ISACA CISM Training Boot Camp
Transform your career in 5 days

Course essentials
Boot camp at a glance
-
Method
Online, in-person, team onsite
-
Duration
5 days
-
Experience
5 years of professional experience
-
Average salary
$129,000
-
Meets 8570.1
DoD information assurance requirements
Ready to discuss your training goals? We've got you covered.
Complete the form and book a meeting with a member of our team to explore your learning opportunities.
This is where the error message would go.
Thanks! We look forward to meeting with you!
What you'll learn
Training overview

At our CISM Boot Camp, we explore and develop your essential skills and knowledge in the following domains:
- Domain 1: Information security governance
- Domain 2: Information security risk management
- Domain 3: Information security program
- Domain 4: Incident management
By the end of our CISM Boot Camp, you will have the knowledge, skills and confidence to excel in information security management and pass the CISM exam with flying colors.
ISACA Accredited Training Organization (ATO)
Infosec is one of a select number of ISACA accredited Elite+ Partners in the world. When you enroll in an Infosec CISM Boot Camp, you can rest assured you are receiving the most effective and up-to-date certification prep available, including official ISACA training materials and instruction that has been independently assessed to meet ISACA’s quality standards.

Award-winning training you can trust






What's included
Everything you need to know

- 90-day extended access to Boot Camp components, including class recordings
- 12-Month subscription to the ISACA Official Question, Answer & Explanation (QAE) database
- 100% Satisfaction Guarantee
- Exam Pass Guarantee
- Exam voucher
- Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
- Knowledge Transfer Guarantee
- Pre-study learning path
- Unlimited practice exam attempts
What makes the Infosec CISM prep course different?
You can rest assured that the CISM training materials are fully updated and synced with the latest version of the exam. In addition, you’ll gain access to a CISM prep course the moment you enroll, so you can prepare for and get the most out of your boot camp.
With 20 years of training experience, we stand by our CISM training with an Exam Pass Guarantee. This means if you don’t pass the exam on the first attempt, we’ll pay for your second exam at no additional cost to you!
Before your boot camp
Prerequisites
Syllabus
Training schedule
Preparation (before the boot camp starts)
CISM prep course
Day 1
Information security governance
- Information security concepts
- Relationship between information security and business operations
- Techniques used to secure senior management commitment and support of information security management
- Methods of integrating information security governance into the overall enterprise governance framework
- Practices associated with an overall policy directive that captures senior management
- Level direction and expectations for information security in laying the foundation for information security management within an organization
- An information security steering group function
- Information security management roles, responsibilities and organizational structure
- Areas of governance (e.g., risk management, data classification management, network security, system access)
- Centralized and decentralized approaches to coordinating information security
Information security governance continued
- Legal and regulatory issues associated with internet businesses, global transmissions and transborder data flows (e.g., privacy, tax laws and tariffs, data import/export restrictions, restrictions on cryptography, warranties, patents, copyrights, trade secrets, national security)
- Common insurance policies and imposed conditions (e.g., crime or fidelity insurance, business interruption)
- Requirements for the content and retention of business records and compliance
- Process for linking policies to enterprise business objectives
- Function and content of essential elements of an information security program (e.g., policy statements, procedures and guidelines)
- Techniques for developing an information security process improvement model for sustainable and repeatable information security policies and procedures
- Information security process improvement and its relationship to traditional process management, security architecture development and modeling, and security infrastructure
- Generally accepted international standards for information security management and related process improvement models
- The key components of cost benefit analysis and enterprise transformation/ migration plans (e.g., architectural alignment, organizational positioning, change management, benchmarking, market/competitive analysis)
- Methodology for business case development and computing enterprise value propositions
Optional group & individual study
Schedule may vary from class to class
Day 2
Risk management
- Information resources used in support of business processes
- Information resource valuation methodologies
- Information classification
- The principles of development of baselines and their relationship to risk-based assessments of control requirements
- Life-cycle-based risk management principles and practices
- Threats, vulnerabilities and exposures associated with confidentiality, integrity and availability of information resources
Risk management continued
- Quantitative and qualitative methods used to determine sensitivity and criticality of information resources and the impact of adverse events
- Use of gap analysis to assess generally accepted standards of good practice for information security management against current state
- Recovery time objectives (RTO) for information resources and how to determine RTO
- RTO and how it relates to business continuity and contingency planning objectives and processes
- Risk mitigation strategies used in defining security requirements for information resources supporting business applications
- Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels
- Managing and reporting status of identified risks
Optional group & individual study
Schedule may vary from class to class
Day 3
Information security program development and management
- Methods to develop an implementation plan that meets security requirements identified in risk analyses
- Project management methods and techniques
- The components of an information security governance framework for integrating security principles, practices, management and awareness into all aspects and all levels of the enterprise
- Security baselines and configuration management in the design and management of business applications and the infrastructure
- Information security architectures (e.g., single sign-on, rules-based as opposed to list-based system access control for systems, limited points of systems administration)
- Information security technologies (e.g., cryptographic techniques and digital signatures, enabling management to select appropriate controls)
- Security procedures and guidelines for business processes and infrastructure activities
Information security program development and management continued
- Systems development life cycle methodologies (e.g., traditional SDLC, prototyping)
- Planning, conducting, reporting and follow-up of security testing
- Assessing and authorizing the compliance of business applications and infrastructure to the enterprise’s information security governance framework
- Types, benefits and costs of physical, administrative and technical controls
- Planning, designing, developing, testing and implementing information security requirements into an enterprise’s business processes
- Security metrics design, development and implementation
- Acquisition management methods and techniques (e.g., evaluation of vendor service level agreements, preparation of contracts)
Optional group & individual study
Schedule may vary from class to class
Day 4
Information security program development and management continued
- How to interpret information security policies into operational use
- Information security administration process and procedures
- Methods for managing the implementation of the enterprise’s information security program through third parties, including trading partners and security services providers
- Continuous monitoring of security activities in the enterprise’s infrastructure and business applications
- Methods used to manage success/failure in information security investments through data collection and periodic review of key performance indicators
- Change and configuration management activities
- Information security management due diligence activities and reviews of the infrastructure
- Liaison activities with internal/external assurance
providers performing information security reviews
Information security program development and management continued
- Due diligence activities, reviews and related standards for managing and controlling access to information resources
- External vulnerability reporting sources, which provide information that may require changes to the information security in applications and infrastructure
- Events affecting security baselines that may require risk reassessments and changes to information security requirements in security plans, test plans and reperformance
- Information security problem management practices
- Information security manager facilitative roles as change agents, educators and consultants
- Ways in which cultural and socially acceptable differences affect the behavior of staff
- Activities that can change cultural and socially acceptable behavior of staff
- Methods and techniques for security awareness training and education
Optional group & individual study
Schedule may vary from class to class
Day 5
Information security incident management
- Components of an incident response capability
- Information security emergency management practices (e.g., production change control activities, development of computer emergency response team)
- Disaster recovery planning and business recovery processes
- Disaster recovery testing for infrastructure and critical business applications
- Escalation processes for effective security management
Information security incident management continued
- Intrusion detection policies and processes
- Help desk processes for identifying security incidents reported by users and distinguishing them from other issues dealt with the help desks
- Notification process in managing security incidents and recovery (e.g., automated notice and recovery mechanisms in response to virus alerts in a real-time fashion)
- Requirements for collecting and presenting evidence: rules for evidence, admissibility of evidence, quality and completeness of evidence
- Post-incident reviews and follow-up procedures
Schedule may vary from class to class
Guaranteed results
Our boot camp guarantees

Exam Pass Guarantee
If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).

100% Satisfaction Guarantee
If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee
If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
FAQ
Frequently asked questions
What's the job outlook for CISM professionals?
The demand for skilled information security professionals is rapidly increasing as organizations recognize the importance of robust security measures. According to the Bureau of Labor Statistics, employment of information systems managers is projected to grow 16% from 2021 to 2031. CISM-certified individuals are well-positioned to capitalize on these opportunities and pursue rewarding careers in information security.
What is the average CISM salary?
How does the CISM examination process work?
What are some tips for preparing for the CISM?
Being well-prepared and rested is critical to success in the CISM exam. Here are a few tips to enhance your study approach:
Create a study schedule and allocate dedicated time for each domain.
Utilize resources such as study guides, practice exams and online forums.
Engage in practical exercises and real-world scenarios to strengthen your problem-solving skills.
Join study groups or seek guidance from experienced professionals to gain additional insights.
Stay focused, practice time management and review all domains comprehensively.
Get plenty of sleep. You won't perform your best if you stay up all night cramming for the CISM exam, so be sure you are well-rested the night before.
Meets 8570.1 requirements
Attention DoD Information Assurance workers! This boot camp helps meet U.S. Department of Defense Directive 8570.1 requirements for department employees or contractors engaged in work related to information security.
You’re in Good Company
MJ
Michelle Jemmott, PentagonI really appreciate that our instructor was extremely knowledgeable and was able to provide the information in a way that could be understood. He also provided valuable test-taking strategies that I know not only helped me with this exam but will help in all exams I take in the future.
JP
John Peck, EPAOur instructor had a vast background and related the materials to real life. Much better than just teaching the materials to pass an exam... but he did that as well. He went out of his way in class. The extra materials really benefited us when we returned to our real jobs! Great experience!
SS
Sylvia Swinson, TexeltekVery impressed with Infosec. My instructor did a great job delivering the information strategically and in a way for all to understand. I would definitely take another class/certification prep course.
Explore our top boot camps