CISM ® – Certified Information Security Manager

Training Courses and Certification Exam Preparation (Bootcamp)

We also deliver all our courses online through live interactive video sessions. Discover our Certifying Training Options.

We have trained over 1500 professionals and advised more than 300 companies. Will you be next?

ACTAGIS delivers trainings at University of Paris I: Panthéon-Sorbonne

Training the new generation in Cybersecurity, IT Governance, Business Continuity and Quality Management is our passionate commitment. Our Lead Trainer Jeff Primus, with 14 years of experience at University of Paris I: Panthéon-Sorbonne, contributes to the development of future leaders and innovators. At ACTAGIS, we value this contribution and are committed to continuing with excellence and integrity.

Course dates can be based on your requirements. Please contact us for the corresponding in-house or public session trainings, so that we can propose sessions taking into account your availability.

IS security and governance

CISM is the only globally recognized certification in the fields of IS management and governance. It has earned a great reputation internationally for many years, as it sets a high and consistent standard worldwide. 

The CISM Job Practice Area consists of five “domains”, 37 “tasks” and 60 “knowledge statements”. Because the different tasks refer to the relevant COBIT processes, COBIT is an integral part of the CISM training and certification.

This training is organized by ACTAGIS with the support of Swiss Chapter of ISACA (www.isaca.ch).

Official BCI Certification

CISM ISACA Training

ACTAGIS, based on a long term partnership with the ISACA Swiss Chapter, proposes learning and preparation classes for all ISACA certifications (also worldwide for in-house trainings).

We guarantee your exam success

Nearly 100% success rate!
We will support you until you pass the exam of the course in which you enroll (some conditions apply). We offer the official mock exams to help you prepare.

Swiss Quality around the world

Our attention to detail, staying up to date, all reflect our commitment to quality. Our trainers bring real-life project experience in implementing frameworks and programs in large organizations.

Hands-on exercises

Free consulting session included

Most of our training programs include a supplementary free online consulting session to help you implement your project in your organisation.

Small classes

Competitive pricing

To ensure that our courses are available to all sizes of companies, we practice competitive pricing.

English and French

Learn from where you are

Our courses are delivered in a traditional classroom setting, as well as live online with an instructor. Certain courses are also available in a self-study format.


Modular approach

The course is presented in two modules:

  • Module 1 is a detailed 10 day course covering all CISM material
  • Module 2 (Exam Bootcamp) is a 3 day exam preparation session
ISACA CISM

What our clients are saying

“ACTAGIS trainer has first hand experience in most the domains covered by the CISA program. This proved to be invaluable in making ISACA’s somewhat theoretical subjects very tangible and meaningful. Many thanks for this great step towards the CISA certification.”Tom RoystonCIO

“During all of the CISA, CBCI and ISO 27001 LI sessions, the consultant openly shared his insightful experiences, carefully listened to all of the participants’ most puzzling questions, remarks, criticisms… and gave precious explanations, recommendations and advice.”Savrak SarHead of IT, Haute école pédagogique

“A great course and a serious levelling up with a good dive into the universe of CISA.”Josselin RenardIT Systems Auditor, UBS

“I thank the consultant for this ISO 27001 training. His pedagogy, technical expertise and long experience in the field make the difference and bring real added value. Course materials are of high quality and the exchanges throughout this training allowed me to assimilate the material and go beyond theory.”Daniel MeierHead Internal Audit, Vaudoise Assurances

At our BCI certification training, the trainer managed not only to cover perfectly the specific, certification-related topics but he also opened windows and connections to other standardization bodies. It was an excellent week enriching our knowledge broadly. Thank you!Christoph TeuberGroup Safety & Security Manager, Swiss Re

“The Business Continuity (BC) course with ACTAGIS enabled me to consolidate and reinforce the knowledge related to the domain. A successful training that will help me to bring BC practices in my company at a higher professional level.”Paulo GriloDirecteur Etudes & Développements, TUI France

“I thank ACTAGIS’ BC-trainer for his professionalism and his motivation during this course which allowed me to obtain the CBCI certification. I recommend this training to anyone who wishes to strengthen and consolidate the topic of Business Continuity.”Jean-Charles CoralBC Manager, Nestlé Switzerland

“I had a great pleasure participating to the ISO 9001 Lead Implenter training provided by Jeff Primus. His engagement, professionalism, motivation and technical expertise gave me full satisfaction. Eeased by his ability of communication, I had no difficulties to assimilate the content of the course. Without any hesitation, I gladly recommend ACTAGIS to everyone who needs guidance for SMQ implementation projects.”Mehmed Cormehic, Lean Manufacturing Engineer, GOLDEC SA

“Thank you for the great course. I did really enjoy it and got a lot of new insights and a much better understanding about what matters in a Business Continuity Management System”Dieter Gramberg, Business Continuity Manager, Novartis Pharma AG

“The course was highly interesting. The tools for managing a Business Continuity Program were teached in a very descriptive and understandable way. I can recommend this course to everybody having a key position in a Business Continuity Program.”Philip Sauter, Business Continuity Manager, ISS Facility Services AG

“I often find that you learn more from the experience of people in the room than anything in the training material and this was definitely the case at ACTAGIS. Jeff has a wealth of experience and he did an excellent job of adapting his delivery the training to the needs of the class.”Anthony Scarfe, Information Security Services Specialist

“Jeff Primus provided a great CISA training. His motivation, engagement and professionalism made the training really interesting and easy to understand. I enjoyed to take part in this training and would like to thank ACTAGIS for helping me to succeed the CISA exam.”Melany Scherer, Global IT Audit – Compliance, Jet Aviation AG

“I thank ACTAGIS, and especially Jeff Primus, for organizing the GDPR – Certified Data Protection Officer –training, which is very useful to me in the context of my professional activities and which I strongly recommend. Organizing trainings for a limited number of participants enables to take full advantage of the courses and to exchange interesting information more easily between professionals active in that domain”Chiara Tanteri – Vice-présidence pour les systèmes d’information, Ecole Polytechnique Fédérale de Lausanne (EPFL)

“Attending the GDPR – Certified Data Protection Officer – training provided by ACTAGIS was at the same time a challenge and a pleasure. The content was extremely interesting and provided by a highly skilled trainer. The setup of the classroom, the small group and the given material contributed to make it successful.”Grégoire Ramuz – CIO, Transports Publics Fribourgeois

“Very intense and worthwhile training. The trainer based his teaching on an excellent knowledge of the GDPR regulation, but also on his hands-on experiences enabling real-life and concrete cases. I recommend this training to anyone dealing with the protection of the personal data within his company “Stéphane Butty – DPO Group – 5àSec

“The way how we went through CBCI from policy to validation via practical examples was inspiring. Jeff’s enthusiastic and knowledgeable approach to BC area and ability to promote discussions really expanded understanding of this topic. Now I think that I have good tools to practice. Thank you Jeff!”Miska Riihimäki – Senior Risk Manager – OP Insurance Ltd

“I followed a CISSP course in a small group with ACTAGIS. Jeff teached with expertise, passion and profession. The complex subject of IT security was presented understandable and garnished with many real life examples. The atmosphere was intensive and forward oriented, but relaxed and fruitful. I’m really impressed and with no doubt I would follow, and recommend others to follow, courses with ACTAGIS”Harald Friedel – Project Manager & DPO

Jeff’s primary goal is not only to help you digest the material, but arrive at the examination with the right tools and the right confidence level so to maximize your chances to pass with flying colors. I recommend Jeff wholeheartedly and without reservations. Jeff is one of those rare sure bets!Massimo Marino – CDPO – Advanced Accelerator Applications

Having participated to the ISO 27001 LA training led by Jeff Primus, I was able to appreciate his value as a trainer both in terms of his technical skills and his extensive experience in auditing . Jeff is an experienced professional who communicates his knowledge with enthusiasm. This allowed me to succeed the certification exam. I would like to recommend ACTAGIS for the quality of their services and the perfect organization of this trainingStéphane Reuss – Audit interne Groupe Mutuel

I came from Paris to attend the ISO 27001 LI training which was led by a trainer of rare efficiency and having a real knowledge of the concepts coupled with a solid field experience. The training was based on theoretical fundamentals which were illustrated to us in a concrete way through workshops and group exchanges. The entire group succeeded the certification exam. Thanks again to ACTAGIS for their warm welcome, the quality of the training and their professionalismLotfi Adassen – Information Security Architect – Hitachi Automotive Systems Group

I had the pleasure to attend GDPR training provided by Jeff and ACTAGIS. The course was quite challenging in terms of material that required to be absorbed and Jeff made the work engaging, whilst providing good real case examples to the participants. He also explained the technical and legal parts very clearly for those who are not in IT or who has no legal background. I would happily recommend Jeff and ACTAGIS to those looking for an excellent and detailed insight. Clare Joyner, Legal Counsel, IMD

I participated to ACTAGIS Academy CISSP training. I definitely recommend this course to everyone who wants to succeed the CISSP exam. Jeff is an excellent trainer who knows how to vehicle the key messages enhanced with real life examples. Thanks Jeff for that excellent course ! Gilbert Caballer, IT Audit Expert, UBS

The BCI training based on solid experience and real life examples was provided by a very professional and patient mentor, Jeff Primus. Small group of participants is a great benefit for added value discussions. The training exceeded all my expectations. Andrey Afanasiev, Vice President, Risk Manager, RCB Bank Ltd

CISSP training given by ACTAGIS trainers, is intense and very complete. During the 5 days, you get home exhausted but with knowledge you did not have when started the day. The trainers use a methodology that helps you understand the concepts and the trap questions you might get in the exam. Totally worth it.Diego de Haller, IT Security Service Manager

Thank you for your training. I particularly appreciated the quality of the teachers Jeff and his colleague who were able to animate this course in an attractive and instructive way by alternating the theoretical part and the practical exercises. The course material is a summary of excellent quality. I highly recommend this course.Remo Stolz, IT Manager, CIMO

I’m a repeat offender at Jeff’s courses, having already attended CISA, CISSP and CRISC courses. Jeff is an engaging teacher and bring numerous examples from real life. Class size is limited, so there is always time for questions. I’m planning on attacking CISM next year and will certainly be knocking once again on Jeff’s door. Highly recommended !Liz O’Sullivan, Bundesamt für Informatik und Telekommunication BIT, Head of Security

“The CBCI training provided by the trainer was invaluable for me. All the participants highly appreciated his excellent knowledge, experience, focus on key points, manner of teaching, understanding of the participants’ requirements. Thank you for the great training delivered! I definitely recommend ACTAGIS if you want to succeed the exam.”Anna Glazunova, BC Manager

“One of my concerns in every training opportunity is that it may just end up being theoretical with limited relevance to my work realities. I am glad to have taken my CBCI course with ACTAGIS. Jeff was able to share his vast experience as the subject matter expert and explain via practical examples how to apply the principles and tools in our real work situations. This kept us engaged throughout the intense training. Even with little preparation, I passed the exam with Merit. I look forward to taking the next course with ACTAGIS.”Mathew Siwoi, Senior Oversight Officer, UNHCR

“The training provided by ACTAGIS is of a high level of quality thanks to the experience and personality of the trainer. We were not only able to prepare ourselves for the CDPO exam, but also benefit from his knowledge necessary for a successful implementation of the GDPR in our organizations”.Romain Galster, IT Manager, FINA

“The BCM course allowed me to expand my understanding and analysis of the different themes. Beyond the course material and the academic notions necessary for the certification, Jeff does everything possible to put us in a practical context by sharing his knowledge and experience. He teaches with passion, enthusiasm and adapts to the participants so that we can benefit from his expertise”.

“I would like to thank Jeff for all the support that permitted me to pass the CBCI exam. The course was challenging, with lots of useful information, and Jeff was always there supporting me (and all the other trainees) and ready to help. I enjoyed your class tremendously. I look forward to taking another class with ACTAGIS.”Valentin Mazareanu, PhD, Data Security Officer, SCC Services Romania

“In a very pleasant environment, I participated to the GDPR-CDPO training delivered by ACTAGIS which I recommend. Throughout the sessions, the expert trained us with dynamism and pedagogy while sharing his field experience. During this training, I was able to submit my questions on practical cases. All these points greatly contributed grandly to the success of the certification exam.”Vincent Bovay, Responsable informatique, Altis

“The CBCI training with ACTAGIS provided me the needed information to increase my knowledge for my current professional context and to understand what business continuity is for, including all the connections with the real world to reach higher level of knowledge.”Aristidis Lampiris, Major Incident and Process Expert, Swiss Re

“The trainer led the CBCI course very well. He covered the material at an ideal pace, ensured the active participations of all, and encouraged an interactive atmosphere in class. All these advantages helped me to succeeded the certification exam.”Maximilian Mayer, Senior Consultant, Allianz

“To attend the CDPO training with ACTAGIS. The volume of information and the subject matter were intense given its ONLINE conduct due to the pandemic situation. In this context, Massimo made it very accessible to us given his extensive professional experience and pedagogy. I can only recommend ACTAGIS as a training partner.”Mahieu Perrin, IT Advisor

“Very good training to prepare the CISSP exam. Both trainers are experts in theirs fields. They were dedicated and created a comfortable environment that allowed valuable experience sharing. During the sessions, they provided real life examples which made the concepts easy to understand. After ACTAGIS’ training, I feel more confident and equipped with the right tools to succeed.”Besma Elketroussi, Graduate – CyberSecurity Project Manager, Banking Sector

“I would like to thank ACTAGIS, and in particular Jeff and Alexandre, for the CISSP certification preparation course. An intense 5-day course, in a studious but relaxed atmosphere, which prepared me as well as possible to pass this demanding certification. Thank you again, and I look forward to taking another course with you !”Claude-Alain SchweriResponsable sécurité informatique et technologie

“A very good preparation for the CISA. Good pedagogical approach, going to the essential. Allows you to have fruitful exchanges with specialists. Makes the preparation of the exam enjoyable and adds IT knowledge beyond the strict CISA framework.”Lionel NoetzlinHead of Internal Audit

CBCI training was engaging, challenging, and eye-opening. The experienced trainer provided practical examples, shared real-world cases and invaluable insights. It was a truly enriching experience that expanded my understanding of business continuity (BC). If you want to improve your knowledge and skills in BC, don’t miss this opportunity. Thanks for delivering a fantastic learning experience. It’s time well spent!Jean-Philippe SchadInformation Security Officer

I would like to express my complete satisfaction regarding ACTAGIS and the CISSP training delivered by their two instructors. Their expertise and passion for the subject greatly enhanced the learning experience. The courses were clear, well-structured, and supported by concrete examples, enabling effective knowledge assimilation. I highly recommend this course to anyone looking to prepare for the CISSP certification.Sivathushn VairavanatharChief Information Security Officer

Certification organisations

ITACS - CISA

Certificate Sample

CISM Certificate Sample

Module 1

A detailed 10 day course

In this module, we will go through all CISM themes, in a detailed manner. This module contains:

  • Theoretical and conceptual sections
  • Case studies
  • Tests by theme
  • Group work
  • Interactive sessions

Module 1 is mostly aimed at the following profiles:

  • Chief Information Officer
  • Security Officer
  • IT project manager
  • Compliance Officer
  • IT Architect
  • IT Resources Manager

Module 1 of this course is subdivided into 9 chapters, covering all CISM Job Practice Areas in details, by going through the following chapters:

  1. Introduction (1 day): ISACA, CISM Job Practice Areas, course concept, learning technique, personal study
  2. Basics (2 days): IT risk management & ICS (Internal Control System), IT governance
  3. Application lifecycle (1 day): Project management, software development, integration, security, user controls
  4. Organisational security (1 day): Economic & IT criminality, risk analysis, cultural aspects of security, awareness-training
  5. Risk management (1 day): Identification, assessment and management of IT risks. Comparison of various frameworks such as ISO 27005, RiskIT
  6. Performance management (1 day): Maturity models, Key Performance Indicators, Balanced Score Card, Benchmarking
  7. Security management (1 day): Design and implementation of an Information Systems Management System (ISMS), ISO 2700x, CobiT Security Baseline, certification
  8. Technical security (1 day): Physical security, IT protection against fire, telecommunication security, encryption
  9. Incident management (1 day): Incident management, IT Disaster Recovery, Business Continuity Management (BCM)

Days

Courses highlighted in green are rapidly filling up.
Don't miss out.

Upcoming courses

Course dates can be based on your requirements. Please contact us for the corresponding in-house or public session trainings, so that we can propose sessions taking into account your availability.

Module 2 – Exam Bootcamp

A 3 day exam preparation session

Building on pre-course preparation work, we will go through all the CISM domains and conclude the course with a realistic test examination followed by an evaluation and discussions. With the appropriate level of personal preparation, you will acquire the necessary knowledge to be able to pass the CISM exam. Our aim is to optimally prepare you for this challenging test, by going through the Job Practice Area and by offering a realistic test exam.

This training is intended to professionals who have already had IT experience. It is recommended for the participants to have a detailed knowledge of the CISM Job Practice Area and having read through the CISM Review Manual prior to taking the course and, ideally, to have several years of professional experience in different areas of IT. The CISM exam preparation course is aimed at all persons who deal with the governance, audit or security of information systems, such as:

  • Chief Information Officer
  • Security Officer
  • IT project manager
  • Compliance Officer
  • IT Architect
  • IT Resources Manager
Our instructors are all certified professionals, who bring with them over 20 years of field experience in the domain of IT security. Our course can be given in English and in French, and includes a realistic exam simulation, as well as two complete exams with personal detailed analysis, in English. This is an intensive 4-days course for advanced participants who have already gone through the CISM Job Practice Area and the CISM Review Manual.

The first two and a half days of the course consist of an intensive and systematic review of all tasks within the CISM Job Practice Area. Here the aspects which are important from the examination perspective are presented, without going into the details of each task, which is why some level of expertise is required. Those who would like to study all CISM tasks in detail should join our advanced course.

Following the initial phase, a realistic test examination is organized (in English). After this test exam, we will discuss the results during the last day of the training. You will also be provided with a second test, which you can perform on your own time. We will then correct it and send you back your results.

The domains covered by this certification are:

  1. Information Security Governance (24%)
  2. Information Risk Management (30%)
  3. Implementation of an Information Security Program (27%)
  4. Information Security Incidents Management (19%)

Domain 1 – Information Security Governance – (24%)

Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives.

Task Statements

  1. Establish and/or maintain an information security strategy in alignment with organizational goals and objectives to guide the establishment and/or ongoing management of the information security program.
  2. Establish and/or maintain an information security governance framework to guide activities that support the information security strategy.
  3. Integrate information security governance into corporate governance to ensure that organizational goals and objectives are supported by the information security program.
  4. Establish and maintain information security policies to guide the development of standards, procedures and guidelines in alignment with enterprise goals and objectives.
  5. Develop business cases to support investments in information security.
  6. Identify internal and external influences to the organization (e.g., emerging technologies, social media, business environment, risk tolerance, regulatory requirements, third-party considerations, threat landscape) to ensure that these factors are continually addressed by the information security strategy.
  7. Gain ongoing commitment from senior leadership and other stakeholders to support the successful implementation of the information security strategy.
  8. Define, communicate, and monitor information security responsibilities throughout the organization (e.g., data owners, data custodians, end-users, privileged or high-risk users) and lines of authority.
  9. Establish, monitor, evaluate and report key information security metrics to provide management with accurate and meaningful information regarding the effectiveness of the information security strategy.

Domain 2 – Information Risk Management – (30%)

Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.

Task Statements

  1. Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
  2. Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
  3. Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently, at appropriate times, and to identify and assess risk to the organization’s information.
  4. Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite.
  5. Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.
  6. Facilitate the integration of information risk management into business and IT processes (e.g., systems development, procurement, project management) to enable a consistent and comprehensive information risk management program across the organization.
  7. Monitor for internal and external factors (e.g., key risk indicators [KRIs], threat landscape, geopolitical, regulatory change) that may require reassessment of risk to ensure that changes to existing, or new, risk scenarios are identified and managed appropriately.
  8. Report noncompliance and other changes in information risk to facilitate the risk management decision-making process.
  9. Ensure that information security risk is reported to senior management to support an understanding of potential impact on the organizational goals and objectives.

Domain 3 – Information Security Program Development and Management – (27%)

Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture.

Task Statements

  1. Establish and/or maintain the information security program in alignment with the information security strategy.
  2. Align the information security program with the operational objectives of other business functions (e.g., human resources [HR], accounting, procurement and IT) to ensure that the information security program adds value to and protects the business.
  3. Identify, acquire and manage requirements for internal and external resources to execute the information security program.
  4. Establish and maintain information security processes and resources (including people and technologies) to execute the information security program in alignment with the organization’s business goals.
  5. Establish, communicate and maintain organizational information security standards, guidelines, procedures and other documentation to guide and enforce compliance with information security policies.
  6. Establish, promote and maintain a program for information security awareness and training to foster an effective security culture.
  7. Integrate information security requirements into organizational processes (e.g., change control, mergers and acquisitions, system development, business continuity, disaster recovery) to maintain the organization’s security strategy.
  8. Integrate information security requirements into contracts and activities of third parties (e.g., joint ventures, outsourced providers, business partners, customers) and monitor adherence to established requirements in order to maintain the organization’s security strategy.
  9. Establish, monitor and analyze program management and operational metrics to evaluate the effectiveness and efficiency of the information security program.
  10. Compile and present reports to key stakeholders on the activities, trends and overall effectiveness of the IS program and the underlying business processes in order to communicate security performance.

Domain 4 – Information Security Incident Management – (19%)

Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.

Task Statements

  1. Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents to allow accurate classification and categorization of and response to incidents.
  2. Establish and maintain an incident response plan to ensure an effective and timely response to information security incidents.
  3. Develop and implement processes to ensure the timely identification of information security incidents that could impact the business.
  4. Establish and maintain processes to investigate and document information security incidents in order to determine the appropriate response and cause while adhering to legal, regulatory and organizational requirements.
  5. Establish and maintain incident notification and escalation processes to ensure that the appropriate stakeholders are involved in incident response management.
  6. Organize, train and equip incident response teams to respond to information security incidents in an effective and timely manner.
  7. Test, review and revise (as applicable) the incident response plan periodically to ensure an effective response to information security incidents and to improve response capabilities.
  8. Establish and maintain communication plans and processes to manage communication with internal and external entities.
  9. Conduct post-incident reviews to determine the root cause of information security incidents, develop corrective actions, reassess risk, evaluate response effectiveness and take appropriate remedial actions.
  10. Establish and maintain integration among the incident response plan, business continuity plan and disaster recovery plan.
  • CISA tasks: some
  • CISM tasks: all
  • CGEIT tasks: some
  • CRISC tasks: some
  • COBIT5 processes: (all)
In order to become CISM-certified, and in addition to passing the CISM exam, the candidate must have a minimum of five years of professional IS audit, control, assurance or security work experience. Substitution and waivers for professional experience include for example some university semester credit hours, a bachelor’s or master’s degree, or teaching experience in a related field. For more information please read the detailed course description at www.isaca.org.

The CISM exam is booked separately through ISACA.

It lasts 4 hours (240 minutes) and contains 150 multiple-choice questions.

The cost is US$ 575 for ISACA members and US$ 760 for non-members.

Days

Courses highlighted in green are rapidly filling up.
Don't miss out.

Upcoming courses

30apr(apr 30)09:0002may(may 2)16:30CISM - M2 - Exam BootcampIN-CLASSROOM - Geneva / Lausanne-Switzerland / ONLINE - Live Interactive

15may(may 15)09:0017(may 17)16:30CISM - M2 - Exam BootcampIN-CLASSROOM - Geneva / Lausanne-Switzerland / ONLINE - Live Interactive

18jun(jun 18)09:0020(jun 20)16:30CISM - M2 - Exam BootcampIN-CLASSROOM - Lausanne-Switzerland / ONLINE - Live Interactive

17sep(sep 17)09:0020(sep 20)16:30CISM - M2 - Exam BootcampIN-CLASSROOM - Lausanne-Switzerland / ONLINE - Live Interactive

04nov(nov 4)09:0005(nov 5)16:30CISM - M2 - Exam BootcampIN-CLASSROOM - Geneva / Lausanne-Switzerland / ONLINE - Live Interactive

02dec(dec 2)09:0003(dec 3)16:30CISM - M2 - Exam BootcampIN-CLASSROOM - Lausanne-Switzerland / ONLINE - Live Interactive

The training is a combination of directly applicable theory, hands-on exercises, feedback from experience and class interaction.

%

Exam pass rate

You will be well prepared for the exam. Counting all our students, almost 100% have been successful.

Up To Date

All our courses are up to date. They have been adapted to the latest changes of the different exams. We are in constant contact with each certification organisation.

The training is a combination of directly applicable theory, hands-on exercises, feedback from experience and class interaction.

You will be well prepared for the exam. Counting all our students, almost 100% have been successful.

All our courses are up to date. They have been adapted to the latest changes of the different exams. We are in constant contact with each certification organisation.

Interested? Ask us more!

    Your interest

    Name (required)

    Email (required)

    Direct Business Phone with country code (required)

    Mobile Phone with country code (required)

    City (required)

    Country (required)

    Your message


    Actagis Academy

    Learn more about Actagis Academy and how it can benefit you and your organisation.