Certified Information Security Manager (Cism)

Posted By: ELK1nG

Certified Information Security Manager (Cism)
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 14.65 GB | Duration: 13h 51m

Exam Preparatory course

What you'll learn

IT security managers who are responsible for developing and managing information security programs within their organizations.

IT auditors who want to understand information security management best practices and how to audit information security programs.

IT risk management professionals who want to understand how to identify, assess, and manage information security risks.

Security consultants who want to develop expertise in information security management and provide consulting services to organizations.

IT professionals who want to advance their careers in information security management.

Requirements

Experience: Candidates must have a minimum of five years of experience in information security management, with at least three years of experience in the role of an information security manager.

Education: Candidates can substitute one year of experience with a four-year degree in information security management or a related field.

Adherence to the Code of Ethics: Candidates must adhere to the ISACA Code of Ethics.

Continuing Education: Candidates must commit to ongoing professional education and development to maintain their CISM certification.

Description

Certified Information Security Manager (CISM) is a certification course designed for IT professionals who are responsible for developing, managing, and overseeing information security programs within their organizations. This course provides a comprehensive understanding of the best practices in information security management, risk management, and incident management.The CISM certification is designed for IT professionals who have experience in information security management, and who are responsible for managing and overseeing information security programs within their organizations. This course is suitable for IT security managers, IT auditors, IT risk management professionals, and individuals who want to advance their careers in information security management.The Certified Information Security Manager (CISM) certification course is designed for IT professionals who are responsible for developing, managing, and overseeing information security programs within their organizations.The CISM certification is designed for experienced information security professionals who have a deep understanding of information security management best practices and who want to develop the skills required to manage and oversee information security programs within their organizations. The prerequisites are in place to ensure that candidates have the necessary experience and knowledge to successfully complete the course and earn the CISM certification.Overall, the CISM certification course provides a comprehensive understanding of information security management best practices, and helps candidates develop the skills required to manage and oversee information security programs within their organizations.

Overview

Section 1: Information Security Governance

Lecture 1 Course Overview

Lecture 2 Enterprise Governance

Lecture 3 Organizational Culture

Lecture 4 Legal Regulatory & Contractual Requirements

Lecture 5 Organizational Structures Roles & Responsibilities

Lecture 6 Information Security Strategy Development

Lecture 7 Information Governance Frameworks & Standards

Lecture 8 Strategic Planning

Lecture 9 Information Security Governance - Key Points

Section 2: Information Security Risk Management

Lecture 10 Information Security Risk Assessment

Lecture 11 Emerging Risk & Threat Landscape

Lecture 12 Vulnerability & Control Deficiency Analysis

Lecture 13 Risk Assessment & Analysis - Background

Lecture 14 Risk Assessment & Analysis - Scenarios

Lecture 15 Risk Assessment & Analysis - Process

Lecture 16 Risk Assessment & Analysis - Methodologies

Lecture 17 Risk Assessment & Analysis - Analysis

Lecture 18 Risk Treatment & Risk Response Options

Lecture 19 Risk & Control Ownership

Lecture 20 Risk Monitoring & Reporting

Lecture 21 Information Security Risk Management - Key Points

Section 3: Information Security Program

Lecture 22 Information Security Program Overview

Lecture 23 Information Security Program Resources

Lecture 24 Information Asset Identification & Classification

Lecture 25 Standards & Frameworks for Information Security

Lecture 26 Information Security Policies Procedures & Guidelines

Lecture 27 Information Security Program Metrics

Lecture 28 Information Security Control Design & Selection

Lecture 29 Control Implementation Integration Testing & Evaluation

Lecture 30 Information Security Awareness & Training

Lecture 31 Integration with IT Operations - SDLC & DevOps

Lecture 32 Integration with IT Operations - ITSM

Lecture 33 Integration with IT Operations - Cloud

Lecture 34 Management of External Services

Lecture 35 Information Security Program Communications & Reporting

Lecture 36 Information Security Program - Key Points

Section 4: Incident Management

Lecture 37 Incident Management Readiness

Lecture 38 Incident Response Plan

Lecture 39 Business Impact Analysis (BIA)

Lecture 40 Spotlight on BIA Derived Objectives

Lecture 41 Business Continuity Plan (BCP)

Lecture 42 Disaster Recovery Plan (DRP)

Lecture 43 Incident Classification & Categorization

Lecture 44 Incident Management Training Testing & Evaluation

Lecture 45 Incident Management Tools & Techniques

Lecture 46 Evaluation Containment Communication & Recovery

Lecture 47 Post-incident Review Practices

Lecture 48 Incident Management - Key Points

IT security managers who are responsible for developing and managing information security programs within their organizations.,IT auditors who want to understand information security management best practices and how to audit information security programs.,IT risk management professionals who want to understand how to identify, assess, and manage information security risks.,Security consultants who want to develop expertise in information security management and provide consulting services to organizations.,IT professionals who want to advance their careers in information security management.