This plan includes
- Limited free courses access
- Play & Pause Course Videos
- Video Recorded Lectures
- Learn on Mobile/PC/Tablet
- Quizzes and Real Projects
- Lifetime Course Certificate
- Email & Chat Support
What you'll learn?
- This training is a comprehensive reference guide designed to assist individuals in preparing for the ISACA CISM exam and individuals who wish to understand the roles and responsibilities of an information security manager. It is a current, comprehensive, p
- CISM Domain 1—Information Security Governance Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
- CISM Domain 2—Information Risk Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.
- CISM Domain 3—Information Security Program Development and Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.
- CISM Domain 4—Information Security Incident Management Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.
Course Overview
This training is a comprehensive reference guide designed to assist individuals in preparing for the ISACA CISM exam and individuals who wish to understand the roles and responsibilities of an information security manager. It is a current, comprehensive, peer-reviewed information security management global resource.
CISM Domain 1—Information Security Governance
Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
CISM Domain 2—Information Risk Management
Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.
CISM Domain 3—Information Security Program Development and Management
Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.
CISM Domain 4—Information Security Incident Management
Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.
Pre-requisites
- You should have a minimum 2 years of experience of Information Security. And if you are taking the exam you will need a minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas. The work experience must be gained within the 10-year period preceding the application date for certification or within 5 years from the date of originally passing the exam.
Target Audience
- Those who are working in information security and want to become an Information Security Manager
Curriculum 75 Lectures 08:23:28
-
Section 1 : Introduction
- Lecture 2 :
- Scope and Exam Info
-
Section 2 : Information Security Governance
- Lecture 1 :
- Information Security Governance
- Lecture 2 :
- Information Security Governance Tasks
- Lecture 3 :
- Information Security Strategy
- Lecture 4 :
- Alignment to Organizational Goals
- Lecture 5 :
- Security Frameworks
- Lecture 6 :
- IS Roles and Responsibilities
- Lecture 7 :
- Integrated Governance
- Lecture 8 :
- Industry Standards
- Lecture 9 :
- Balanced Scorecard
- Lecture 10 :
- Structure
- Lecture 11 :
- Business Case
- Lecture 12 :
- Security Budget
- Lecture 13 :
- Security Influencers
- Lecture 14 :
- Governance, Risk and Compliance
- Lecture 15 :
- Obtain Management Commitment
- Lecture 16 :
- Organizational Structures
- Lecture 17 :
- Effective Communication
- Lecture 18 :
- Security Metrics
- Lecture 19 :
- Obtain Management Commitment 2
-
Section 3 : Risk Management and Compliance
- Lecture 1 :
- Risk Management and Compliance
- Lecture 2 :
- Information Classification
- Lecture 3 :
- Responsibility Assignment
- Lecture 4 :
- Evaluate Risk Impact
- Lecture 5 :
- Asset Validation
- Lecture 6 :
- Legal Requirements
- Lecture 7 :
- Identifying Emerging Threats
- Lecture 8 :
- When It's Time to Reassess
- Lecture 9 :
- Threat Knowledge
- Lecture 10 :
- Risk Assessments and Analysis Methodologies
- Lecture 11 :
- Risk Assessment Methodology
- Lecture 12 :
- Risk Prioritization
- Lecture 13 :
- Risk Factors
- Lecture 14 :
- Risk Reporting
- Lecture 15 :
- Risk Monitoring
- Lecture 16 :
- Risk Treatment Strategies
- Lecture 17 :
- Risk Baselines
- Lecture 18 :
- Monitoring Security Controls
- Lecture 19 :
- Gap Analysis
- Lecture 20 :
- Risk Integration
- Lecture 21 :
- Compliance Reporting
- Lecture 22 :
- Cost Determines Treatment
-
Section 4 : Information Security Program Development Management
- Lecture 1 :
- Information Security Program Development Management
- Lecture 2 :
- Alignment with the Business
- Lecture 3 :
- Acquire and Deploy Security Resources
- Lecture 4 :
- Keep it Running
- Lecture 5 :
- Controls and Counter Measures
- Lecture 6 :
- Security Architecture
- Lecture 7 :
- Standards and Procedures Development
- Lecture 8 :
- Security Controls
- Lecture 9 :
- Security Implementation
- Lecture 10 :
- Awareness and Trainining
- Lecture 11 :
- Process Integration
- Lecture 12 :
- Contracts and Third Party Security
- Lecture 13 :
- Security Metrics
- Lecture 14 :
- Effectiveness and Applicability Testing
-
Section 5 : Security Incident Management
- Lecture 1 :
- Security Incident Management
- Lecture 2 :
- Incident Response Plan
- Lecture 3 :
- Incident Management Concepts and Practices
- Lecture 4 :
- Integration with DR and BCP
- Lecture 5 :
- Recovery Terms
- Lecture 6 :
- Incident Classification Methods
- Lecture 7 :
- Damage Containment
- Lecture 8 :
- Re-plan
- Lecture 9 :
- Roles and Responsibilities
- Lecture 10 :
- Incident Response Tools and Equipments
- Lecture 11 :
- Reliability of Evidence
- Lecture 12 :
- Validation of Evidence
- Lecture 13 :
- Incident Response Reporting and Procedures
- Lecture 14 :
- Root Cause Analysis
- Lecture 15 :
- Business Impact Analysis
- Lecture 16 :
- Detecting and Analyzing Security Events
- Lecture 17 :
- Incident Management System
-
Section 6 : Passing the Exam
- Lecture 1 :
- Passing the Exam
Our learners work at
Frequently Asked Questions
-
How do i access the course after purchase?
It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time. -
Are these video based online self-learning courses?
Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic. -
Can i play & pause the course as per my convenience?
Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on. -
How do i contact the instructor for any doubts or questions?
Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want. -
Do i need a pc to access the course or can i do it on mobile & tablet as well?
Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly. -
Do i get any certificate for the courses?
Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion. -
For how long can i access my course on the platform?
You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions. -
Is there any free trial?
Currently, we do not offer any free trial. -
Can i cancel anytime?
Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?
Instructor
81183 Course Views
1 Courses