Information Security Training Icon

CISM Exam Boot Camp


3 Days Classroom Session   |  
3 Days Live Online
Classroom Registration
Individual:
$1895.00
Group Rate:
$1695.00
(per registrant, 2 or more)
GSA Individual:
$1383.35
Live Online Registration
Live Online:
$1895.00
Private Onsite Package

This course can be tailored to your needs for private, onsite delivery at your location.

Request a Private Onsite Price Quote

Professional Credits

IIBA (CDU)

ASPE is an IIBA Endorsed Education Provider of business analysis training. Select Project Delivery courses offer IIBA continuing development units (CDU) in accordance with IIBA standards.

PMI (PDU)

Select courses offer Leadership (PDU-L), Strategic (PDU-S) and Technical PMI professional development units that vary according to certification. Technical PDUs are available in the following types: ACP, PBA, PfMP, PMP/PgMP, RMP, and SP.

This course offers:
    19.00 PMP/PgMP Technical PDUs
    2.00 PMI Leadership PDUs

21
PMI PDUs
Certification
Overview

Designed to be the clearest-cut path to obtaining the prestigious CISM certification; this three-day Tactical Security CISM Exam Preparation course offers a comprehensive review of the ISACA CISM topic areas without a lot of "off-topic" discussions.

The course specifically covers the task statements and knowledge statements contained within the four major content areas of CISM including:

  • Information Security Governance (24%)
  • Information Risk Management and Compliance (33%)
  • Information Security Program Development and Management (25%)
  • Information Security Incident Management (18%)

After completion of this preparation course, you will be ready to take the internationally-acclaimed CISM certification exam. When it comes to information security, a single differentiator can be all that stands between a multimillion-dollar contract or a promotion. ISACA's Certified Information Security Manager (CISM) certification is that differentiator. CISM is recognized around the world as the leading certification for enterprise security management. CISM certified individuals are part of an elite group of professionals who have demonstrated a mastery of the concepts and skills of information security, have the experience to back up the knowledge and are dedicated to continually learning and staying current within the information security field.

To find a testing location near you, please visit www.isaca.org/examlocations.

In this CISM Training Course, You Will:

  • Master the CISM exam content areas
  • Get CISM test-taking skills from our experts
  • Learn to align security to your business processes
  • Gain In-depth coverage on Information Security Governance, Information Risk Management & Compliance, Information Security Program Development & Management, and Information Security Incident Management
Upcoming Dates and Locations
All Live Online times are listed in Eastern Time Guaranteed To Run
Request a quote for private onsite training Request
May 11, 2020 – May 13, 2020    8:30am – 4:30pm Live Online Register
May 11, 2020 – May 13, 2020    8:30am – 4:30pm Raleigh, North Carolina

ASPE Training
2000 Regency Parkway
Suite 335
Cary, NC 27518
United States

Register
Jun 8, 2020 – Jun 10, 2020    8:30am – 4:30pm Live Online Register
Jun 8, 2020 – Jun 10, 2020    8:30am – 4:30pm Washington, District of Columbia

Attune, Formerly Microtek-Washington, DC
1110 Vermont Avenue NW
Suite 700
Washington, DC 20005
United States

Register
Jul 13, 2020 – Jul 15, 2020    8:30am – 4:30pm Minneapolis, Minnesota

Embassy Suites Airport
7901 34th Avenue South
Bloomington, MN 55425
United States

Register
Jul 13, 2020 – Jul 15, 2020    9:30am – 5:30pm Live Online Register
Aug 10, 2020 – Aug 12, 2020    8:30am – 4:30pm San Diego, California

San Diego Training and Conference Center
450 B Street
Suite 650
San Diego, CA 92101
United States

Register
Aug 10, 2020 – Aug 12, 2020    11:30am – 7:30pm Live Online Register
Sep 9, 2020 – Sep 11, 2020    8:30am – 4:30pm Live Online Register
Sep 9, 2020 – Sep 11, 2020    8:30am – 4:30pm New York, New York

NYC Seminar and Conference Center
71 West 23rd
Suite 515-Lower Level
New York, NY 10010
United States

Register
Oct 13, 2020 – Oct 15, 2020    8:30am – 4:30pm Phoenix, Arizona

Dynamic Worldwide
4500 S. Lakeshore Dr
Suite 600
Tempe, AZ 85282
United States

Register
Oct 13, 2020 – Oct 15, 2020    10:30am – 6:30pm Live Online Register
Nov 9, 2020 – Nov 11, 2020    8:30am – 4:30pm Houston, Texas

Texas Training and Conference
11490 Westheimer Rd.
Suite 600
Houston, TX 77077
United States

Register
Nov 9, 2020 – Nov 11, 2020    9:30am – 5:30pm Live Online Register
Dec 7, 2020 – Dec 9, 2020    8:30am – 4:30pm Live Online Register
Dec 7, 2020 – Dec 9, 2020    8:30am – 4:30pm Reston, Virginia

Attune, formerly Microtek Reston
12950 Worldgate Drive
Monument II Bldg 4th Flr
Herndon, VA 20170
United States

Register
Course Outline

Part 1: About CISM

  1. Requirements for certification
    • Experience
    • Passing the exam
    • The ISACA Code of Ethics
    • Maintaining certification

Part 2: Information Security Governance

  1. Overview
    • Information is a valuable resource in all of its formats
    • Not just IT related
    • We need to converge information security into the business
  2. Effective information security governance
    • Business drivers
    • Business support
    • Provide assurance to management
  3. Risk objectives
    • Operational risk management
    • We must be able to meet our desired state
  4. Build an information security strategy
    • Business model for information security (BMIS)
    • Strategy
  5. Controls
    • Types of controls
    • IT controls
    • Non-IT controls
    • Countermeasures
    • Example defense in depth
  6. Provide assurance to management
    • ISO 27001
    • Security Metrics
  7. Extend security knowledge to everyone
    • Awareness
    • Training
    • Education
  8. Action plan to implement strategy
    • Projects
    • Gap analysis
    • Critical success factors

Part 3: Information Risk Management & Compliance

  1. Overview
  2. Information classification
    • Why should information be classified
    • Developing the program
    • Ownership
    • Responsibilities
  3. Methods to evaluate impact of adverse events
    • Business impact analysis
  4. Legal and regulatory requirements
  5. Emerging threats and vulnerabilities
    • Sources of information
  6. Risk management
    • Elements of risk
    • Risk assessment
    • Prioritizing risk
    • Reporting risk
    • Monitoring Risk
    • Risk handling
    • Control baseline modeling
    • Controls
    • Gap analysis
    • Integrate risk management into business and IT processes
    • Compliance
  7. Re-assessing risk and changing security program elements
    • Risk management is a cyclic process
    • Triggers to re-assess

Part 4: Information Security Program Development & Management

  1. Overview
  2. Align information security program to business function
  3. Resource requirements definition
    • Internal
    • External
    • Identify, acquire and manage
  4. Emerging trends in information security
    • Cloud computing
    • Mobile computing
  5. Security control design
  6. Security architectures
    • BSIM
  7. Methods to develop
    • Standards
    • Procedures
    • Guidelines
  8. Methods to implement and communicate
    • Policies
    • Standards
    • Procedures
    • Guidelines
  9. Security awareness and training
    • Methods to establish
    • Methods to maintain
  10. Methods to integrate security requirements into organizational processes
  11. Methods to incorporate security requirements
    • Contracts
    • 3rd party management processes
  12. Security metrics
    • Design
    • Implement
    • Report
  13. Testing security controls
    • Effectiveness
    • Applicability

Part 5: Information Security Incident Management

  1. Overview
  2. Definition
    • Distinction between IR, BCP and DRP
    • Senior management commitment
    • Policy
    • Personnel
  3. Objectives
    • Intended outcomes
    • Incident management
    • Incident handling
    • Incident response
    • Incident systems and tools
  4. What technologies must an IRT know?
    • Vulnerabilities/Weaknesses
    • Networking
    • Operating systems
    • Malicious software
    • Programming languages
  5. Defining incident management procedures
    • Plan for management
  6. Current state of incident response plan
    • Gap analysis
  7. Develop a plan
    • Plan elements
    • Notification process
    • Escalation process
    • Helpdesk process for identifying incidents
    • Response teams
  8. Challenges in developing a plan
  9. BCP/DRP
    • Recovery operations
    • Recovery strategies
    • Recovery sites
    • Basis for recovery site selection
    • Notification requirements
    • Supplies
    • Communication structure
    • Testing the plan
    • Recovery test metrics
    • Test results
    • Post-incident activities and investigations
Who should attend

The following professionals should attend this CISM training course: 

  • Information security managers
  • Information security practitioners
  • Security auditors
  • Security consultants
  • Chief Information Security Officers (CISOs)
  • Chief Security Officers (CSOs)
  • Privacy officers
  • Security administrators
  • IT managers
  • Individuals pursuing CISM® Certification
Bonus Materials

This course includes a complete CISM Study Guide.

Pass ISACA's CISM exam – guaranteed

If you take the CISM® exam within four weeks of taking this course and do not pass, send us the score report and you may attend another CISM Exam Boot Camp session within one year at no additional cost. 

Please note that we do not offer an exam voucher with the purchase of this course. 

0
1

Download the brochure