3 arrows

Summer-Ready Savings: Up To $500 Off Training 

closeClose

CISM Exam Boot Camp

  • Tuition USD $1,595
  • Reviews star_rate star_rate star_rate star_rate star_half 3709 Ratings
  • Course Code CISM-EX-BC
  • Duration 3 days
  • Available Formats Classroom, Virtual

Designed to be the most clear cut path to obtaining the prestigious CISM certification; this three-day Tactical Security CISM Exam Preparation course offers a comprehensive review of the ISACA CISM topic areas without a lot of "off topic" discussions. Not just CISM test prep – We build real-world security management skills. The course specifically covers the task statements and knowledge statements contained within the four major content areas of CISM including: Information Security Governance (24%), Information Risk Management and Compliance (33%), Information Security Program Development and Management (25%), Information Security Incident Management (18%) After completion of this preparation course, you will be ready to take the internationally-acclaimed CISM certification exam. When it comes to information security, a single differentiator can be all that stands between a multimillion dollar contract or a promotion. ISACA's Certified Information Security Manager (CISM) certification is that differentiator. CISM is recognized around the world as the leading certification for enterprise security management. CISM certified individuals are part of an elite group of professionals who have demonstrated a mastery of the concepts and skills of information security, have the experience to back up the knowledge and are dedicated to continually learning and staying current within the information security field.

  • Master the CISM exam content areas
  • Get CISM test taking skills from our experts
  • Learn to align security to your business processes
  • In-depth coverage: Information Security Governance
  • In-depth coverage: Information Risk Management & Compliance
  • In-depth coverage: Information Security Program Development & Management
  • In-depth coverage: Information Security Incident Management

Who Can Benefit

  • Information security managers
  • Information security practitioners
  • Security auditors
  • Security consultants
  • Chief Information Security Officers (CISOs)
  • Chief Security Officers (CSOs)
  • Privacy officers
  • Security administrators
  • IT managers

Course Details

I. About CISM

Requirements for certification

  • Experience
  • Passing the exam
  • The ISACA Code of Ethics
  • Maintaining certification

II. Information Security Governance

  • 1. Overview
  • Information is a valuable resource in all of its formats
  • Not just IT related
  • We need to converge information security into the business
  • 2. Effective information security governance
  • Business drivers
  • Business support
  • Provide assurance to management
  • 3. Risk objectives
  • Operational risk management
  • We must be able to meet our desired state
  • 4. Build an information security strategy
  • Business model for information security (BMIS)
  • Strategy
  • 5. Controls
  • Types of controls
  • IT controls
  • Non-IT controls
  • Countermeasures
  • Example defense in depth
  • 6. Provide assurance to management
  • ISO 27001
  • Security Metrics
  • 7. Extend security knowledge to everyone
  • Awareness
  • Training
  • Education
  • 8. Action plan to implement strategy
  • Projects
  • Gap analysis
  • Critical success factors

III. Information Risk Management & Compliance

  • 1. Overview
  • 2. Information classification
  • Why should information be classified
  • Developing the program
  • Ownership
  • Responsibilities
  • 3. Methods to evaluate impact of adverse events
  • Business impact analysis
  • 4. Legal and regulatory requirements
  • 5. Emerging threats and vulnerabilities
  • Sources of information
  • 6. Risk management
  • Elements of risk
  • Risk assessment
  • Prioritizing risk
  • Reporting risk
  • Monitoring Risk
  • Risk handling
  • Control baseline modeling
  • Controls
  • Gap analysis
  • Integrate risk management into business and IT processes
  • Compliance
  • 7. Re-assessing risk and changing security program elements
  • Risk management is a cyclic process
  • Triggers to re-assess

IV. Information Security Program Development & Management

  • 1. Overview
  • 2. Align information security program to business function
  • 3. Resource requirements definition
  • Internal
  • External
  • Identify, acquire and manage
  • 4. Emerging trends in information security
  • Cloud computing
  • Mobile computing
  • 5. Security control design
  • 6. Security architectures
  • BSIM
  • 7. Methods to develop
  • Standards
  • Procedures
  • Guidelines
  • 8. Methods to implement and communicate
  • Policies
  • Standards
  • Procedures
  • Guidelines
  • 9. Security awareness and training
  • Methods to establish
  • Methods to maintain
  • 10. Methods to integrate security requirements into organizational processes
  • 11. Methods to incorporate security requirements
  • Contracts
  • 3rd party management processes
  • 12. Security metrics
  • Design
  • Implement
  • Report
  • 13. Testing security controls
  • Effectiveness
  • Applicability

V. Information Security Incident Management

  • 1. Overview
  • 2. Definition
  • Distinction between IR, BCP and DRP
  • Senior management commitment
  • Policy
  • Personnel
  • 3. Objectives
  • Intended outcomes
  • Incident management
  • Incident handling
  • Incident response
  • Incident systems and tools
  • 4. What technologies must an IRT know?
  • Vulnerabilities/Weaknesses
  • Networking
  • Operating systems
  • Malicious software
  • Programming languages
  • 5. Defining incident management procedures
  • Plan for management
  • 6. Current state of incident response plan
  • Gap analysis
  • 7. Develop a plan
  • Plan elements
  • Notification process
  • Escalation process
  • Help desk process for identifying incidents
  • Response teams
  • 8. Challenges in developing a plan
  • 9. BCP/DRP
  • Recovery operations
  • Recovery strategies
  • Recovery sites
  • Basis for recovery site selection
  • Notification requirements
  • Supplies
  • Communication structure
  • Testing the plan
  • Recovery test metrics
  • Test results
  • Post-incident activities and investigations

When does class start/end?

Classes begin promptly at 9:00 am, and typically end at 5:00 pm.

Does the course schedule include a Lunchbreak?

Lunch is normally an hour long and begins at noon. Coffee, tea, hot chocolate and juice are available all day in the kitchen. Fruit, muffins and bagels are served each morning. There are numerous restaurants near each of our centers, and some popular ones are indicated on the Area Map in the Student Welcome Handbooks - these can be picked up in the lobby or requested from one of our ExitCertified staff.

How can someone reach me during class?

If someone should need to contact you while you are in class, please have them call the center telephone number and leave a message with the receptionist.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does ExitCertified deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

Does ExitCertified deliver group training?

Yes, we provide training for groups, individuals, and private on sites. View our group training page for more information.

Course trainer was excellent, content was well organized. However, labs should be instructor lead versus on your own. Much time is wasted for newbees in getting acclimated to tool set, AWS environment, navigating and setting up things to complete tasks. This was my third class and I was barely able to finish most of the labs. (The first 2 classes I only finished one lab exercise for the 2 together.)

The lady at the front really nice. Everthing was always stocked up: Helpful

Presented in an easy way to digest information. Labs tied together the learnings.

It was a good overview, but I feel like I need a lot more studying to be able to pass the test

It was a great class taught by Ruben. It was great the way he used his experience and use cases to communicate to the class.

6 options available

undo
  • Jul 20, 2021 Jul 22, 2021 (3 days)
    Location
    Virtual
    Language
    English
    Time
    8:30 AM 4:30 PM EDT
    Enroll
    Enroll
    SAVE on this course -  Promo Code: SUMMER500
  • Aug 23, 2021 Aug 25, 2021 (3 days)
    Location
    Virtual
    Language
    English
    Time
    8:30 AM 4:30 PM EDT
    Enroll
    Enroll
    SAVE on this course -  Promo Code: SUMMER500
  • Sep 14, 2021 Sep 16, 2021 (3 days)
    Location
    Virtual
    Language
    English
    Time
    8:30 AM 4:30 PM EDT
    Enroll
    Enroll
    SAVE on this course -  Promo Code: SUMMER500
  • Oct 19, 2021 Oct 21, 2021 (3 days)
    Location
    Virtual
    Language
    English
    Time
    8:30 AM 4:30 PM EDT
    Enroll
    Enroll
  • Nov 15, 2021 Nov 17, 2021 (3 days)
    Location
    Virtual
    Language
    English
    Time
    8:30 AM 4:30 PM EST
    Enroll
    Enroll
  • Dec 13, 2021 Dec 15, 2021 (3 days)
    Location
    Virtual
    Language
    English
    Time
    8:30 AM 4:30 PM EST
    Enroll
    Enroll
Contact Us 1-800-803-3948
Contact Us
FAQ Get immediate answers to our most frequently asked qestions. View FAQs arrow_forward