ISACA CISM Certified Information Security Manager
ISACA CISM Certified Information Security Manager, available at $44.99, has an average rating of 4.1, with 75 lectures, based on 312 reviews, and has 1422 subscribers.
You will learn about This training is a comprehensive reference guide designed to assist individuals in preparing for the ISACA CISM exam and individuals who wish to understand the roles and responsibilities of an information security manager. It is a current, comprehensive, peer-reviewed information security management global resource. CISM Domain 1—Information Security Governance Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives CISM Domain 2—Information Risk Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives. CISM Domain 3—Information Security Program Development and Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives. CISM Domain 4—Information Security Incident Management Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact. This course is ideal for individuals who are Those who are working in information security and want to become an Information Security Manager It is particularly useful for Those who are working in information security and want to become an Information Security Manager.
Enroll now: ISACA CISM Certified Information Security Manager
Summary
Title: ISACA CISM Certified Information Security Manager
Price: $44.99
Average Rating: 4.1
Number of Lectures: 75
Number of Published Lectures: 75
Number of Curriculum Items: 75
Number of Published Curriculum Objects: 75
Original Price: $19.99
Quality Status: approved
Status: Live
What You Will Learn
- This training is a comprehensive reference guide designed to assist individuals in preparing for the ISACA CISM exam and individuals who wish to understand the roles and responsibilities of an information security manager. It is a current, comprehensive, peer-reviewed information security management global resource. CISM Domain 1—Information Security Governance Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives CISM Domain 2—Information Risk Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives. CISM Domain 3—Information Security Program Development and Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives. CISM Domain 4—Information Security Incident Management Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.
Who Should Attend
- Those who are working in information security and want to become an Information Security Manager
Target Audiences
- Those who are working in information security and want to become an Information Security Manager
This training is a comprehensive reference guide designed to assist individuals in preparing for the ISACA CISM exam and individuals who wish to understand the roles and responsibilities of an information security manager. It is a current, comprehensive, peer-reviewed information security management global resource.
CISM Domain 1—Information Security Governance
Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
CISM Domain 2—Information Risk Management
Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.
CISM Domain 3—Information Security Program Development and Management
Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.
CISM Domain 4—Information Security Incident Management
Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Lecture 2: Scope and Exam Info
Chapter 2: Information Security Governance
Lecture 1: Information Security Governance
Lecture 2: Information Security Governance Tasks
Lecture 3: Information Security Strategy
Lecture 4: Alignment to Organizational Goals
Lecture 5: Security Frameworks
Lecture 6: IS Roles and Responsibilities
Lecture 7: Integrated Governance
Lecture 8: Industry Standards
Lecture 9: Balanced Scorecard
Lecture 10: Structure
Lecture 11: Business Case
Lecture 12: Security Budget
Lecture 13: Security Influencers
Lecture 14: Governance, Risk and Compliance
Lecture 15: Obtain Management Commitment
Lecture 16: Security Management Roles
Lecture 17: Organizational Structures
Lecture 18: Effective Communication
Lecture 19: Security Metrics
Chapter 3: Risk Management and Compliance
Lecture 1: Risk Management and Compliance
Lecture 2: Information Classification
Lecture 3: Responsibility Assignment
Lecture 4: Evaluate Risk Impact
Lecture 5: Asset Validation
Lecture 6: Legal Requirements
Lecture 7: Identifying Emerging Threats
Lecture 8: When It's Time to Reassess
Lecture 9: Threat Knowledge
Lecture 10: Risk Assessments and Analysis Methodologies
Lecture 11: Risk Assessment Methodology
Lecture 12: Risk Prioritization
Lecture 13: Risk Factors
Lecture 14: Risk Reporting
Lecture 15: Risk Monitoring
Lecture 16: Risk Treatment Strategies
Lecture 17: Risk Baselines
Lecture 18: Monitoring Security Controls
Lecture 19: Gap Analysis
Lecture 20: Risk Integration
Lecture 21: Compliance Reporting
Lecture 22: Cost Determines Treatment
Chapter 4: Information Security Program Development and Management
Lecture 1: Information Security Program Development Management
Lecture 2: Alignment with the Business
Lecture 3: Acquire and Deploy Security Resources
Lecture 4: Keep it Running
Lecture 5: Controls and Counter Measures
Lecture 6: Security Architecture
Lecture 7: Standards and Procedures Development
Lecture 8: Security Controls
Lecture 9: Security Implementation
Lecture 10: Awareness and Trainining
Lecture 11: Process Integration
Lecture 12: Contracts and Third Party Security
Lecture 13: Security Metrics
Lecture 14: Effectiveness and Applicability Testing
Chapter 5: Security Incident Management
Lecture 1: Security Incident Management
Lecture 2: Incident Response Plan
Lecture 3: Incident Management Concepts and Practices
Lecture 4: Integration with DR and BCP
Lecture 5: Recovery Terms
Lecture 6: Incident Classification Methods
Lecture 7: Damage Containment
Lecture 8: Re-plan
Lecture 9: Roles and Responsibilities
Lecture 10: Incident Response Tools and Equipments
Lecture 11: Reliability of Evidence
Lecture 12: Validation of Evidence
Lecture 13: Incident Response Reporting and Procedures
Lecture 14: Root Cause Analysis
Lecture 15: Business Impact Analysis
Lecture 16: Detecting and Analyzing Security Events
Lecture 17: Incident Management System
Chapter 6: Passing the Exam
Lecture 1: Passing the Exam
Instructors
-
Luciano Ferrari
Founder, LufSec IT Security Consulting
Rating Distribution
- 1 stars: 14 votes
- 2 stars: 20 votes
- 3 stars: 70 votes
- 4 stars: 127 votes
- 5 stars: 81 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Digital Marketing Foundation Course
- Google Shopping Ads Digital Marketing Course
- Multi Cloud Infrastructure for beginners
- Master Lead Generation: Grow Subscribers & Sales with Popups
- Complete Copywriting System : write to sell with ease
- Product Positioning Masterclass: Unlock Market Traction
- How to Promote Your Webinar and Get More Attendees?
- Digital Marketing Courses
- Create music with Artificial Intelligence in this new market
- Create CONVERTING UGC Content So Brands Will Pay You More
- Podcast: The top 8 ways to monetize by Podcasting
- TikTok Marketing Mastery: Learn to Grow & Go Viral
- Free Digital Marketing Basics Course in Hindi
- MailChimp Free Mailing Lists: MailChimp Email Marketing
- Automate Digital Marketing & Social Media with Generative AI
- Google Ads MasterClass – All Advanced Features
- Online Course Creator: Create & Sell Online Courses Today!
- Introduction to SEO – Basic Principles of SEO
- Affiliate Marketing For Beginners: Go From Novice To Pro
- Effective Website Planning Made Simple