Certified Information Security Manager (CISM) Certification Prep Boot Camp

CISM certification program was developed by the Information Systems Audit and Control Association (ISACA) for experienced Information security management professionals with work experience in developing and managing information security programs and who understand the programs relationship with the overall business goals. The CISM exam is offered three times a year (June, September, and December), consisting of 200 multiple-choice questions that cover the four CISM domains. The American National Standards Institute (ANSI) has accredited the CISM certification program under ISO/IEC 17024:2003, General Requirements for Bodies Operating Certification Systems of Persons.

LEARNING OUTCOMES:

We cover in great detail and wide depth the following four domains which are requirements to pass the CISM exam successfully. The domains are:

In-depth coverage of the four domains required to pass the CISM exam:

  1. Information Security Governance
  2. Information Risk Management and Compliance
  3. Information Security Program Development and Management
  4. Information Security Incident Management

WHO NEEDS TO ATTEND

Experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.

COURSE OUTLINE

We cover in great detail and wide depth the following four domains which are requirements to pass the CISM exam successfully. The domains are:

In-depth coverage of the four domains required to pass the CISM exam:

  1. Information Security Governance
  2. Information Risk Management and Compliance
  3. Information Security Program Development and Management
  4. Information Security Incident Management

1. Testing-Taking Tips and Study Techniques • Preparation for the CISM exam • Submitting Required Paperwork • Resources and Study Aids • Passing the Exam the First Time 2. Information Security Governance • Asset Identification • Risk Assessment • Vulnerability Assessments • Asset Management 3. Information Risk Management • Asset Classification and Ownership • Structured Information Risk Assessment Process • Business Impact Assessments • Change Management 4. Information Security Program Development • Information Security Strategy • Program Alignment of Other Assurance Functions • Development of Information Security Architectures • Security Awareness, Training, and Education • Communication and Maintenance of Standards, Procedures, and Other Documentation • Change Control • Lifecycle Activities • Security Metrics 5. Information Security Program Management • Security Program Management Overview • Planning • Security Baselines • Business Processes • Security Program Infrastructure • Lifecycle Methodologies • Security Impact on Users • Accountability • Security Metrics • Managing Resources 6. Incident Management and Response • Response Management Overview • Importance of Response Management • Performing a Business Impact Analysis • Developing Response and Recovery Plans • The Incident Response Process • Implementing Response and Recovery Plans • Response Documentation • Post-Event Reviews 7. Review and Q&A Session • Final Review and Test Prep

Class participants include people with job functions such as Senior Information Security Consultants, Cyber Security Officers, Cyber Security Managers, experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers,Chief Information Security Officers, network and systems administrators, security device administrators, and security engineers.

Class participants include people with job functions such as Senior Information Security Consultants, Cyber Security Officers, Cyber Security Managers, experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers, Chief Information Security Officers, network and systems administrators, security device administrators, and security engineers.

Professional Development Units (PDUs) awarded for completion of this course is 40 PDUs

See Schedule of All Classes For All Months in 2017:

CALENDAR/SCHEDULE OF CLASSES