Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Certified Information Security Manager (Cism)

    Posted By: ELK1nG
    Certified Information Security Manager (Cism)

    Certified Information Security Manager (Cism)
    Published 4/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 14.65 GB | Duration: 13h 51m

    Exam Preparatory course

    What you'll learn

    IT security managers who are responsible for developing and managing information security programs within their organizations.

    IT auditors who want to understand information security management best practices and how to audit information security programs.

    IT risk management professionals who want to understand how to identify, assess, and manage information security risks.

    Security consultants who want to develop expertise in information security management and provide consulting services to organizations.

    IT professionals who want to advance their careers in information security management.

    Requirements

    Experience: Candidates must have a minimum of five years of experience in information security management, with at least three years of experience in the role of an information security manager.

    Education: Candidates can substitute one year of experience with a four-year degree in information security management or a related field.

    Adherence to the Code of Ethics: Candidates must adhere to the ISACA Code of Ethics.

    Continuing Education: Candidates must commit to ongoing professional education and development to maintain their CISM certification.

    Description

    Certified Information Security Manager (CISM) is a certification course designed for IT professionals who are responsible for developing, managing, and overseeing information security programs within their organizations. This course provides a comprehensive understanding of the best practices in information security management, risk management, and incident management.The CISM certification is designed for IT professionals who have experience in information security management, and who are responsible for managing and overseeing information security programs within their organizations. This course is suitable for IT security managers, IT auditors, IT risk management professionals, and individuals who want to advance their careers in information security management.The Certified Information Security Manager (CISM) certification course is designed for IT professionals who are responsible for developing, managing, and overseeing information security programs within their organizations.The CISM certification is designed for experienced information security professionals who have a deep understanding of information security management best practices and who want to develop the skills required to manage and oversee information security programs within their organizations. The prerequisites are in place to ensure that candidates have the necessary experience and knowledge to successfully complete the course and earn the CISM certification.Overall, the CISM certification course provides a comprehensive understanding of information security management best practices, and helps candidates develop the skills required to manage and oversee information security programs within their organizations.

    Overview

    Section 1: Information Security Governance

    Lecture 1 Course Overview

    Lecture 2 Enterprise Governance

    Lecture 3 Organizational Culture

    Lecture 4 Legal Regulatory & Contractual Requirements

    Lecture 5 Organizational Structures Roles & Responsibilities

    Lecture 6 Information Security Strategy Development

    Lecture 7 Information Governance Frameworks & Standards

    Lecture 8 Strategic Planning

    Lecture 9 Information Security Governance - Key Points

    Section 2: Information Security Risk Management

    Lecture 10 Information Security Risk Assessment

    Lecture 11 Emerging Risk & Threat Landscape

    Lecture 12 Vulnerability & Control Deficiency Analysis

    Lecture 13 Risk Assessment & Analysis - Background

    Lecture 14 Risk Assessment & Analysis - Scenarios

    Lecture 15 Risk Assessment & Analysis - Process

    Lecture 16 Risk Assessment & Analysis - Methodologies

    Lecture 17 Risk Assessment & Analysis - Analysis

    Lecture 18 Risk Treatment & Risk Response Options

    Lecture 19 Risk & Control Ownership

    Lecture 20 Risk Monitoring & Reporting

    Lecture 21 Information Security Risk Management - Key Points

    Section 3: Information Security Program

    Lecture 22 Information Security Program Overview

    Lecture 23 Information Security Program Resources

    Lecture 24 Information Asset Identification & Classification

    Lecture 25 Standards & Frameworks for Information Security

    Lecture 26 Information Security Policies Procedures & Guidelines

    Lecture 27 Information Security Program Metrics

    Lecture 28 Information Security Control Design & Selection

    Lecture 29 Control Implementation Integration Testing & Evaluation

    Lecture 30 Information Security Awareness & Training

    Lecture 31 Integration with IT Operations - SDLC & DevOps

    Lecture 32 Integration with IT Operations - ITSM

    Lecture 33 Integration with IT Operations - Cloud

    Lecture 34 Management of External Services

    Lecture 35 Information Security Program Communications & Reporting

    Lecture 36 Information Security Program - Key Points

    Section 4: Incident Management

    Lecture 37 Incident Management Readiness

    Lecture 38 Incident Response Plan

    Lecture 39 Business Impact Analysis (BIA)

    Lecture 40 Spotlight on BIA Derived Objectives

    Lecture 41 Business Continuity Plan (BCP)

    Lecture 42 Disaster Recovery Plan (DRP)

    Lecture 43 Incident Classification & Categorization

    Lecture 44 Incident Management Training Testing & Evaluation

    Lecture 45 Incident Management Tools & Techniques

    Lecture 46 Evaluation Containment Communication & Recovery

    Lecture 47 Post-incident Review Practices

    Lecture 48 Incident Management - Key Points

    IT security managers who are responsible for developing and managing information security programs within their organizations.,IT auditors who want to understand information security management best practices and how to audit information security programs.,IT risk management professionals who want to understand how to identify, assess, and manage information security risks.,Security consultants who want to develop expertise in information security management and provide consulting services to organizations.,IT professionals who want to advance their careers in information security management.