CISM Boot Camp Training – 5 Days

CISM Boot Camp Training – 5 Days 2017-04-17T11:05:44+00:00

Project Description

Boot Camp Training for the official CISM® EXAM
Held at Regional Training Centers in the US

Available Onsite, Corporate Training 
info@megamind.org

DATE(s):
info@megamind.org for 2017 Dates

See Pre-recorded On Demand Webinar Training option following…

 

Can’t make it to our Live, Online Training?

SPECIAL OFFER: 

7 Days of CISM Training w Krag Brotby = $595

Available until May 1, 2017

Subscribe to the…
5-Day CISM COMBO Class Training
Pre-Recorded On-Demand Webinars ($595) —–

and, as an EXTRA BONUS, you’ll be able to…

attend the

2-Day LIVE, Online CISM Prep Exam Training
May 20-21, 2017
COMPLIMENTARY (a $495 value)

SUBSCRIBE/REGISTER
https://megamindtraining.com/portfolio/cism-training-webinar-pre-recorded

OVERVIEW:

Internationally respected CISM is recognized by organizations worldwide as the best approach to ensuring the necessary level of information security practitioner and management competence.

CISM® defines the core competencies and international standards of performance that effective security managers are expected to master. It provides executive management with assurance that those that have earned the certification have the experience and knowledge to ensure effective business-focused security.

This CISM INTENSIVE BOOT CAMP is taught by international security expert, Krag Brotby the co-author of the official ISACA CISM Review Manual.  This training provides an intense environment in which participants can acquire the skills and knowledge required of a world-class information security manager. This training provides an outstanding preparation for the CISM exam.

This intensive boot camp is structured to follow the official CISM Review Manual and examination flow.  A full day is provided for each of the core competencies and associated task and knowledge statements, ensuring a detailed and thorough coverage of all areas that will be tested.  The fundamental thrust of examination is  understanding the concepts and critical thinking, not on memorizing facts.  As a result, the training is presented in an interactive manner to ensure the underlying concepts are thoroughly understood and examination questions can be analyzed properly to achieve the best answer.

For a more detailed description regarding CISM® qualifications and the ISACA CISM® exam,
visit the ISACA.org website.

OBJECTIVES:

This course has been developed over more than seven years with two objectives:

1. To provide an environment in which security professionals can acquire the broad range of skills and knowledge expected of a world-class information security manager.

2. To maximize your success on the CISM exam, if you choose to take it.

ABOUT THE INSTRUCTOR:

This class is taught by renowned security expert and the author of the official
CISM Review Manual, Krag Brotby CISM, CGEIT

Krag is the ’go-to’ computer security expert for mastering the CISM exam. He has successfully trained thousands of CISM candidates over the past 14 years, preparing them for the very difficult official CISM Exam.

  • Author of the official ISACA CISM Review Manual since 2005.
  • Author of the CISM Glossary Document and the CRISC Glossary Document.
  • Served on the ISACA Security Practice Development Committee responsible for exam question development.
  • Edited the entire 1200 CISM sample question database, creating approximately 800 questions for the ISACA 2016 CISM QAE Book.
  • Taught CISM courses globally during the past decade including: the US Pentagon, US Marine Corp, Navy and the Army.
  • Frequent security expert practitioner/instructor at conferences globally and lectures on information security governance, metrics, information security management, GRC and CISM exam preparation throughout Oceana, Asia, Europe, the Middle East and North America.

Read Full Bio

EXAM TRAINING OUTLINE:

1. Information Security Governance & Strategy

INTRODUCTION:
Definition
Objective
Tasks
Overview

TOPICS:
Effective Information Security Governance
Key Information Security Concepts and Issues
The IS Manager
Scope and Charter of IS Governance
Information Security Governance Metrics
Developing an Information Security Strategy — Common Pitfalls
Information Security Strategy Objectives
Determining Current State of Security
Strategy Resources
Strategy Constraints
Action Plan Immediate Goals
Action Plan Intermediate Goals

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary

2. Information Risk Management & Compliance

INTRODUCTION:
Definition
Objective
Tasks
Overview

TOPICS:
Effective IS Risk Management
Integration into Life Cycle Processes
Implementing Risk Management
Risk Identification and Analysis Methods
Mitigation Strategies and Prioritization
Reporting Changes to Management

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary

3. Information Security Program Development and Management

INTRODUCTION:
Definition
Objective
Tasks
Overview

TOPICS:
Planning
Security Baseline
Business Processes
Infrastructure
Malicious Code (Malware)
Life Cycles
Impact on End Users
Accountability
Security Metrics
Managing Internal and External Resources
Implementing Effective Information Security Management
Security Controls and Policies
Standards and Procedures
Trading Partners and Service Providers
Security Metrics and Monitoring
The Change Management Process
Vulnerability Assessments
Due Diligence
Resolution of Non-Compliance Issues
Culture, Behavior and Security Awareness

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary

4. Information Security Incident Management

INTRODUCTION:
Definition
Objective
Tasks
Overview

TOPICS:
Performing a Business Impact Analysis
Developing Response and Recovery Plans
Incident Response Processes
Executing Response and Recovery Plans
Documenting Events
Post Event Reviews

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary

ADDENDUM

Review Questions
Review of Practice Questions
Reference Materials
Glossary

Wrap-up
Q&A

COURSE HANDOUTS:

MANDATORY PRE-WORKSHOP READING MATERIALS

Important: The CISM REVIEW MANUAL (15th Edition) is required in order to attend the CISM INTENSIVE BOOT CAMP. It is recommended that attendees review the CISM Review Manual several weeks prior to the actual workshop. The 2017 CISM Review Manual is available directly from ISACA.org.

PRE-CLASS HANDOUTS

All attendees receive a copy of Krag Brotby’s CISM Glossary Document. The CISM Glossary is an important tool for must-know terms and definitions, and a handy reference after the CISM exam.

CLASS HANDOUTS

  • Krag’s actual handout slides to be used as the course workbooks.
  • 100 Sample CISM Practice Questions & Answers.
  • Business Impact Analysis (BIA) example.
  • CISM Mind Map (a helpful study tool).
  • The ability to ask Krag questions even after attending the CISM Boot Camp.
  • Megamind Certificate of Completion:
    CISM Boot Camp Training.

WHO SHOULD ATTEND:

The CISM® Boot camp Training is for IS Security professionals who have at least 3-5 years experience.  It is geared towards IS managers and those whom have information security management responsibilities.

CEO, CFO, CIO, CTO, CISO, IT Managers, Finance Managers, Process Consultants, IS Managers, Security Consultants, Security Architects, Security Specialists, System Administrators and IS Auditors.

Pre-requisite for the CISM Exam:  A minimum of five years of information security work experience, with a minimum of three years of information security management specific work experience is required for certification. This training prepares attendees for the official CISM Exam.

For a more detailed description regarding CISM® qualifications and the ISACA CISM® exam, visit the ISACA.org website.

WHY CISM?

The most prestigious qualification available for information security managers today, the Certified Information Security Manager (CISM) certification sets a high bar for managers. Organizations around the world, including the government, are finding the time-tested, internationally respected CISM certification the best approach to ensuring the necessary level of information security practitioner and management competence.

CISM focuses on the job performed by an information security manager. Other security certifications are characterized by a focus on technical skills or platform, or product-specific knowledge, or they are aimed at the practitioner in the earlier years of their career. Only CISM targets the information security manager – the individual who has progressed beyond the practitioner focus. CISM is for the individual who must manage and oversee the enterprise’s information security effort, including the practitioners, many of whom may hold other certifications the field offers.

The focus on management that makes CISM unique is demonstrated in its experience requirement, which calls for a minimum of three years in information security management, and in its exam focus that is based on the practices performed by information security managers.

CISM defines the core competencies and international standards of performance that effective security managers are expected to master. It provides executive management with assurance that those that have earned the certification have the experience and knowledge to ensure effective business-focused security.


CISM® is a Registered Trade Mark of  ISACA.
CISM® is an ISACA certification.

TESTIMONIALS:

“Krag’s advice was 100% accurate regarding the exam. He is an excellent instructor. I’m a CISM!”
Jennifer, Manager – IT Governance

“Krag drilled the principles into us during the training, which is the most critical piece. Once I understood those, I could answer and successfully pass the CISM! Thanks so much for your help and positive support!
Krag is an excellent instructor.”
Darryl D., Chief Operating Officer

“As Krag highlighted, it is important to understand the concepts of the content of the exam, but it is also necessary to understand the philosophy and methodology of these exams. So, learning the philosophy of taking the cert exam was worth the class.”
Janet W., Cyber Security Analyst

“I must say this training is worth every penny. The Megamind class really helped me.
Krag’s knowledge is absolutely tremendous. Thank you.  I passed the CISM!”
Vom R., Senior Security Engineer

2017 CISM® EXAM DATES:

Megamind does not provide the CISM® EXAM with this training, and it is NOT included in the Megamind course fees.
You must register directly with ISACA (www.isaca.org) for the CISM® Exam.

2017 CISM® Exam Dates:

  • May 1 – June 30, 2017
  • August 1 – September 30, 2017
  • November 1 – December 31, 2017

CISM TRAINING REGISTRATION:

Early registration is recommended.
To ensure admission, fees must be paid in advance.

Fees include:
Tuition and the course materials list above.
Fees do not include the 2017 CISM REVIEW MANUAL, which must be purchased by the student prior to the actual workshop.

LANGUAGE:

English

LENGTH:

This class is held 5 full days from 8:00AM – 4:30PM.

There are four sessions per day. Generally there are two morning sessions & two afternoon sessions each day.

Each session is about 90 minutes long with a 15 minute break per session, and a 30 minute lunch break daily.

CANCELLATIONS:

Cancellations will be accepted up to 10 working days before the scheduled course. After that time, no refunds will be given but substitutions may be sent at any time or tuition may be applied to a future training class.

Megamind reserves the right to cancel or postpone
any scheduled training class.

FOR GROUPS OR TEAM TRAINING:

This class is available for group training:
private onsite -or- live, online training.

For scheduling and pricing, email: info@megamind.org.

CISM® is a Registered Trade Mark of ISACA.
CISM® is an ISACA certification.

REGISTER NOW

HOW TO ENROLL

1. COMPLETE the ONLINE REGISTRATION FORM (click here).
2. PAY your TUITION using PayPal “Buy Now” below.

Class Dates:

You will receive a confirmation email after completing the registration form and payment.
Want to pay using a purchase order?
Then fill out our online Registration form and we will contact you.

Want to request onsite training or learn more about IT training?
Then drop us a note using our Contact form.