ISACA Official CISM Certification Boot Camp
Retail Price: $3,495.00
Next Date: 12/09/2024
Course Days: 4
Enroll in Next Date
Request Custom Course
Who Should Attend
ISACA’s Certified Information Security Manager (CISM) is a globally recognized certification in the field of information security management. The CISM certification is designed for individuals who have experience in managing, designing, and overseeing an organization’s information security. This certification is intended for professionals working in positions such as Information Security Manager, Information Security Officer, Information Risk Manager, Information Security Director, and Chief Information Security Officer.
To become a CISM, candidates must pass an exam that tests their knowledge of four domains:
-Information Security Governance
-Information Risk Management
-Information Security Program Development and Management
-Information Security Incident Management
In addition to passing the exam, candidates must also have a minimum of five years of professional experience in the information security field, including a minimum of three years of experience in information security management.
Holding the CISM certification validates an individual’s ability to design, implement, monitor and manage an enterprise-wide information security program. It also acknowledges the individual’s knowledge in the areas of information security governance, information risk management and incident management. It is widely recognized by employers and the industry, it helps to advance professional’s career and increase their income.
- Prepare for and pass the Certified Information Security Manager (CISM) exam
- Develop an information security strategy and plan of action to implement the strategy
- Manage and monitor information security risks
- Build and maintain an information security plan
- Implement policies and procedures to respond to and recover from disruptive and destructive information security events
- Continue learning and face new challenges with after-course one-on-one instructor coaching
When you decide to take one of our courses, you are placing trust in us. Our Exam Pass Guarantee was designed to help you reach your goal to pass the certification exam. If you do not pass the certification exam, you may retake this program live or online and/or enroll in our mentoring program at no additional cost.
Information Security Governance
Enterprise Governance
•Organizational Culture
•Legal, Regulatory, and Contractual Requirements
•Organizational Structures, Roles, and Responsibilities
Information Security Strategy
•Information Security Strategy Development
•Information Governance Frameworks and Standards
•Strategic Planning (e.g., budgets, resources, business case).
Information Security Risk Management
Information Security Risk Assessment
•Emerging Risk and Threat Landscape
•Vulnerability and Control Deficiency Analysis
•Risk Assessment and Analysis
Information Security Risk Response
•Risk Treatment / Risk Response Options
•Risk and Control Ownership
•Risk Monitoring and Reporting
Information Security Program
Information Security Program Development
•Information Security Program Resources (e.g., people, tools, technologies)
•Information Asset Identification and Classification
•Industry Standards and Frameworks for Information Security
•Information Security Policies, Procedures, and Guidelines
•Information Security Program Metrics
Information Security Program Management
•Information Security Control Design and Selection
•Information Security Control Implementation and Integrations
•Information Security Control Testing and Evaluation
•Information Security Awareness and Training
•Management of External Services (e.g., providers, suppliers, third parties, fourth parties)
•Information Security Program Communications and Reporting
Incident Management
Incident Management Readiness
•Incident Response Plan
•Business Impact Analysis (BIA)
•Business Continuity Plan (BCP)
•Disaster Recovery Plan (DRP)
•Incident Classification/Categorization
•Incident Management Training, Testing, and Evaluation
Incident Management Operations
•Incident Management Tools and Techniques
•Incident Investigation and Evaluation
•Incident Containment Methods
•Incident Response Communications (e.g., reporting, notification, escalation)
•Incident Eradication and Recovery
•Post-incident Review Practices
- Exam Structure
- Exam Registration Process
- Time Management
- Topics and Concepts
- ISACA CISM Certification Question Structure
- Vendor Interpretation Techniques