Shopping Cart  [0]

Call 800.698.5501

Official ISACA CISM Certification Training Boot Camp

ISACA Training Camp
TrainingCamp Twitter Feed


Our Official ISACA 5-day CISM Certification Boot Camp is a comprehensive review of enterprise information security practices merged with Training Camp's award-winning comprehensive exam preparation for the ISACA CISM exam.

Earning CISM certification distinguishes you as having information security expertise, and the understanding of the relationship between an information security program and broader business goals and objectives.

As the creator of the Official ISACA CISM Exam Prep Boot Camp, our course features exclusive options, such as our Training Camp designed Official ISACA CISM Evening Review Sessions, and Training Camp's Exam Pass Guarantee.

Training Camp, the largest Official ISACA Training Provider, is the creator of the industry's premier cybersecurity exam preparation programs.

CISM Boot Camp

Duration: 5 days
Exam Voucher: Included

CISM Course Options

Hosted CISM Boot Camp Private Group Class Request
Hosperson p Classroom Live ISACA CISM

  • Official ISACA Exam Prep Boot Camp
  • Official ISACA CISM Courseware
  • Training Camp Exam Pass Guarantee

  • Official ISACA Training Partner
  • Featured on CNN, FOX News, MSNBC, Reuters
  • 98% Student Satisfaction Rate

  • Our partnership with ISACA demonstrates Training Camp's experience and expertise delivering information security certification training across their full portfolio of certifications.

    Our CISM training programs feature unique Training Camp exclusive options that give you a comprehensive, accelerated learning program that will give you everything you need to pass the CISM exam.

    CISM Instructors ISACA Approved CISM Certified Instructors

    CISM InstructorsOfficial ISACA CISM Courseware

    CISM Instructors Official ISACA CISM Exam Prep Database

    CISM Instructors Training Camp Pre-Class/Pre-Exam Prep Support

    CISM Instructors Training Camp Exam Pass Guarantee

    Is CISM certification right for me?

    Around the world, demand for skilled information security management professionals is on the rise, and the CISM certification is the globally accepted standard of achievement in this area. The uniquely management-focused CISM certification ensures holders understand business, and know how to manage and adapt technology to their enterprise and industry. Since its inception in 2002, more than 30,000 of professionals worldwide have earned the industry-leading CISM to affirm both their high level of technical competence and qualifications for top-caliber leadership and management roles.

    IT professionals must have 5 years or more of information security work experience. 2 years of experience requirement is satisfied with CISA/CISSP certification, or Post-graduate degree in information security or a related field (e.g., business administration, information systems, information assurance)

    Looking for training for more than yourself? Click here to request information about our group training options.

    The CISM exam is offered via Computer-Based Testing (CBT) during 3 testing windows per year:

    Exam Window 1
    02/01/2018 – 05/24/2018
    Exam Window 2
    06/01/2018 - 09/23/2018
    Exam Window 3
    10/01/2018 - 01/24/2019
    Exam Registration/Scheduling Opens 12/01/2017 03/01/2018 07/01/2018
    Exam Registration Deadline: 05/18/2018 09/18/2018 01/18/2019

    Official ISACA CISM Boot Camp Outline

    CISM Course Goals
    Prepare for and pass the Certified Information Security Manager (CISM) exam
    Develop an information security strategy and plan of action to implement the strategy
    Manage and monitor information security risks
    Build and maintain an information security plan both internally and externally
    Implement policies and procedures to respond to and recover from disruptive and destructive information security events

    CISM Certification Domain 1 - Information Security Governance

    Establish and maintain an information security strategy, and align the strategy with corporate governance
    Establish and maintain an information security governance framework
    Establish and maintain information security policies
    Develop a business case
    Identify internal and external influences to the organization
    Obtain management commitment
    Define roles and responsibilities
    Establish, monitor, evaluate, and report metrics

    CISM Certification Domain 2 - Information Risk Management and Compliance

    Establish a process for information asset classification and ownership
    Identify legal, regulatory, organizational, and other applicable requirements
    Ensure that risk assessments, vulnerability assessments, and threat analyses are conducted periodically
    Determine appropriate risk treatment options
    Evaluate information security controls
    Identify the gap between current and desired risk levels
    Integrate information risk management into business and IT processes
    Monitor existing risk
    Report noncompliance and other changes in information risk

    CISM Certification Domain 3 - Information Security Program Development and Management

    Establish and maintain the information security program
    Ensure alignment between the information security program and other business functions
    Identify, acquire, manage, and define requirements for internal and external resources
    Establish and maintain information security architectures
    Establish, communicate, and maintain organizational information security standards, procedures, and guidelines
    Establish and maintain a program for information security awareness and training
    Integrate information security requirements into organizational processes
    Integrate information security requirements into contracts and activities of third parties
    Establish, monitor, and periodically report program management and operational metrics

    CISM Certification Domain 4 - Information Security Incident Management

    Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents
    Establish and maintain an incident response plan
    Develop and implement processes to ensure the timely identification of information security incidents
    Establish and maintain processes to investigate and document information security incidents
    Establish and maintain incident escalation and notification processes
    Organize, train, and equip teams to effectively respond to information security incidents
    Test and review the incident response plan periodically
    Establish and maintain communication plans and processes
    Conduct post-incident reviews
    Establish and maintain integration among the incident response plan, disaster recovery plan, and business continuity plan

    Click here to view our public course schedule and receive an instant price quote.

    Click here to request information about our group training options.