Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Cism - Certified Information Security Manager Full Training

    Posted By: ELK1nG
    Cism - Certified Information Security Manager Full Training

    Cism - Certified Information Security Manager Full Training
    Last updated 8/2023
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 4.60 GB | Duration: 14h 46m

    Prepare for ISACA CISM Exam

    What you'll learn

    Understand the key concepts and principles of information security management

    Develop and implement an effective information security program

    Understand the importance of risk management and how to manage risks effectively

    Identify and respond to information security incidents

    Prepare for and pass the CISM certification exam

    Requirements

    There are no formal prerequisites for taking the CISM training course. However, it is recommended that you have some experience in information security management or a related field.

    Description

    Welcome to the landing page for the CISM training course! In this comprehensive course, you will learn everything you need to know to become a certified Information Security Manager (CISM).Course Overview:The CISM training course is designed to provide you with a detailed understanding of information security management, risk management, and incident management. The course is divided into four domains, each of which is covered in-depth:Information Security GovernanceRisk ManagementInformation Security Program Development and ManagementInformation Security Incident ManagementThe course is designed to help you develop the necessary skills to become a successful information security manager by providing you with practical knowledge and hands-on experience.Course Objectives:Upon completion of the course, you will be able to:Understand the key concepts and principles of information security managementDevelop and implement an effective information security programUnderstand the importance of risk management and how to manage risks effectivelyIdentify and respond to information security incidentsPrepare for and pass the CISM certification examCourse Requirements:There are no formal prerequisites for taking the CISM training course. However, it is recommended that you have some experience in information security management or a related field.Certification:Upon completion of the course, you will be eligible to sit for the CISM certification exam. The exam is administered by ISACA and consists of 150 multiple-choice questions. To pass the exam, you must achieve a score of at least 450 out of 800.Enroll in the CISM training course today and take the first step towards becoming a certified information security manager!

    Overview

    Section 1: Course Introduction

    Lecture 1 Meet the Instructor

    Lecture 2 Have a Question? Here how to get in touch

    Lecture 3 Rating is Caring

    Lecture 4 Getting the Course Completion Certificate

    Section 2: Security Foundations for Security Managers

    Lecture 5 CIA Triad and the Security Objectives

    Lecture 6 Privacy and Security

    Lecture 7 Cyber Kill Chain

    Lecture 8 Cyber Attacks

    Lecture 9 MiTM

    Lecture 10 Malware and Cyber Threats

    Lecture 11 Password Attacks and Rainbow Tables

    Section 3: Domain 1 - Security Governance

    Lecture 12 Security Manager Roles

    Lecture 13 Organisational Structure

    Lecture 14 Why Information Security Governance

    Lecture 15 Governance vs Management

    Lecture 16 RACI Matrix

    Lecture 17 Data Owner and Data Custodian

    Lecture 18 Strategy, Goals and Business Alignment

    Lecture 19 Data LifeCycle

    Lecture 20 Data Retention and Disposal

    Lecture 21 Legal regulations and Standards

    Lecture 22 Maturity Assessment Models and PDCA

    Lecture 23 Governance Frameworks

    Lecture 24 IT Balanced Score Card

    Lecture 25 Polices

    Lecture 26 Example of Policies

    Lecture 27 Standards

    Lecture 28 Policies and Standards Review

    Lecture 29 Procedures and Guidelines

    Lecture 30 Security Investment - CAPEX and OPEX, ROI & ROSI

    Lecture 31 Portfolio and Financial Management

    Section 4: Domain 2 - Risk Management

    Lecture 32 Risk Management Overview

    Lecture 33 Types of Risk

    Lecture 34 Risk Analysis Evaluation

    Lecture 35 Risk Response

    Lecture 36 Risk Monitoring

    Lecture 37 Key Risk Indicators

    Lecture 38 Risk Management Frameworks

    Lecture 39 Security Controls

    Lecture 40 Types of Security Controls

    Lecture 41 Control Objective

    Lecture 42 Control Objective

    Lecture 43 Controls Assessment and Defence in Depth

    Lecture 44 Understand the Security Layers in Corporate Networks

    Lecture 45 Network Security using Segmentation

    Lecture 46 Firewalls and IPS

    Lecture 47 DMZ and Bastian Host

    Lecture 48 Proxy, Load Balance and Email Security

    Lecture 49 Network Access Control

    Lecture 50 Endpoint Protection Platform

    Section 5: Domain 3 - Security Program Development

    Lecture 51 Business Case

    Lecture 52 Enterprise Architecture

    Lecture 53 Social Engineering

    Lecture 54 Security Awareness

    Lecture 55 Personnel Security Measures

    Lecture 56 Software Development Methodologies

    Lecture 57 Secure Coding and Software Development Best Practices

    Lecture 58 DevOps

    Lecture 59 DevSecOps

    Lecture 60 Security Testing and Assessment

    Lecture 61 Security Testing and Assessment - SAST, DAST, SCA

    Lecture 62 Threat Model Overview

    Lecture 63 Threat Model - STRIDE and DREAD

    Lecture 64 AAA Overview

    Lecture 65 MFA and Bio metric Authentication

    Lecture 66 Cryptography Overview

    Lecture 67 Symmetric Encryption

    Lecture 68 Asymmetric Encryption

    Lecture 69 Asymmetric Encryption Use Cases

    Lecture 70 Digital Signature

    Lecture 71 Hashing

    Lecture 72 Public Key Infrastructure

    Lecture 73 Outsourcing and Third Party Management

    Lecture 74 Supply Chain Risk Management

    Lecture 75 System Organization Controls - SOC Audit and Report

    Lecture 76 Physical Security and Facility Design

    Lecture 77 Physical Access Controls

    Lecture 78 CCTV and Facility Monitoring

    Lecture 79 Data and Perimeter Security

    Lecture 80 Securing Power Sources

    Lecture 81 Fire Suppression System

    Section 6: Domain 4 - Incident Response and Manageent

    Lecture 82 Incident Management Overview

    Lecture 83 Forensic Investigation and Evidence Collection

    Lecture 84 Problem Management

    Lecture 85 Incident Response Testing and Evaluation

    Lecture 86 Incident Response Training

    Lecture 87 What is Disasters and What is BIA

    Lecture 88 Disaster Recovery Plan

    Lecture 89 Business Continuity Plan

    Lecture 90 Developing BCP and DRP

    Lecture 91 RPO and RTO

    Lecture 92 AIW, SDO, MTO

    Lecture 93 RTO, RPO, MTO relations

    Lecture 94 Recovery Strategies

    Lecture 95 Reciprocal Agreement

    Lecture 96 Testing and Evaluating the BCP and DRP

    Lecture 97 Data Backup

    Lecture 98 Backup Types

    Lecture 99 SOC

    Lecture 100 SIEM

    Lecture 101 EDR and NDR

    Lecture 102 XDR and SOAR

    Lecture 103 Vulnerability Assessment Software

    Lecture 104 Threat Intelligence and MITRE Framework

    Lecture 105 Help Desk and Ticketing System

    Lecture 106 Change Management Overview

    Lecture 107 Types of Changes

    Lecture 108 Configuration Management

    Lecture 109 Patch Management

    Lecture 110 Release Management

    Lecture 111 Virtualisation Concepts

    Lecture 112 Cloud Computing Overview

    Lecture 113 Containerisation Technology and Server-less Computing

    Section 7: What is Next?

    Lecture 114 Register and Appear for the CISM Exam

    Information security professionals who are responsible for the development, implementation, and management of information security programs within their organizations.,IT professionals who are interested in pursuing a career in information security management.,Managers and executives who are responsible for overseeing information security programs and want to understand the principles and best practices of information security management.,Compliance and risk management professionals who want to learn how to effectively manage information security risks.,Auditors who want to understand the principles and best practices of information security management and how to assess the effectiveness of information security programs.