ISACA CISM Training Boot Camp
Transform your career in 5 days
Course essentials
ISACA CISM training at a glance
-
Method
Online, in-person, team onsite
-
Duration
5 days
-
Experience
5 years of professional experience
-
Average salary
$156,420
-
Meets 8570.1
DoD information assurance requirements
What you'll learn
Training overview
At Infosec’s CISM Boot Camp, you will explore and develop your essential skills and knowledge in the following domains:
- Domain 1: Information security governance (17%)
- Domain 2: Information security risk management (20%)
- Domain 3: Information security program (33%)
- Domain 4: Incident management (30%)
By the end of the boot camp, you will have the knowledge, skills and confidence to excel in information security management and pass the CISM exam with flying colors.
Who should attend
The CISM security certification is ideal for mid-level and advanced-level cybersecurity professionals with prior information security experience. Because this certification empowers professionals to advance in managerial positions and navigate challenges in information security, the course is recommended for the following roles:
- Information security managers
- Information security consultants
- Chief information officers (CIOs)
- Chief information security officers (CISOs)
By obtaining an ISACA CISM certification, you will demonstrate expertise in assessing and designing information security management programs. This empowers students to advance their careers as they gain the knowledge and skills to confidently tackle cyber threats — a desirable trait to employers in the field.
ISACA Accredited Training Organization (ATO)
Infosec is one of a select number of ISACA accredited Elite+ Partners in the world. When you enroll in an Infosec CISM Boot Camp, you can rest assured you are receiving the most effective and up-to-date certification prep available, including official ISACA training materials and instruction that has been independently assessed to meet ISACA’s quality standards.
Award-winning training you can trust
Don't take our word for it
Read our independent reviews via TrustRadius
Ready to discuss your training goals? We've got you covered.
Complete the form and book a meeting with a member of our team to explore your learning opportunities.
Sorry, we're unable to load the form at the moment. Please check your browser's settings to confirm the form is not blocked. You can contact us and report the issue here: infosec.info@cengage.com.
Thanks! We look forward to meeting with you!
What's included
Everything you need to know about CISM course
- 90-day extended access to Boot Camp components, including class recordings
- 12-Month subscription to the ISACA Official Question, Answer & Explanation (QAE) database
- 100% Satisfaction Guarantee
- Exam Pass Guarantee
- Exam voucher
- Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
- Knowledge Transfer Guarantee
- Pre-study learning path
- Unlimited practice exam attempts
What makes the Infosec CISM training different?
All CISM certification training materials are fully updated and synced with the latest version of the exam. You will also gain access to a CISM prep course the moment you enroll, allowing you to prepare for and get the most out of your boot camp.
Plus, you can enjoy the assurance of the Exam Pass Guarantee. This means if you don’t pass the exam on the first attempt, we will pay for your second exam at no additional cost to you.
Before your boot camp
CISM certification prerequisites
Syllabus
Training schedule
Preparation (before the boot camp starts)
CISM prep course
Day 1
Information security governance
- Information security concepts
- Relationship between information security and business operations
- Techniques used to secure senior management commitment and support of information security management
- Methods of integrating information security governance into the overall enterprise governance framework
- Practices associated with an overall policy directive that captures senior management
- Level direction and expectations for information security in laying the foundation for information security management within an organization
- An information security steering group function
- Information security management roles, responsibilities and organizational structure
- Areas of governance (e.g., risk management, data classification management, network security, system access)
- Centralized and decentralized approaches to coordinating information security
Information security governance continued
- Legal and regulatory issues associated with internet businesses, global transmissions and transborder data flows (e.g., privacy, tax laws and tariffs, data import/export restrictions, restrictions on cryptography, warranties, patents, copyrights, trade secrets, national security)
- Common insurance policies and imposed conditions (e.g., crime or fidelity insurance, business interruption)
- Requirements for the content and retention of business records and compliance
- Process for linking policies to enterprise business objectives
- Function and content of essential elements of an information security program (e.g., policy statements, procedures and guidelines)
- Techniques for developing an information security process improvement model for sustainable and repeatable information security policies and procedures
- Information security process improvement and its relationship to traditional process management, security architecture development and modeling, and security infrastructure
- Generally accepted international standards for information security management and related process improvement models
- The key components of cost benefit analysis and enterprise transformation/ migration plans (e.g., architectural alignment, organizational positioning, change management, benchmarking, market/competitive analysis)
- Methodology for business case development and computing enterprise value propositions
Optional group & individual study
Schedule may vary from class to class
Day 2
Risk management
- Information resources used in support of business processes
- Information resource valuation methodologies
- Information classification
- The principles of development of baselines and their relationship to risk-based assessments of control requirements
- Life-cycle-based risk management principles and practices
- Threats, vulnerabilities and exposures associated with confidentiality, integrity and availability of information resources
Risk management continued
- Quantitative and qualitative methods used to determine sensitivity and criticality of information resources and the impact of adverse events
- Use of gap analysis to assess generally accepted standards of good practice for information security management against current state
- Recovery time objectives (RTO) for information resources and how to determine RTO
- RTO and how it relates to business continuity and contingency planning objectives and processes
- Risk mitigation strategies used in defining security requirements for information resources supporting business applications
- Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels
- Managing and reporting status of identified risks
Optional group & individual study
Schedule may vary from class to class
Day 3
Information security program development and management
- Methods to develop an implementation plan that meets security requirements identified in risk analyses
- Project management methods and techniques
- The components of an information security governance framework for integrating security principles, practices, management and awareness into all aspects and all levels of the enterprise
- Security baselines and configuration management in the design and management of business applications and the infrastructure
- Information security architectures (e.g., single sign-on, rules-based as opposed to list-based system access control for systems, limited points of systems administration)
- Information security technologies (e.g., cryptographic techniques and digital signatures, enabling management to select appropriate controls)
- Security procedures and guidelines for business processes and infrastructure activities
Information security program development and management continued
- Systems development life cycle methodologies (e.g., traditional SDLC, prototyping)
- Planning, conducting, reporting and follow-up of security testing
- Assessing and authorizing the compliance of business applications and infrastructure to the enterprise’s information security governance framework
- Types, benefits and costs of physical, administrative and technical controls
- Planning, designing, developing, testing and implementing information security requirements into an enterprise’s business processes
- Security metrics design, development and implementation
- Acquisition management methods and techniques (e.g., evaluation of vendor service level agreements, preparation of contracts)
Optional group & individual study
Schedule may vary from class to class
Day 4
Information security program development and management continued
- How to interpret information security policies into operational use
- Information security administration process and procedures
- Methods for managing the implementation of the enterprise’s information security program through third parties, including trading partners and security services providers
- Continuous monitoring of security activities in the enterprise’s infrastructure and business applications
- Methods used to manage success/failure in information security investments through data collection and periodic review of key performance indicators
- Change and configuration management activities
- Information security management due diligence activities and reviews of the infrastructure
- Liaison activities with internal/external assurance
providers performing information security reviews
Information security program development and management continued
- Due diligence activities, reviews and related standards for managing and controlling access to information resources
- External vulnerability reporting sources, which provide information that may require changes to the information security in applications and infrastructure
- Events affecting security baselines that may require risk reassessments and changes to information security requirements in security plans, test plans and reperformance
- Information security problem management practices
- Information security manager facilitative roles as change agents, educators and consultants
- Ways in which cultural and socially acceptable differences affect the behavior of staff
- Activities that can change cultural and socially acceptable behavior of staff
- Methods and techniques for security awareness training and education
Optional group & individual study
Schedule may vary from class to class
Day 5
Information security incident management
- Components of an incident response capability
- Information security emergency management practices (e.g., production change control activities, development of computer emergency response team)
- Disaster recovery planning and business recovery processes
- Disaster recovery testing for infrastructure and critical business applications
- Escalation processes for effective security management
Information security incident management continued
- Intrusion detection policies and processes
- Help desk processes for identifying security incidents reported by users and distinguishing them from other issues dealt with the help desks
- Notification process in managing security incidents and recovery (e.g., automated notice and recovery mechanisms in response to virus alerts in a real-time fashion)
- Requirements for collecting and presenting evidence: rules for evidence, admissibility of evidence, quality and completeness of evidence
- Post-incident reviews and follow-up procedures
Schedule may vary from class to class
What's next?
After you finish the ISACA CISM Certification Boot Camp
With your CISM certification training, you’ll be equipped with the information security management skills and knowledge sought by organizations worldwide. Some of the roles commonly held by CISM certification holders include:
- Information security manager
- Cybersecurity manager
- Cybersecurity consultant
- Chief information officer (CIO)
- Chief information security officer (CISO)
These are just a few examples of the CISM career paths you can pursue with CISM certification training. Your expertise in information security management is highly valued in today's digital landscape.
Exam Prep
What are some tips I should know when preparing for the CISM exam?
When preparing for the CISM exam, the most important thing you can do is study the major topics covered. The four domains are:
- Information security governance
- Information security risk management
- Information security program
- Incident management
Reviewing the exam format, details, and resources available online will also help. Use practice exams to become familiar with the questions that will be asked.
What job titles are most common for people with ISACA CISM certification?
Some common positions that this certification can help you land include:
-
Chief information officers (CIOs)
-
Chief information security officers (CISOs)
-
Information security managers
-
Cybersecurity manager
Average Salary
ISACA CISM certification salary expectations
Wondering about the financial rewards for earning your CISM? While salaries vary quite a bit based on location, experience and industry, CISM professionals are well-compensated for their skills.
The average U.S. CISM salary is more than $156,000, according to our latest Cybersecurity Salary Guide. Keep in mind that is just an average and there is a wider range of pay across various job opportunities.
Guaranteed results
Our boot camp guarantees
Exam Pass Guarantee
If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).
100% Satisfaction Guarantee
If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.
Knowledge Transfer Guarantee
If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
FAQ
Frequently asked questions
What's the job outlook for CISM professionals?
The demand for skilled information security professionals is rapidly increasing as organizations recognize the importance of robust security measures. According to the Bureau of Labor Statistics, employment of information systems managers is projected to grow 16% from 2021 to 2031. CISM-certified individuals are well-positioned to capitalize on these opportunities and pursue rewarding careers in information security.
What is the average CISM salary?
CISM-certified professionals earn a wide range of competitive salaries due to their specialized expertise, with an average $156,420. Visit our salary information page to access the latest data on CISM salaries and gain insights into this field’s earning potential.
How does the CISM examination process work?
What are some tips for preparing for the CISM?
Being well-prepared and rested is critical to success in the CISM exam. Here are a few tips to enhance your study approach:
- Create a study schedule and allocate dedicated time for each domain.
- Utilize resources such as study guides, practice exams and online forums.
- Engage in practical exercises and real-world scenarios to strengthen your problem-solving skills.
- Join study groups or seek guidance from experienced professionals to gain additional insights.
- Stay focused, practice time management and review all domains comprehensively.
- Get plenty of sleep. You won't perform your best if you stay up all night cramming for the CISM exam, so be sure you are well-rested the night before.
How long does CISM certification last?
Your CISM certification is valid for three years. To maintain the certification, you will need to earn and submit 120 continuing professional education (CPE) credits during the three-year renewal period, with a minimum of 20 CPEs earned annually. This renewal process helps ensure that certified professionals stay up-to-date with the latest developments in information security management. Read our CISM CPE article for more information.
Which is better CISM or CISSP?
Both the CISM and CISSP are well-respected certifications that require five years of industry experience. The CISM cybersecurity topics are more management-focused, whereas the CISSP topics are more broad and have more of a technical focus. Some cybersecurity professionals will earn both certifications, or you choose the one that is most aligned with your career goals. For more information, read our article comparing the CISM and CISSP certifications.
Meets 8570.1 requirements
Attention DoD Information Assurance workers! This boot camp helps meet U.S. Department of Defense Directive 8570.1 requirements for department employees or contractors engaged in work related to information security.
You’re in Good Company
Michelle Jemmott, PentagonI really appreciate that our instructor was extremely knowledgeable and was able to provide the information in a way that could be understood. He also provided valuable test-taking strategies that I know not only helped me with this exam but will help in all exams I take in the future.
John Peck, EPAOur instructor had a vast background and related the materials to real life. Much better than just teaching the materials to pass an exam... but he did that as well. He went out of his way in class. The extra materials really benefited us when we returned to our real jobs! Great experience!
Sylvia Swinson, TexeltekVery impressed with Infosec. My instructor did a great job delivering the information strategically and in a way for all to understand. I would definitely take another class/certification prep course.
Explore our top boot camps