ISACA CISM Training Boot Camp

Transform your career in 5 days

Are you ready to take your information security management career to new heights? Infosec’s ISACA CISM Certification Boot Camp provides experienced professionals like you with the knowledge and expertise to excel in the field of information security — and pass your CISM exam on your first attempt.

4.50 (1925 ratings)

Affirm Financing available
Exam Pass Guarantee

Course essentials

Boot camp at a glance

  • Method

    Online, in-person, team onsite

  • Duration

    5 days

  • Experience

    5 years of professional experience

  • Average salary


  • Meets 8570.1

    DoD information assurance requirements

Ready to discuss your training goals? We've got you covered.

Complete the form and book a meeting with a member of our team to explore your learning opportunities.

This is where the error message would go.

Step 1


Thanks! We look forward to meeting with you!

What you'll learn

Training overview

Exam Pass Guarantee

At our CISM Boot Camp, we explore and develop your essential skills and knowledge in the following domains:

  • Domain 1: Information security governance
  • Domain 2: Information security risk management
  • Domain 3: Information security program
  • Domain 4: Incident management

By the end of our CISM Boot Camp, you will have the knowledge, skills and confidence to excel in information security management and pass the CISM exam with flying colors.

ISACA Accredited Training Organization (ATO)

Infosec is one of a select number of ISACA accredited Elite+ Partners in the world. When you enroll in an Infosec CISM Boot Camp, you can rest assured you are receiving the most effective and up-to-date certification prep available, including official ISACA training materials and instruction that has been independently assessed to meet ISACA’s quality standards.

Award-winning training you can trust

What's included

Everything you need to know

 Certification Logo
  • 90-day extended access to Boot Camp components, including class recordings
  • 12-Month subscription to the ISACA Official Question, Answer & Explanation (QAE) database
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee
  • Exam voucher
  • Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
  • Knowledge Transfer Guarantee
  • Pre-study learning path
  • Unlimited practice exam attempts

What makes the Infosec CISM prep course different?

You can rest assured that the CISM training materials are fully updated and synced with the latest version of the exam. In addition, you’ll gain access to a CISM prep course the moment you enroll, so you can prepare for and get the most out of your boot camp.


With 20 years of training experience, we stand by our CISM training with an Exam Pass Guarantee. This means if you don’t pass the exam on the first attempt, we’ll pay for your second exam at no additional cost to you!

Before your boot camp


To become a CISM, you must submit verified evidence of:

  • A minimum of five years of information security work experience
  • A minimum of three years of information security management work experience in three or more of the job practice analysis areas

The work experience must be gained within the ten-year period preceding the application date for certification or within five years from the date of originally passing the exam.


Training schedule

Preparation (before the boot camp starts)
Infosec Skills 90 day subscription logo

CISM prep course

Day 1
Morning session

Information security governance

  • Information security concepts
  • Relationship between information security and business operations
  • Techniques used to secure senior management commitment and support of information security management
  • Methods of integrating information security governance into the overall enterprise governance framework
  • Practices associated with an overall policy directive that captures senior management
  • Level direction and expectations for information security in laying the foundation for information security management within an organization
  • An information security steering group function
  • Information security management roles, responsibilities and organizational structure
  • Areas of governance (e.g., risk management, data classification management, network security, system access)
  • Centralized and decentralized approaches to coordinating information security
Afternoon session

Information security governance continued

  • Legal and regulatory issues associated with internet businesses, global transmissions and transborder data flows (e.g., privacy, tax laws and tariffs, data import/export restrictions, restrictions on cryptography, warranties, patents, copyrights, trade secrets, national security)
  • Common insurance policies and imposed conditions (e.g., crime or fidelity insurance, business interruption)
  • Requirements for the content and retention of business records and compliance
  • Process for linking policies to enterprise business objectives
  • Function and content of essential elements of an information security program (e.g., policy statements, procedures and guidelines)
  • Techniques for developing an information security process improvement model for sustainable and repeatable information security policies and procedures
  • Information security process improvement and its relationship to traditional process management, security architecture development and modeling, and security infrastructure
  • Generally accepted international standards for information security management and related process improvement models
  • The key components of cost benefit analysis and enterprise transformation/ migration plans (e.g., architectural alignment, organizational positioning, change management, benchmarking, market/competitive analysis)
  • Methodology for business case development and computing enterprise value propositions
Evening session

Optional group & individual study

Schedule may vary from class to class

Day 2
Morning session

Risk management

  • Information resources used in support of business processes
  • Information resource valuation methodologies
  • Information classification
  • The principles of development of baselines and their relationship to risk-based assessments of control requirements
  • Life-cycle-based risk management principles and practices
  • Threats, vulnerabilities and exposures associated with confidentiality, integrity and availability of information resources
Afternoon session

Risk management continued

  • Quantitative and qualitative methods used to determine sensitivity and criticality of information resources and the impact of adverse events
  • Use of gap analysis to assess generally accepted standards of good practice for information security management against current state
  • Recovery time objectives (RTO) for information resources and how to determine RTO
  • RTO and how it relates to business continuity and contingency planning objectives and processes
  • Risk mitigation strategies used in defining security requirements for information resources supporting business applications
  • Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels
  • Managing and reporting status of identified risks
Evening session

Optional group & individual study

Schedule may vary from class to class

Day 3
Morning session

Information security program development and management

  • Methods to develop an implementation plan that meets security requirements identified in risk analyses
  • Project management methods and techniques
  • The components of an information security governance framework for integrating security principles, practices, management and awareness into all aspects and all levels of the enterprise
  • Security baselines and configuration management in the design and management of business applications and the infrastructure
  • Information security architectures (e.g., single sign-on, rules-based as opposed to list-based system access control for systems, limited points of systems administration)
  • Information security technologies (e.g., cryptographic techniques and digital signatures, enabling management to select appropriate controls)
  • Security procedures and guidelines for business processes and infrastructure activities
Afternoon session

Information security program development and management continued

  • Systems development life cycle methodologies (e.g., traditional SDLC, prototyping)
  • Planning, conducting, reporting and follow-up of security testing
  • Assessing and authorizing the compliance of business applications and infrastructure to the enterprise’s information security governance framework
  • Types, benefits and costs of physical, administrative and technical controls
  • Planning, designing, developing, testing and implementing information security requirements into an enterprise’s business processes
  • Security metrics design, development and implementation
  • Acquisition management methods and techniques (e.g., evaluation of vendor service level agreements, preparation of contracts)
Evening session

Optional group & individual study

Schedule may vary from class to class

Day 4
Morning session

Information security program development and management continued

  • How to interpret information security policies into operational use
  • Information security administration process and procedures
  • Methods for managing the implementation of the enterprise’s information security program through third parties, including trading partners and security services providers
  • Continuous monitoring of security activities in the enterprise’s infrastructure and business applications
  • Methods used to manage success/failure in information security investments through data collection and periodic review of key performance indicators
  • Change and configuration management activities
  • Information security management due diligence activities and reviews of the infrastructure
  • Liaison activities with internal/external assurance
    providers performing information security reviews
Afternoon session

Information security program development and management continued

  • Due diligence activities, reviews and related standards for managing and controlling access to information resources
  • External vulnerability reporting sources, which provide information that may require changes to the information security in applications and infrastructure
  • Events affecting security baselines that may require risk reassessments and changes to information security requirements in security plans, test plans and reperformance
  • Information security problem management practices
  • Information security manager facilitative roles as change agents, educators and consultants
  • Ways in which cultural and socially acceptable differences affect the behavior of staff
  • Activities that can change cultural and socially acceptable behavior of staff
  • Methods and techniques for security awareness training and education
Evening session

Optional group & individual study

Schedule may vary from class to class

Day 5
Morning session

Information security incident management

  • Components of an incident response capability
  • Information security emergency management practices (e.g., production change control activities, development of computer emergency response team)
  • Disaster recovery planning and business recovery processes
  • Disaster recovery testing for infrastructure and critical business applications
  • Escalation processes for effective security management
Afternoon session

Information security incident management continued

  • Intrusion detection policies and processes
  • Help desk processes for identifying security incidents reported by users and distinguishing them from other issues dealt with the help desks
  • Notification process in managing security incidents and recovery (e.g., automated notice and recovery mechanisms in response to virus alerts in a real-time fashion)
  • Requirements for collecting and presenting evidence: rules for evidence, admissibility of evidence, quality and completeness of evidence
  • Post-incident reviews and follow-up procedures

Schedule may vary from class to class

Guaranteed results

Our boot camp guarantees

Exam Pass Guarantee

If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee

If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.

Can't take time off? Choose one of our self-paced training courses.

Enjoy the flexibility of Infosec's self-paced Certified Information Security Manager training, where you can access course materials anytime, anywhere, fitting seamlessly into your busy work schedule.

  • Open enrollment (begin anytime)
  • Exam voucher included
  • 6-month access to course materials
  • Asynchronous instructor assistance


Frequently asked questions

What's the job outlook for CISM professionals?

The demand for skilled information security professionals is rapidly increasing as organizations recognize the importance of robust security measures. According to the Bureau of Labor Statistics, employment of information systems managers is projected to grow 16% from 2021 to 2031. CISM-certified individuals are well-positioned to capitalize on these opportunities and pursue rewarding careers in information security.

What is the average CISM salary?
CISM-certified professionals earn a wide range of competitive salaries due to their specialized expertise, with an average $129,000. Visit our salary information page to access the latest data on CISM salaries and gain insights into this field’s earning potential.
How does the CISM examination process work?
The CISM exam consists of multiple-choice questions that assess your knowledge and application of information security management concepts. It is administered by ISACA and follows a rigorous evaluation process to ensure the integrity and validity of the certification. Read our CISM exam details article for more information.
What are some tips for preparing for the CISM?

Being well-prepared and rested is critical to success in the CISM exam. Here are a few tips to enhance your study approach:

Create a study schedule and allocate dedicated time for each domain.

Utilize resources such as study guides, practice exams and online forums.

Engage in practical exercises and real-world scenarios to strengthen your problem-solving skills.

Join study groups or seek guidance from experienced professionals to gain additional insights.

Stay focused, practice time management and review all domains comprehensively.

Get plenty of sleep. You won't perform your best if you stay up all night cramming for the CISM exam, so be sure you are well-rested the night before.

Meets 8570.1 requirements

Attention DoD Information Assurance workers! This boot camp helps meet U.S. Department of Defense Directive 8570.1 requirements for department employees or contractors engaged in work related to information security.

You’re in Good Company


I really appreciate that our instructor was extremely knowledgeable and was able to provide the information in a way that could be understood. He also provided valuable test-taking strategies that I know not only helped me with this exam but will help in all exams I take in the future.

Michelle Jemmott, Pentagon


Our instructor had a vast background and related the materials to real life. Much better than just teaching the materials to pass an exam... but he did that as well. He went out of his way in class. The extra materials really benefited us when we returned to our real jobs! Great experience!

John Peck, EPA


Very impressed with Infosec. My instructor did a great job delivering the information strategically and in a way for all to understand. I would definitely take another class/certification prep course.

Sylvia Swinson, Texeltek

Enroll in a boot camp

October 23, 2023 - October 27, 2023

San Diego, California | Available online

October 30, 2023 - November 03, 2023

Dulles, Virginia | Available online

November 27, 2023 - December 01, 2023

Online only

January 22, 2024 - January 26, 2024

Online only

February 12, 2024 - February 16, 2024

Dulles, Virginia | Available online

February 26, 2024 - March 01, 2024

San Diego, California | Available online

March 18, 2024 - March 22, 2024

Orlando, Florida | Available online

April 08, 2024 - April 12, 2024

Dulles, Virginia | Available online

April 22, 2024 - April 26, 2024

Chicago, Illinois | Available online

May 20, 2024 - May 24, 2024

San Diego, California | Available online