delivery Methods

Live - $695

Private Training - See Pricing

Certification Exam

The online exam is a must for the Certification designation.  Student must have completed the Certification Course before taking Certification Exam, otherwise Exam results will be invalid with no refund.  For Onsite or Private Seminars email instructions will be sent to student immediately following any Live Course Training and the student will have 30 Day Access to the Exam once email has been sent.  For OnDemand Courses and Exams, 30 Day Term begins immediately after receipt of payment.

  • 30 Day Access Term
  • Student has 2 attempts to pass Exam during Access Term Period (80% to pass)
  • Student will be given option to print Certificate upon passing the exam within LMS (Learning Management System)

If student fails to pass the certification exam or access term expires, student may re-purchase the exam for a $50 fee.  Please contact support@licenselogic.com for any re-purchases.


The CSM Cyber I contains the class materials provided for exercises and instruction (PDF).

Re-Certification Information

Students must Re-Certify once every 3 Years.  If a major update to Certification Course occurs before the student’s 3-Year term is expired, an announcement will occur and students can determine if they need to achieve the updated Certification.  See the Re-Certification page for further information.

NOTE:  For past students with an expiration on their respective Certification certificate see Re-Certification page to find out more information on how to receive an updated certificate.

ESM Pro Information

Student must complete all Certifications (CSM, ASM, ESM; plus one of the following certifications:  CCLM, CSLN or CSM Cyber I) in order to achieve the ESM Pro Certification designation.  Upon completion of all Certifications Student may request an ESM Pro certificate by contact support@licenselogic.com.

Error: Please enter a valid email address

Error: Invalid email

Error: Please enter your first name

Error: Please enter your last name

Error: Please enter a username

Error: Please enter a password

Error: Please confirm your password

Error: Password and password confirmation do not match