CISM ® Exam Bootcamp
CISM ® (Certified Information Security Manager) is an independent and prestigious security certification. CISM means higher earning potential and career advancement.
Recent independent studies consistently rank CISM ® as one of the highest paying and sought-after IT certifications.
Our bootcamp will get you ready for the CISM ® Exam. We will take you through all the required knowledge you need know on security to pass the exam. We will also take you through exams questions to maximize your chance of success.
Abilene Academy team members are not just trainers. They secure organizations every day and collaborate to the elaboration of international standards and courses.
This is where experience matters.
For more information, please visit: ISACA CISM Certification
Learning objectives :
- Attendees will understand the broad requirements for effective information security governance, the elements and actions required to develop an information security strategy and be able to formulate a plan of action to implement this strategy;
- Manage information security risks;
- Develop and manage an information security plan;
- Manage information security within an enterprise and develop policies and procedures to respond to and recover from disruptive and destructive information security events.
Who should attend?
This training course is intended for professionals who aim at obtaining the CISM ® certification.
- Information Security Governance
- Establish and maintain an information security strategy and align the strategy with corporate governance
- Establish and maintain an information security governance framework
- Establish and maintain information security policies
- Develop a business case
- Identify internal and external influences to the organization
- Obtain management commitment
- Define roles and responsibilities
- Establish, monitor, evaluate and report metrics
- Information Risk Management and Compliance
- Establish a process for information asset classification and ownership
- Identify legal, regulatory, organizational and other applicable requirements
- Ensure that risk assessments, vulnerability assessments and threat analyses are conducted periodically.
- Determine appropriate risk treatment options.
- Evaluate information security controls
- Identify the gap between current and desired risk levels
- Integrate information risk management into business and IT processes
- Monitor existing risk.
- Report noncompliance and other changes in information risk
- Information Security Program Development and Management
- Establish and maintain the information security program
- Ensure alignment between the information security program and other business functions
- Identify, acquire, manage and define requirements for internal and external resources
- Establish and maintain information security architectures
- Establish, communicate and maintain organizational information security standards, procedures, guidelines
- Establish and maintain a program for information security awareness and training
- Integrate information security requirements into organizational processes
- Integrate information security requirements into contracts and activities of third parties
- Establish, monitor and periodically report program management and operational metrics
- Information Security Incident Management
- Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents
- Establish and maintain an incident response plan
- Develop and implement processes to ensure the timely identification of information security incidents
- Establish and maintain processes to investigate and document information security incidents
- Establish and maintain incident escalation and notification processes
- Organize, train and equip teams to effectively respond to information security incidents
- Test and review the incident response plan periodically
- Establish and maintain communication plans and processes
- Conduct post-incident reviews
- Establish and maintain integration among the incident response plan, disaster recovery plan and business continuity plan
Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories.
- Student handbook
- Over 1000 of exams questions
- Collaboration with classmates
- Real-world learning activities and scenarios
- Length of exam : 4 hours
- Number questions : 150
- Question format : Multiple choice
- Passing grade 450 out of 800 points
- Exam availability: English, French, German, Spanish
- For more information regarding the exam, please visit: How to become CISM certified?
- Testing center Exams are administered at PSI testing locations worldwide. Visit ISACA for a listing of the current exam sites
« Interesting training, which leads and conduct to operational skills. Very useful for people who want to obtain a CISM Certification. »
« CISM training is an excellent opportunity to get to know the whole structure behind security protocols and risk analysis management. »
« Great course. A lot of interesting additional information. »
« We attended the three-day training as a preparation to the CISM exam. The discussions and real examples given got us more than just an understanding of the material and more in-depth thinking of the security issues an organization might face. »