CISM Online Training: CISM Bootcamp Domain 2

Advance your expertise in Information Risk Management and prepare for the CISM certification exam with this focused, in-depth bootcamp. This Certified Information Security Manager (CISM) training builds the skills required for high-level security management, risk mitigation strategies, and enterprise program leadership.

4.6
(3,400)
19,000 Students
7.5+ Hours
Stage 5 - Advanced

Last update: Jan 2025

Audio Language: English

Subtitles/Captions: Yes

Type of Training: Online, self-paced

Focus: CISM Training Courses, ISACA Training Courses, Certification Courses, Cyber Security Certification Courses, Cyber Security Courses, Cyber Security Compliance Training Courses

Caption Language: English

CISM Certification CISM Domain 2 Video Boot Camp Featured Image

What You’ll Learn

This CISM Online Training: CISM Bootcamp Domain 2 will teach you:

  • Information risk management: Identify, assess, and respond to evolving threats.
  • Security program development: Align risk with business operations techniques.
  • Infrastructure and architecture: Explore security architecture development, SIEM, and network protocols.
  • Information security governance: Connect risk programs to enterprise-wide objectives.
  • Risk management: Apply frameworks, vulnerability analysis, and treatment methods.
  • CISM Domain 2 focus: Study governance, ownership, and reporting controls.
  • Incident management: Build skills in post-incident reviews and threat response.
  • CISM exam strategy: Spot keywords, understand ISACA logic, and answer like a risk adviser.

Included in the CISM Bootcamp

7.5 Hours of On-Demand Video

4 Downloadable Resources

Access on Mobile

Certificate of Completion

Suitable for the Following Careers

Information Security Manager

Risk Management Consultant

CISM Certified Information Security Professional

Cybersecurity Analyst

Security Consultant

Information Security Governance Specialist

Course Content

Training Overview

icon-yt Description of Training Preview
icon-yt Video Overview Preview

Introduction

icon-yt Introduction Preview
icon-yt Introduction to this course! Preview
icon-yt Why you should want to get CISM certified Preview

CISM Domain 2: Information Risk Management.

icon-yt CISM Domain 2 - What we will be covering Preview
icon-yt Risk Identification Preview
icon-yt Risk Management - Assessment Part 1 Preview
icon-yt Risk Management - Assessment Part 2 Preview
icon-yt Risk response and mitigation & Risk and Control Monitoring and Reporting Preview
icon-yt Attackers, Vishing, and Phishing- Part 1 Preview
icon-yt Attackers, Vishing and Phishing- Part 2 Preview
icon-yt OWASP part 1 Preview
icon-yt OWASP part 2 Preview
icon-yt OWASP part 3 Preview
icon-yt OWASP part 4 Preview
icon-yt Networking basics and definitions Preview
icon-yt SIEM (Security Information and Event Management) Preview
icon-yt The OSI model - Part 1 Preview
icon-yt The OSI model - Part 2 Preview
icon-yt The TCP/IP model Preview
icon-yt IP addresses, MAC addresses, and port numbers - Part 1 Preview
icon-yt IP addresses, MAC addresses, and port numbers - Part 2 Preview
icon-yt IP addresses, MAC addresses, and port numbers - Part 3 Preview
icon-yt IP addresses, MAC addresses, and port numbers - Part 4 Preview
icon-yt IP support protocols - Part 1 Preview
icon-yt IP support protocols - Part 2 Preview
icon-yt Cable types Preview
icon-yt LAN topologies Preview
icon-yt Layer 1 to 3 networking devices Preview
icon-yt Firewalls - Part 1 Preview
icon-yt Firewalls - Part 2 Preview
icon-yt Intrusion detection and prevention systems Preview
icon-yt Network authentication protocols Preview
icon-yt WIFI - Part 1 Preview
icon-yt WiFi - Part 2 Preview
icon-yt Bluetooth Preview
icon-yt Honeynets and Honeypots Preview
icon-yt Secure communications - Part 1 Preview
icon-yt Secure Communications - Part 2 Preview
icon-yt Secure Communications - Part 3 Preview
icon-yt Mobile device security Preview
icon-yt Application positive-listing Preview
icon-yt Virtualization, Cloud, and Distributed Computing - Part 1 Preview
icon-yt Virtualization, Cloud, and Distributed Computing - Part 2 Preview
icon-yt Virtualization, Cloud, and Distributed Computing - Part 3 Preview
icon-yt Virtualization, Cloud, and Distributed Computing - Part 4 Preview
icon-yt Virtualization, Cloud, and Distributed Computing - Part 5 Preview
icon-yt Software vulnerabilities and Attacks Preview
icon-yt System vulnerabilities, threats, and countermeasures Preview
icon-yt IOT (Internet Of Things) Preview
icon-yt Wireless networks Preview
icon-yt CISM Domain 2 - What we covered Preview
icon-yt CISM Domain 2 links Preview

How to study for the CISM certification and how to reach your goals

The exam and life after it

Bonus lectures

Audio Version of the Training

OPEN FULL CURRICULUM

Requirements

Basic understanding of IT, networks, and cyber security concepts

Comfort reading documentation and interpreting information security policies

Description of CISM Online Training: CISM Bootcamp Domain 2

This CISM Bootcamp dives into Domain 2: Information Risk Management, providing a complete framework for risk-based decision-making in complex environments. You'll gain a strong foundation in identifying and prioritizing security risks, conducting assessments, and implementing effective mitigation and monitoring strategies.

Guided by a seasoned instructor, this course prepares you to lead enterprise information security programs through practical lectures, real-world case studies, and downloadable study materials. You’ll explore topics such as data classification management, incident management, security awareness training, and implementation acquisition management methods. From SIEM tools to configuration management, you'll gain the skills necessary to guide information security program development, lead security testing assessing, and meet CISM certification requirements with confidence.

  • Perform risk assessments and interpret emerging threat landscapes
  • Understand vulnerability scanners, attackers, and phishing tactics
  • Apply information security management methods and leadership practices
  • Learn network fundamentals, device types, firewalls, and intrusion detection
  • Integrate frameworks like COBIT5, NIST 800-37/53, and ISO 27001
  • Work with virtualization, cloud security, and mobile device protection
  • Lead security services aligned with enterprise governance framework practices

By the end of this information security manager course, you’ll have the information security management skills and confidence needed to pass the CISM exam and serve as a proactive leader in enterprise-level risk management and security incident management.

Who Is This Course For

This course is for professionals preparing for the CISM certification, those entering or advancing in information security management roles, and security leaders focused on information risk management, program design, and governance integration. It’s ideal for both new and experienced information security managers.

Course Instructor

Thor Pedersen

Thor Pedersen is an IT, Cyber Security, and Project Management instructor who teaches both online and in person through his training company, Thor Teaches. He has helped many people achieve their goals and pass certifications. Thor's CISSP courses are the highest rated, with over 20,000 students and 2,600 reviews.

Thor holds multiple certifications, including CISSP, PMP, CEH, SCP, CompTIA Security+, CCNA/CCNP Routing & Switching, CCNA Security, CCENT, and 4011 INFOSEC Professional. He has a passion for learning and is always expanding his training offerings.

Thor is dedicated to helping students succeed and encourages questions and feedback through the course Q&A page or direct messages. His approach to teaching is fueled by a love of IT and continuous growth in the field.

Read More

Read Less

Testimonials

Anonymous

Ahmir T.

This course really clarified security procedures and gave me actionable steps for applying risk frameworks. I especially appreciated the breakdowns on vendor service level agreements and how they tie into real-world security management responsibilities.

Anonymous

Ryan U.

Domain 2 was packed with value. I now have a much better grasp of setting enterprise security baselines and applying contingency planning objectives. The course connects theory to practical risk-based decision-making perfectly.

Anonymous

Shawna D.

The explanations of traditional process management and how it supports risk frameworks were excellent. I also gained clarity on the role of the Computer Emergency Response Team within broader incident management structures.

Show More

Show Less

Frequently Asked Questions

Students Who Took This Course Also Liked

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!