CISM Online Training: CISM Bootcamp Domain 3

Step into the role of a strategic security leader with expert-led training on Domain 3: Information Security Program Development and Management. This CISM bootcamp equips you with the knowledge and tools to design, manage, and assess enterprise information security programs—while fully preparing you for the CISM certification exam.

4.7
(2,400)
16,500 Students
10+ Hours
Stage 5 - Advanced

Last update: Jan 2025

Audio Language: English

Subtitles/Captions: Yes

Type of Training: Online, self-paced

Focus: CISM Training Courses, ISACA Training Courses, Certification Courses, Cyber Security Certification Courses, Cyber Security Courses, Cyber Security Compliance Training Courses

Caption Language: English

CISM Online Training CISM Bootcamp Domain 3 Featured Image

What You’ll Learn

This CISM Online Training: CISM Bootcamp Domain 3 will teach you:

  • Information security program development: Build and maintain programs aligned with business goals.
  • Cryptography fundamentals: Understand encryption, hashing, digital signatures, and secure protocols.
  • Software and system security: Explore DevSecOps, SDLC, and third-party software acquisition risks.
  • Disaster recovery planning: Understand business operations techniques for resiliency.
  • Access control: Learn IAAA, provisioning, authentication types, and system integration.
  • Security assessments: Conduct audits, vulnerability scanning, configuration management, and testing.
  • Risk and incident management: Learn incident management, monitoring, and reporting.
  • CISM certification readiness: Prepare confidently with focused videos, study guides, and practice exams.

Included in the CISM Bootcamp

10 Hours of On-Demand Video

4+ Downloadable Resources

Access on Mobile

Certificate of Completion

Suitable for the Following Careers

Information Security Manager

Certified Information Security Manager

Risk Management Consultant

Security Architect

Security Program Developer

Security Consultant

Cyber Security Analyst

Course Content

Training Overview

icon-yt Description of Training Preview
icon-yt Video Overview Preview

Introduction

icon-yt Introduction Preview
icon-yt Introduction to this course! Preview
icon-yt Why you should want to get CISM certified Preview

Domain 3 Information Security Program Development and Management

icon-yt CISM Domain 3 - What we will be covering Preview
icon-yt The information life cycle Preview
icon-yt Secure design principles Preview
icon-yt Secure system design concepts Preview
icon-yt Asset tracking and hardware hardening Preview
icon-yt DevOps and DevSecOps Preview
icon-yt Configuration Management Preview
icon-yt Patch Management Preview
icon-yt Change management Preview
icon-yt Security evaluation models Preview
icon-yt Security Assessments Preview
icon-yt Security Audits Preview
icon-yt Security Audit Logs Preview
icon-yt Vulnerability scanners Preview
icon-yt Penetration testing Preview
icon-yt Penetration testing tools Preview
icon-yt Social Engineering attacks Preview
icon-yt Maturity Models - Part 1 Preview
icon-yt Maturity Models - Part 2 Preview
icon-yt Access control Preview
icon-yt Introduction to Access Control Preview
icon-yt IAAA Part 1 - Identification, Authentication, Authorization, and Accountability Preview
icon-yt IAAA Part 2 - Identification, Authentication, Authorization, and Accountability. Preview
icon-yt Type 1 authentication Preview
icon-yt Type 2 authentication Preview
icon-yt Type 3 authentication Preview
icon-yt Authorization Preview
icon-yt Accountability Preview
icon-yt Access control systems Preview
icon-yt Identity and access provisioning Preview
icon-yt Introduction to Cryptography- Part 1 Preview
icon-yt Introduction to Cryptography- Part 2 Preview
icon-yt The history of Cryptography- Part 1 Preview
icon-yt The history of Cryptography- Part 2 Preview
icon-yt The encryption we use today Preview
icon-yt Symmetric encryption- Part 1 Preview
icon-yt Symmetric encryption- Part 2 Preview
icon-yt Asymmetric encryption- Part 1 Preview
icon-yt Asymmetric encryption- Part 2 Preview
icon-yt Hashing- Part 1 Preview
icon-yt Hashing- Part 2 Preview
icon-yt Attacks on our cryptography- Part 1 Preview
icon-yt Attacks on our cryptography- Part 2 Preview
icon-yt Attacks on our cryptography- Part 3 Preview
icon-yt Digital signatures Preview
icon-yt MAC, HMAC, SSL, and TLS Preview
icon-yt Software Testing 1 Preview
icon-yt Software testing 2 Preview
icon-yt Buying software from other companies Preview
icon-yt Designing security into our software Preview
icon-yt Software development methodologies part 1 Preview
icon-yt Software development methodologies part 2 Preview
icon-yt Software development methodologies part 3 Preview
icon-yt Software development methodologies part 4 Preview
icon-yt Physical security- Part 1 Preview
icon-yt Physical security- Part 2 Preview
icon-yt Physical security- Part 3 Preview
icon-yt Physical security- Part 4 Preview
icon-yt Physical security- Part 5 Preview
icon-yt Physical security- Part 6 Preview
icon-yt Site Selection -Part 1 Preview
icon-yt Site Selection -Part 2 Preview
icon-yt Electricity Preview
icon-yt Fire suppression and hot and cold aisles Preview
icon-yt Heat, Flame, Particle, and Smoke Detectors Preview
icon-yt Fire suppression- Part 1 Preview
icon-yt Fire suppression- Part 2 Preview
icon-yt Backups Preview
icon-yt RAID (Redundant Array of Independent Disks) Preview
icon-yt Redundancy Preview
icon-yt Media storage Preview
icon-yt 3rd party software, Acquisitions, and Divesture security Preview
icon-yt CISM Domain 3 - What we covered Preview
icon-yt CISM Domain 3 links Preview

How to study for the CISM certification and how to reach your goals

The exam and life after it

Bonus Lecture

Audio Version of the Training

OPEN FULL CURRICULUM

Requirements

Basic understanding of IT, cyber security, and network fundamentals

Interest in leadership roles in information security management

Description of CISM Online Training: CISM Bootcamp Domain 3

This course focuses on Domain 3: Information Security Program Development and Management, giving you the tools and perspective needed to design, implement, and oversee enterprise-class security initiatives. Whether you’re managing a security architecture development roadmap or guiding security awareness training, you’ll gain insight into the full lifecycle of an information security program.

Led by a seasoned instructor, this CISM certification training covers everything from access control systems and cryptographic methods to software testing, vulnerability scanners, and social engineering threats. You’ll explore security procedures, data classification management, and develop a strong grasp of information security technologies and the information security administration process. You’ll also learn how to align your strategy with enterprise governance framework practices and work with frameworks such as ISO 27001, NIST, and CMMI.

  • Apply information security management methods in program oversight
  • Manage security services, audits, and software security assessments
  • Lead implementation of secure senior management commitment
  • Integrate risk management into information security program development
  • Develop alignment between business processes, security governance, and policies
  • Oversee incident management, post incident reviews, and reporting procedures
  • Prepare for the CISM certification using structured resources and expert guidance

As you complete this Certified Information Security Manager training, you'll gain the confidence and capability to lead as an Information Security Manager CISM. You’ll be equipped to align information security governance with information risk management practices, meet all CISM certification requirements, and approach the CISM exam with strategic clarity and leadership readiness.

Who Is This Course For

This course is designed for security professionals preparing for the CISM certification exam, as well as those advancing into senior management-level direction roles. It’s ideal for leaders responsible for managing security incidents, implementing governance frameworks, and delivering measurable results through information security investments and strategies.

Course Instructor

Thor Pedersen

Thor Pedersen is an IT, Cyber Security, and Project Management instructor who teaches both online and in person through his training company, Thor Teaches. He has helped many people achieve their goals and pass certifications. Thor's CISSP courses are the highest rated, with over 20,000 students and 2,600 reviews.

Thor holds multiple certifications, including CISSP, PMP, CEH, SCP, CompTIA Security+, CCNA/CCNP Routing & Switching, CCNA Security, CCENT, and 4011 INFOSEC Professional. He has a passion for learning and is always expanding his training offerings.

Thor is dedicated to helping students succeed and encourages questions and feedback through the course Q&A page or direct messages. His approach to teaching is fueled by a love of IT and continuous growth in the field.

Read More

Read Less

Testimonials

Anonymous

Bellick E.

This course helped me understand how to structure vendor service level agreements and lead a team with the right key performance indicators change mindset. It’s more than exam prep—it gave me tools to succeed in my actual role.

Anonymous

Luis T.

I especially valued the sections on traditional process management and team accountability. The course gave me a clearer view of how an information security steering group drives success within security governance.

Anonymous

Reema D.

Everything is broken down in a way that makes it stick. From architecture to assessments, the course ensures you're ready—and your certification confirms it. A must-have for serious security professionals.

Show More

Show Less

Frequently Asked Questions

Students Who Took This Course Also Liked

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!