Certified Information Security Manager (CISM) Boot Camp
The CISM (Certified Information Security Manager) certification is the primary certification for information security professionals who manage, design, oversee and/or assess an enterprise’s information security.
In comparison to other certifications, CISM covers a wide body of knowledge. It is therefore recommended by the sponsoring organization ISACA, that those sitting for the CISM certification attend a training session.
LuneSys’ offers the most comprehensive CISM review course in the day boot camp format for those wishing to thoroughly prepare for the CISM exam. Every participant attending the CISM Boot Camp progresses through a number of skill checks to ensure knowledge is retained. The instructors for the CISM Boot Camp are certified with the CISM designation, and serve on local ISACA boards.
LuneSys’ helps you achieve the prestigious CISM certification via our highly popular CISM Boot Camp. Our boot camp is specifically designed to cover the new material that will be on the 2009 exams.
Knowledge Domains covered in the training:
- Information Security Governance
- Information Risk Management
- Information Security Program Development
- Information Security Program Management
- Incident Management
Some of the content in our CISM training class include:
- Information Security Governance
- An information security steering group function
- Legal and regulatory issues associated with Internet businesses, global transmissions and trans-border data flows
- Common insurance policies and imposed conditions
- Information security process improvement
- Recovery time objectives (RTO) for information resources
- Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
- Security metrics design, development and implementation.
- Information security management due diligence activities and reviews of the infrastructure.
- Events affecting security baselines that may require risk reassessments
- Changes to information security requirements in security plans, test plans and performance
- Disaster recovery testing for infrastructure and critical business applications.
- The requirements for collecting and presenting evidence; rules for evidence, admissibility of evidence, quality and completeness of evidence.
- External vulnerability reporting sources
- The key components of cost benefit analysis and enterprise migration plans
- Privacy and tax laws and tariffs, data import/export restrictions, restrictions on cryptography, warranties, patents, copyrights, trade secrets, national security
- CISM information classification methods
- Life-cycle-based risk management principles and practices.
- Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
- Security baselines and configuration management in the design and management of business applications and the infrastructure.
- Acquisition management methods and techniques
- Evaluation of vendor service level agreements, preparation of contracts)
- CISM question and answer review
Lunesys’ Other Training Workshops
Ethical Hacking
Ethical Hacking / Penetration Testing Training WorkshopPenetration Testing
The control of information is something the elite always does… Information, knowledge, is power.” – Tom Clancy
Computer Forensics Investigator
The incident was not the end of the world. We can backtrack!Learn to uncover and interprete electronic data
How to conduct forensically sound computer examinations with forensic recovery techniques
CISSP Boot Camp
Credential demonstrates that an IT professional understands full range of security for the automated information system.Certified Information System Security Professional (CISSP)
Our CISSP boot camp course ensures that you can review the CBK in-depth and prepare for the certification exam.
Enterprise Security Awareness for IT Users
Information Technology professionals are typically in need of on-target security knowledge that they can directly apply to their everyday work.A Must-Have Training for Every IT User of your Organization
LuneSys’ Enterprise Security Awareness Training for IT Professionals utilizes lectures with hands-on lab work to ensure practical knowledge transfer.
Why Choose Lunesys
- We are not a jack-of-all-trades involved in every sort of business and training;
- We are focused on information security management purely, which rally us round understanding and facilitating the clients’ specific need;
- We have an extensive range of highly qualified trainers, a comprehensive range of professional public training courses, enabling the potential participants to hit upon and sign up for exactly the training they need, in their most suitable time span;
- We don’t only provide trainings but also offer the implementation of the theories, which gives us an edge to assist the participants later in their practical epochs;
- The most reasonable price is another advantage we offer;
- Our previous clients’ great satisfaction and highly-rating testimonials are our honor.