Description
Cyberkraft ISACA CISM Bootcamp – Earn the world’s premiere cybersecurity management certification, the ISACA CISM
- 40 hours of live, expert instruction with our ISACA Accredited Instructors
- Official CISM Review Manual
- Official ISACA CISM Questions Answers and Explanations Database
- Digital copies of CISM prep materials
- Course recordings in case you miss a live class
- ISACA membership
- Fully paid exam voucher
- Exam scheduling assistance
- Guided study sessions
- First time pass guarantee – we will pay for your next exam attempt if you don’t pass on your first attempt
Course Schedule
Class will run in the evenings Monday – Friday July 22 – August 1 from 07:00pm – 11:00pm ET live through Zoom.
ISACA CISM Bootcamp Overview
This CISM Boot Camp is designed for experienced information security managers and other professionals who manage, design, oversee or assess an enterprise’s information security.
The training prepares you for the CISM examination by testing your knowledge and your ability to apply it to real-world scenarios. You will gain in-depth knowledge of security governance, risk management, security program development and management, and security incident management. The boot camp has been updated to align with the new CISM job practice areas and is designed to fully prepare you to pass the challenging CISM exam.
Certified Information Security Manager (CISM) affirms your ability to assess risks, implement effective governance, and proactively respond to incidents. With a highlight on emerging technologies such as AI and blockchain, it guarantees your skillset meets evolving security threats and industry requirements. By addressing top-of-mind concerns like data breaches and ransomware attacks, crucial for IT professionals, this certification ensures you are staying ahead of the pace of change.
ISACA credentials are among the top 10 highest-paying in IT, and CISM is recognized as the preferred credential for IT managers.
Cyberkraft ISACA CISM Bootcamp training objectives
The CISM certification promotes international practices and validates your knowledge and experience around effective security management and consulting. The four CISM domains include:
- Security governance: To effectively address the challenges of protecting an organization’s assets, senior management must define the desired outcomes of the information security program.
- Risk management: Asset classification and valuation is an essential part of an effective risk management program — the greater the value, the greater the impact, the greater the risk.
- Information security program development and management: The purpose of this area is to implement management’s governance strategy — the “due diligence” and “due care” of protecting the corporation’s assets.
- Information security incident management: This area focuses on effectively managing unexpected (and expected) events, which may or may not be disruptive, and can be summed up in five words: identify, protect, detect, respond and recover.
The Cyberkraft CISM Bootcamp Includes the ISACA CISM Review Manual
The CISM Review Manual 16th Edition is a comprehensive reference guide designed to help individuals prepare for the CISM exam and understand information security management roles and responsibilities. The 16th edition manual is organized to assist candidates in understanding essential concepts and studying the following domain areas:
- Information Security Governance
- Information Security Risk Management
- Information Security Program
- Incident Management
The CISM Review Manual 16th Edition offers an easy-to-navigate format. Each of the book’s chapters has been divided into two sections for focused study. Section one of each chapter contains:
- Definitions and objectives for the four areas
- Task and knowledge statements
- Self-assessment questions, answers, and explanations
- Suggested resources for further study
Section two of each chapter consists of reference material and content that support the knowledge statements. The material enhances CISM candidates’ knowledge and/or understanding when preparing for the CISM certification exam. Also included are definitions of terms most found on the exam.
The Cyberkraft CISM Bootcamp Includes the ISACA CISM Questions Answers and Explanations Database
CISM Questions, Answers & Explanations Database—12 Month Subscription is a comprehensive 1,047-question pool of items that contains the questions from the CISM Questions, Answers & Explanations Manual, 10th Edition. The database is available via ISACA PERFORM, a web-based learning platform, allowing CISM candidates to log in at home, at work or anywhere they have Internet connectivity.
Exam candidates can utilize an interactive planner to build a custom study plan, and a personalized dashboard serves as the primary method to navigate studies and track progress. Candidates will be presented with randomly selected practice question sets and be able to view the results by job practice domain, allowing for concentrated study in particular areas. Each question and answer set includes in-depth explanations for each answer choice, allowing the learner to fully understand the rationale behind each correct—and incorrect—answer choice.
Learners will have the ability to review previously answered questions, allowing CISM candidates to identify their strengths and weaknesses and focus their study efforts accordingly. Other features of the database include:
- The ability to select practice question sets by specific domain and sub-category and choose the length of study sessions, giving learners the ability to customize their approach to fit their needs
- Two full-length timed practice exams intended to mimic the blueprint and feel of an actual ISACA exam and help candidates manage their time when answering questions
- Flashcards and interactive games to help reinforce key terms and concepts
Voucher and Free Retake Included With Your Enrollment
You’ll receive your fully paid ISACA CISM Voucher when you enroll in this class. Plus, you’re protected by Cyberkraft’s First Time Pass Guarantee. If you don’t pass on your first exam attempt, you’ll receive a free retake as well!
ISACA Membership Included With Your Enrollment
Why become a member?
Being an ISACA member has its privileges. With it, you can leverage a global network of IS/IT professionals leading innovation in your field, open career doors, get expert industry insight and enjoy exclusive discounts, savings and resources to help you grow in your profession.
- Access a global and diverse professional network
- Elevate your knowledge with ISACA courses and publications
- Leverage savings on ISACA products and your favorite brands
Connect & network
Participate in 200+ ISACA Chapters worldwide for local training, networking and events. Gain direct access to inspirational thought leaders and ISACA Award recipients or get recognized globally for advancing digital trust in your field.
Earn free CPE
Enjoy opportunities to earn 72+ credits of free CPE to help maintain your credentials and status as a leader of innovation in your industry.
What you’ll learn
- Information security governance
- The role of an information security steering group
- Legal and regulatory issues associated with internet businesses, global transmissions and transborder data flows
- Common insurance policies and imposed conditions
- Information security process improvement
- Recovery time objectives (RTO) for information resources
- Cost-benefit analysis techniques for mitigating risks to acceptable levels
- Security metrics design, development and implementation
- Information security management due to diligence activities and reviews of the infrastructure
- Events affecting security baselines that may require risk reassessments
- Changes to information security requirements in security plans, test plans and reperformance
- Disaster recovery testing for infrastructure and critical business applications
- External vulnerability reporting sources
- CISM information classification methods
- Life-cycle-based risk management principles and practices
- Security baselines and configuration management in the design and management of business applications and infrastructure
- Acquisition management methods and techniques
- Evaluation of vendor service level agreements and preparation of contract
Who should attend?
- Information security managers
- Information security consultants
- Chief information officers
- Chief information security officers
- Anyone interested in learning information security management skills and getting certified