Cism - Certified Information Security Manager Full Training

Posted By: ELK1nG

Cism - Certified Information Security Manager Full Training
Last updated 8/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.60 GB | Duration: 14h 46m

Prepare for ISACA CISM Exam

What you'll learn

Understand the key concepts and principles of information security management

Develop and implement an effective information security program

Understand the importance of risk management and how to manage risks effectively

Identify and respond to information security incidents

Prepare for and pass the CISM certification exam

Requirements

There are no formal prerequisites for taking the CISM training course. However, it is recommended that you have some experience in information security management or a related field.

Description

Welcome to the landing page for the CISM training course! In this comprehensive course, you will learn everything you need to know to become a certified Information Security Manager (CISM).Course Overview:The CISM training course is designed to provide you with a detailed understanding of information security management, risk management, and incident management. The course is divided into four domains, each of which is covered in-depth:Information Security GovernanceRisk ManagementInformation Security Program Development and ManagementInformation Security Incident ManagementThe course is designed to help you develop the necessary skills to become a successful information security manager by providing you with practical knowledge and hands-on experience.Course Objectives:Upon completion of the course, you will be able to:Understand the key concepts and principles of information security managementDevelop and implement an effective information security programUnderstand the importance of risk management and how to manage risks effectivelyIdentify and respond to information security incidentsPrepare for and pass the CISM certification examCourse Requirements:There are no formal prerequisites for taking the CISM training course. However, it is recommended that you have some experience in information security management or a related field.Certification:Upon completion of the course, you will be eligible to sit for the CISM certification exam. The exam is administered by ISACA and consists of 150 multiple-choice questions. To pass the exam, you must achieve a score of at least 450 out of 800.Enroll in the CISM training course today and take the first step towards becoming a certified information security manager!

Overview

Section 1: Course Introduction

Lecture 1 Meet the Instructor

Lecture 2 Have a Question? Here how to get in touch

Lecture 3 Rating is Caring

Lecture 4 Getting the Course Completion Certificate

Section 2: Security Foundations for Security Managers

Lecture 5 CIA Triad and the Security Objectives

Lecture 6 Privacy and Security

Lecture 7 Cyber Kill Chain

Lecture 8 Cyber Attacks

Lecture 9 MiTM

Lecture 10 Malware and Cyber Threats

Lecture 11 Password Attacks and Rainbow Tables

Section 3: Domain 1 - Security Governance

Lecture 12 Security Manager Roles

Lecture 13 Organisational Structure

Lecture 14 Why Information Security Governance

Lecture 15 Governance vs Management

Lecture 16 RACI Matrix

Lecture 17 Data Owner and Data Custodian

Lecture 18 Strategy, Goals and Business Alignment

Lecture 19 Data LifeCycle

Lecture 20 Data Retention and Disposal

Lecture 21 Legal regulations and Standards

Lecture 22 Maturity Assessment Models and PDCA

Lecture 23 Governance Frameworks

Lecture 24 IT Balanced Score Card

Lecture 25 Polices

Lecture 26 Example of Policies

Lecture 27 Standards

Lecture 28 Policies and Standards Review

Lecture 29 Procedures and Guidelines

Lecture 30 Security Investment - CAPEX and OPEX, ROI & ROSI

Lecture 31 Portfolio and Financial Management

Section 4: Domain 2 - Risk Management

Lecture 32 Risk Management Overview

Lecture 33 Types of Risk

Lecture 34 Risk Analysis Evaluation

Lecture 35 Risk Response

Lecture 36 Risk Monitoring

Lecture 37 Key Risk Indicators

Lecture 38 Risk Management Frameworks

Lecture 39 Security Controls

Lecture 40 Types of Security Controls

Lecture 41 Control Objective

Lecture 42 Control Objective

Lecture 43 Controls Assessment and Defence in Depth

Lecture 44 Understand the Security Layers in Corporate Networks

Lecture 45 Network Security using Segmentation

Lecture 46 Firewalls and IPS

Lecture 47 DMZ and Bastian Host

Lecture 48 Proxy, Load Balance and Email Security

Lecture 49 Network Access Control

Lecture 50 Endpoint Protection Platform

Section 5: Domain 3 - Security Program Development

Lecture 51 Business Case

Lecture 52 Enterprise Architecture

Lecture 53 Social Engineering

Lecture 54 Security Awareness

Lecture 55 Personnel Security Measures

Lecture 56 Software Development Methodologies

Lecture 57 Secure Coding and Software Development Best Practices

Lecture 58 DevOps

Lecture 59 DevSecOps

Lecture 60 Security Testing and Assessment

Lecture 61 Security Testing and Assessment - SAST, DAST, SCA

Lecture 62 Threat Model Overview

Lecture 63 Threat Model - STRIDE and DREAD

Lecture 64 AAA Overview

Lecture 65 MFA and Bio metric Authentication

Lecture 66 Cryptography Overview

Lecture 67 Symmetric Encryption

Lecture 68 Asymmetric Encryption

Lecture 69 Asymmetric Encryption Use Cases

Lecture 70 Digital Signature

Lecture 71 Hashing

Lecture 72 Public Key Infrastructure

Lecture 73 Outsourcing and Third Party Management

Lecture 74 Supply Chain Risk Management

Lecture 75 System Organization Controls - SOC Audit and Report

Lecture 76 Physical Security and Facility Design

Lecture 77 Physical Access Controls

Lecture 78 CCTV and Facility Monitoring

Lecture 79 Data and Perimeter Security

Lecture 80 Securing Power Sources

Lecture 81 Fire Suppression System

Section 6: Domain 4 - Incident Response and Manageent

Lecture 82 Incident Management Overview

Lecture 83 Forensic Investigation and Evidence Collection

Lecture 84 Problem Management

Lecture 85 Incident Response Testing and Evaluation

Lecture 86 Incident Response Training

Lecture 87 What is Disasters and What is BIA

Lecture 88 Disaster Recovery Plan

Lecture 89 Business Continuity Plan

Lecture 90 Developing BCP and DRP

Lecture 91 RPO and RTO

Lecture 92 AIW, SDO, MTO

Lecture 93 RTO, RPO, MTO relations

Lecture 94 Recovery Strategies

Lecture 95 Reciprocal Agreement

Lecture 96 Testing and Evaluating the BCP and DRP

Lecture 97 Data Backup

Lecture 98 Backup Types

Lecture 99 SOC

Lecture 100 SIEM

Lecture 101 EDR and NDR

Lecture 102 XDR and SOAR

Lecture 103 Vulnerability Assessment Software

Lecture 104 Threat Intelligence and MITRE Framework

Lecture 105 Help Desk and Ticketing System

Lecture 106 Change Management Overview

Lecture 107 Types of Changes

Lecture 108 Configuration Management

Lecture 109 Patch Management

Lecture 110 Release Management

Lecture 111 Virtualisation Concepts

Lecture 112 Cloud Computing Overview

Lecture 113 Containerisation Technology and Server-less Computing

Section 7: What is Next?

Lecture 114 Register and Appear for the CISM Exam

Information security professionals who are responsible for the development, implementation, and management of information security programs within their organizations.,IT professionals who are interested in pursuing a career in information security management.,Managers and executives who are responsible for overseeing information security programs and want to understand the principles and best practices of information security management.,Compliance and risk management professionals who want to learn how to effectively manage information security risks.,Auditors who want to understand the principles and best practices of information security management and how to assess the effectiveness of information security programs.