loading...
Sale!

ISACA CISM – Certified Information Security Manager Course & Guides

$15.00

Price: 10.00 USD | Size: 2.24GB |  Duration : 14+  Hours  | 102 Video Lessons | Bonus :  ISACA CISM PDF Guides 

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 5.0

OR

Description

Price: 10.00 USD | Size: 2.24GB |  Duration : 14+  Hours  | 102 Video Lessons | Bonus :  ISACA CISM PDF Guides 

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 5.0

This intermediate ISACA CISM training prepares learners to take the CISM exam, which is the one required exam to earn the CISM certification.

In any industry, there are professional organizations who design certifications to help define what skills and knowledge are necessary to be considered an expert within the profession. For the world of information security, ISACA is one such organization. The nonprofit org publishes several certifications to define what an expert in developing, managing or maintaining information security programs looks like.

The Certified Information Security Manager is central to a serious security engineer’s career — earn one and you can prove your expertise in enterprise information security governance, management and incident response.

For anyone who manages their ISACA training, this ISACA training can be used for CISM exam exam prep, onboarding new security engineers, individual or team training plans, or as a ISACA reference resource.

CISM: What You Need to Know

This CISM training maps to the CISM exam information security exam objectives, and covers topics such as:

  • Overseeing the actions of information security risk management teams
  • Analyzing and interpreting infosec governing documents and regulations for your organization
  • Moving on from technical mastery of information security and into team management
  • Leading infosec incident response planning and execution

Who Should Take CISM Training?

This CISM training is considered professional-level ISACA training, which means it was designed for security engineers. This information security skills course is designed for security engineers with three to five years of experience with information security and risk management.

New or aspiring security engineers. If you’re a brand new security engineer, the CISM may be a tall hurdle to clear at the start of your career. One of the minimum requirements of earning the CISM is 5 years of professional information security management work experience, so you may be best served preparing for it as you work. That said, it’s not like the knowledge the cert tests for is restricted to five years of experience: you’re free to take the training and even try for the exam at any time. Getting CISM training can help you advance your career whenever you’re ready to.

Experienced security engineers. If you’ve been working as a security engineer for several years already, the CISM has probably been looming in the distance ahead of you for some time. Earning it is a huge milestone in any career and can lead to promotions and more responsibilities. It also costs $575 to attempt the test, so you want to be very sure you’re completely ready. CISM training will help make sure you nail the test and don’t have to pay for it more than once.

 

Establishing an Information Security Strategy
1. Information Security Governance
11 mins
2. Information Security Strategy
11 mins
3. Security Frameworks
7 mins
4. Identifying and Managing Strategic Objectives
7 mins
5. Business Model for Information Security (BMIS)
6 mins
6. Section Review
6 mins

Security Program Resources
1. Policies, Processes, and Procedures
8 mins
2. Standards, Guidelines, and Architecture
5 mins
3. Controls, Metrics, and Assets
8 mins
4. Risk Ledgers, Vulnerability Assessments, and Insurance oh my!
5 mins
5. Critical Data, BIA’s, and BC/DR Planning
9 mins
6. Incident Logs, Audits, & Culture
4 mins
7. Security Training, Third Party Risk, & LCR Requirements
6 mins

Keys to a Successful Security Program Implementation
1. Creating a Business Case
11 mins
2. Communications & Reporting
7 mins
3. Communicating Technical Information
6 mins
4. Management Commitment
7 mins
5. Security Awareness Training
7 mins
6. Common Causes of Failure
10 mins

Security Roles and Metrics
1. Organizational Roles
13 mins
2. Data Roles
4 mins
3. Metrics
7 mins
4. Metrics Example 1
13 mins
5. Metrics Example 2
10 mins
6. Security Balanced Scorecard
6 mins

Implementing Risk Management
1. The Role of Risk Management
7 mins
2. Risk Management Frameworks
11 mins
3. Risk Management Strategy
10 mins
4. Analyzing Risk
11 mins
5. Risk Analysis Techniques
8 mins
6. Treating Risk
12 mins

Risk Management Standards
1. Risk Management Activities
10 mins
2. NIST SP 800-39
11 mins
3. NIST SP 800-30
9 mins
4. ISO/IEC 27005
12 mins
5. Factor Analysis of Information Risk (FAIR)
5 mins

Asset Inventory and Threats
1. Hardware, Software, and Information Assets
8 mins
2. Cloud and Virtual Assets
14 mins
3. Asset, Information, and System Classification
10 mins
4. Asset Valuation
3 mins
5. Identifying Threats to Assets
8 mins
6. Identifying Asset Vulnerabilities
4 mins

Operational Risk Management
1. Risk Management Objectives
14 mins
2. Third-Party Risk Management
18 mins
3. The Risk Register
5 mins
4. Integrating Risk Management into Other Processes
8 mins
5. Risk Monitoring and Reporting
6 mins

Information Security Program Development
1. Designing an Information Security Program
5 mins
2. Information Security Program Details
6 mins
3. Information Security Architecture
6 mins
4. Information Security Program Management
10 mins
5. Security Policies
9 mins
6. Working With Internal and External Resources
7 mins

IS Audit Planning
1. Discussing IS Audit Standards, Guidelines, and Code of Ethics
9 mins
2. Evaluating the Business Process
9 mins
3. Auditing Business Applications
12 mins
4. Defining Types of Controls
8 mins
5. Analyzing Risk Based Audit Planning
9 mins
6. Identifying Types of Audits
5 mins

IS Audit Execution
1. Discussing Audit Project Management
10 mins
2. Sampling Methodologies
7 mins
3. Considering Audit Evidence Collection Techniques
9 mins
4. Exploring Data Analytics
11 mins
5. Implementing Continuous Online Auditing
6 mins
6. Exploring Reporting and Communication Techniques
7 mins
7. Ensuring Quality and Improvement of the Audit Process
4 mins
8. IS Audit Process Domain Review
9 mins

Data Classification and Encryption
1. Exploring Data Classification
4 mins
2. Covering Encryption Basics
3 mins
3. Reviewing Encryption Systems
6 mins
4. Diving into Digital Signatures
7 mins
5. Touring Cryptographic Applications
3 mins
6. Examining Public Key Infrastructure (PKI)
4 mins

Security Program Operations
1. SOCs and Event Monitoring
11 mins
2. Vulnerability and Patch Management
8 mins
3. Network Protection
13 mins
4. Content Filtering
12 mins
5. Endpoint Protection and Management
6 mins

Security Program Management Functions
1. Secure Engineering and Development
7 mins
2. Identity and Access Management
13 mins
3. Security Training and MSSPs
13 mins
4. Data Backup and Recovery
16 mins
5. Financial and Capacity Management
5 mins

Security Controls and Control Frameworks
1. Security Controls
6 mins
2. Security Control Categories
5 mins
3. Security Control Functions
6 mins
4. Testing Security Controls
7 mins
5. Control Objectives and Frameworks
7 mins
6. Designing Controls
6 mins
7. Security Control Review
15 mins

Phases of Incident Response
1. Incident Response Preparation
12 mins
2. Incident Response Planning
9 mins
3. Detection, Initiation, and Evaluation
8 mins
4. Containment, Eradication, and Recovery
6 mins
5. Remediation, Closure, and Post-Incident Review
4 mins
6. Incident Response Resources
7 mins

Business Continuity and Disaster Recovery Planning
1. BC and DR Planning
4 mins
2. BC/DR Planning Process
12 mins
3. Creating a BC Plan
7 mins
4. DR Planning
15 mins
5. Resiliency Technologies
8 mins
6. Testing BC/DR Plans
5 mins

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

0
    0
    Your Cart
    Your cart is emptyReturn to Shop

    Add to cart