Your Cart Is Empty
Home > Technical Courses > IT Security > CISM Exam Boot Camp
CISM is recognized as the leading certification for enterprise security management. After completing this preparation course, you will be ready to take the CISM certification exam.
After completion of this preparation course, you will be ready to take the internationally-acclaimed CISM certification exam. When it comes to information security, a single differentiator can be all that stands between a multimillion dollar contract and a promotion. ISACA's Certified Information Security Manager (CISM) certification is that differentiator. CISM is recognized around the world as the leading certification for enterprise security management. CISM certified individuals are part of an elite group of professionals who have demonstrated a mastery of the concepts and skills of information security, have the experience to back up the knowledge and are dedicated to continually learning and staying current within the information security field.
Category
ID
Duration
Level
Price
IT Security
13202
4 Day(s)
Advanced
$2,695.00
Objectives
After completing this workshop, participants will be able to: · Master the CISM exam content areas · Get CISM test taking skills from our experts · Learn to align security to your business processes · In-depth coverage: Information Security Governance · In-depth coverage: Information Risk Management & Compliance · In-depth coverage: Information Security Program Development & Management · In-depth coverage: Information Security Incident Management
1. About CISM Requirements for certification · Experience · Passing the exam · The ISACA Code of Ethics · Maintaining certification 2. Information Security Governance · Information is a valuable resource in all of its formats · Not just IT related · We need to converge information security into the business Effective information security governance · Business drivers · Business support · Provide assurance to management Risk objectives · Operational risk management · We must be able to meet our desired state Build an information security strategy · Business model for information security (BMIS) · Strategy Controls · Types of controls · IT controls · Non-IT controls · Countermeasures · Example defense in depth Provide assurance to management · ISO 27001 · Security Metrics Extend security knowledge to everyone · Awareness · Training · Education Action plan to implement strategy · Projects · Gap analysis · Critical success factors 3. Information Risk Management & Compliance Information classification · Why should information be classified · Developing the program · Ownership · Responsibilities Methods to evaluate impact of adverse events · Business impact analysis · Legal and regulatory requirements Emerging threats and vulnerabilities · Sources of information Risk management · Elements of risk · Risk assessment · Prioritizing risk · Reporting risk · Monitoring Risk · Risk handling · Control baseline modeling Controls · Gap analysis · Integrate risk management into business and IT processes · Compliance Re-assessing risk and changing security program elements · Risk management is a cyclic process · Triggers to re-assess 4. Information Security Program Development & Management Align information security program to business function · Resource requirements definition · Internal · External · Identify, acquire and manage Emerging trends in information security · Cloud computing · Mobile computing Security control design Security architectures · BSIM Methods to develop · Standards · Procedures · Guidelines Methods to implement and communicate · Policies · Standards · Procedures · Guidelines Security awareness and training · Methods to establish · Methods to maintain Methods to integrate security requirements into organizational processes · Methods to incorporate security requirements · Contracts · 3rd party management processes Security metrics · Design · Implement · Report Testing security controls · Effectiveness · Applicability 5. Information Security Incident Management Definition · Distinction between IR, BCP and DRP · Senior management commitment · Policy · Personnel Objectives · Intended outcomes · Incident management · Incident handling · Incident response · Incident systems and tools What technologies must an IRT know? · Vulnerabilities/Weaknesses · Networking · Operating systems · Malicious software · Programming languages Defining incident management procedures · Plan for management Current state of incident response plan · Gap analysis Develop a plan · Plan elements · Notification process · Escalation process · Help desk process for identifying incidents · Response teams Challenges in developing a plan BCP/DRP · Recovery operations · Recovery strategies · Recovery sites · Basis for recovery site selection · Notification requirements · Supplies · Communication structure · Testing the plan · Recovery test metrics · Test results · Post-incident activities and investigations
Questions?
Certified Information Security Manager (CISM)
Five years of experience with audit, IT systems, and security of information systems; systems administration experience; familiarity with TCP/IP; and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in our Security+ Prep Course course.
CISM Exam Boot Camp
Class Schedule
Live Online
Course Overview
Training Delivery Methods
With Productivity Point, you will have a spectrum of delivery methods to choose from... when where and how you like it. Whether it's in a classroom or online, we have a delivery option to meets your needs.
Classroom Live
Classroom Virtual
Private Group
On Demand
Classroom Live Training
Get in-person, hands-on instruction with live lab exercises taught by subject matter experts who deliver authorized and industry-leading content.
With classrooms in almost every major U.S. city, Productivity Point has something for users of every level, so you can earn the most popular industry certifications. You get hands-on learning experience with live lab exercises taught by experienced instructors. We proudly advocate our learning services to be hosted by the best-qualified trainers in terms of technical knowledge and teaching skills.
Classroom Virtual Training
Prefer to have a dedicated classroom for your virtual experience? Attend live, hands- on training via remote instructor from one of Productivity Point’s multiple locations.
Enjoy a focused and professional training environment, including all technical equipment provided along with administrative and technical support at your fingertips. With over 150 locations to choose from, review our course catalog or contact your personal Productivity Point Account Manager to see if the course you have in mind is delivered at one of our dedicated virtual classrooms in your area.
Live Online Training
Blend the best from traditional face-to-face instructor-led training with the latest in conferencing technology.
Private Group Training
Your private group classroom experience will not only take place in the location of your choice (including any of our training centers), but you will enjoy the following amenities:
On-Demand Learning
On-Demand is an IT training solution designed around your schedule, budget, and learning needs. Combining high-quality video, reading, and knowledge checks in a self-paced format, On-Demand helps you build skills as your schedule allows—all at once or five minutes at a time.
With On-Demand, you learn at your own pace and in the convenience of your own space.
With Learn at your own pace…
Productivity Point Learning Solutions evolved out of a desire to increase our outreach both nationally and internationally.
Productivity Point Headquarters 1580 Sawgrass Corporate Parkway Suite 205 Sunrise, Florida 33323 United States
Contact T 1-844-238-8607 P 1-954-425-6141 F 1-954-928-9057 E info@productivitypointls.com