ISACA CISM Certified Information Security Manager

Become a Certified Information Security Manager! Complete Session

Instructed by Luciano Ferrari

  • Includes all Standard Features
  • Get Unlimited access to all the courses
  • No Contract. Cancel Anytime
Starting in just $19 / mo see all plans
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
  • This training is a comprehensive reference guide designed to assist individuals in preparing for the ISACA CISM exam and individuals who wish to understand the roles and responsibilities of an information security manager. It is a current, comprehensive, p
  • CISM Domain 1—Information Security Governance Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
  • CISM Domain 2—Information Risk Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.
  • CISM Domain 3—Information Security Program Development and Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.
  • CISM Domain 4—Information Security Incident Management Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.

This training is a comprehensive reference guide designed to assist individuals in preparing for the ISACA CISM exam and individuals who wish to understand the roles and responsibilities of an information security manager. It is a current, comprehensive, peer-reviewed information security management global resource.

 

CISM Domain 1—Information Security Governance

Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives

 

CISM Domain 2—Information Risk Management

Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.

 

CISM Domain 3—Information Security Program Development and Management

Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.

 

CISM Domain 4—Information Security Incident Management

Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.

  • You should have a minimum 2 years of experience of Information Security. And if you are taking the exam you will need a minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas. The work experience must be gained within the 10-year period preceding the application date for certification or within 5 years from the date of originally passing the exam.
  • Those who are working in information security and want to become an Information Security Manager
View More...

Section 1 : Introduction

  • Lecture 1 :
  • Lecture 2 :
  • Scope and Exam Info

Section 2 : Information Security Governance

  • Lecture 1 :
  • Information Security Governance
  • Lecture 2 :
  • Information Security Governance Tasks
  • Lecture 3 :
  • Information Security Strategy
  • Lecture 4 :
  • Alignment to Organizational Goals
  • Lecture 5 :
  • Security Frameworks
  • Lecture 6 :
  • IS Roles and Responsibilities
  • Lecture 7 :
  • Integrated Governance
  • Lecture 8 :
  • Industry Standards
  • Lecture 9 :
  • Balanced Scorecard
  • Lecture 10 :
  • Structure
  • Lecture 11 :
  • Business Case
  • Lecture 12 :
  • Security Budget
  • Lecture 13 :
  • Security Influencers
  • Lecture 14 :
  • Governance, Risk and Compliance
  • Lecture 15 :
  • Obtain Management Commitment
  • Lecture 16 :
  • Organizational Structures
  • Lecture 17 :
  • Effective Communication
  • Lecture 18 :
  • Security Metrics
  • Lecture 19 :
  • Obtain Management Commitment 2

Section 3 : Risk Management and Compliance

  • Lecture 1 :
  • Risk Management and Compliance
  • Lecture 2 :
  • Information Classification
  • Lecture 3 :
  • Responsibility Assignment
  • Lecture 4 :
  • Evaluate Risk Impact
  • Lecture 5 :
  • Asset Validation
  • Lecture 6 :
  • Legal Requirements
  • Lecture 7 :
  • Identifying Emerging Threats
  • Lecture 8 :
  • When It's Time to Reassess
  • Lecture 9 :
  • Threat Knowledge
  • Lecture 10 :
  • Risk Assessments and Analysis Methodologies
  • Lecture 11 :
  • Risk Assessment Methodology
  • Lecture 12 :
  • Risk Prioritization
  • Lecture 13 :
  • Risk Factors
  • Lecture 14 :
  • Risk Reporting
  • Lecture 15 :
  • Risk Monitoring
  • Lecture 16 :
  • Risk Treatment Strategies
  • Lecture 17 :
  • Risk Baselines
  • Lecture 18 :
  • Monitoring Security Controls
  • Lecture 19 :
  • Gap Analysis
  • Lecture 20 :
  • Risk Integration
  • Lecture 21 :
  • Compliance Reporting
  • Lecture 22 :
  • Cost Determines Treatment

Section 4 : Information Security Program Development Management

  • Lecture 1 :
  • Information Security Program Development Management
  • Lecture 2 :
  • Alignment with the Business
  • Lecture 3 :
  • Acquire and Deploy Security Resources
  • Lecture 4 :
  • Keep it Running
  • Lecture 5 :
  • Controls and Counter Measures
  • Lecture 6 :
  • Security Architecture
  • Lecture 7 :
  • Standards and Procedures Development
  • Lecture 8 :
  • Security Controls
  • Lecture 9 :
  • Security Implementation
  • Lecture 10 :
  • Awareness and Trainining
  • Lecture 11 :
  • Process Integration
  • Lecture 12 :
  • Contracts and Third Party Security
  • Lecture 13 :
  • Security Metrics
  • Lecture 14 :
  • Effectiveness and Applicability Testing

Section 5 : Security Incident Management

  • Lecture 1 :
  • Security Incident Management
  • Lecture 2 :
  • Incident Response Plan
  • Lecture 3 :
  • Incident Management Concepts and Practices
  • Lecture 4 :
  • Integration with DR and BCP
  • Lecture 5 :
  • Recovery Terms
  • Lecture 6 :
  • Incident Classification Methods
  • Lecture 7 :
  • Damage Containment
  • Lecture 8 :
  • Re-plan
  • Lecture 9 :
  • Roles and Responsibilities
  • Lecture 10 :
  • Incident Response Tools and Equipments
  • Lecture 11 :
  • Reliability of Evidence
  • Lecture 12 :
  • Validation of Evidence
  • Lecture 13 :
  • Incident Response Reporting and Procedures
  • Lecture 14 :
  • Root Cause Analysis
  • Lecture 15 :
  • Business Impact Analysis
  • Lecture 16 :
  • Detecting and Analyzing Security Events
  • Lecture 17 :
  • Incident Management System

Section 6 : Passing the Exam

  • Lecture 1 :
  • Passing the Exam

Luciano Ferrari,

Luciano Ferrari is an information security leader and IoT hacking expert. Luciano holds multiple security certifications, including CISSP, CRISC, and PCIP, and has worked at Fortune 500 companies in both technical and leadership roles. He drives progress at his own company, LufSec, where he works on security-related issues and projects. Luciano has conducted hundreds of IT security audits and penetration tests, including audits and tests on IoT devices for cable companies. He has also leveraged his IT security expertise in manufacturing, semiconductor, financial, and educational institutions. With his background in electronics and microelectronics, his distinct specialization is definitely on hardware hacking. Luciano is passionate about sharing his knowledge with others and teaching. His other areas of expertise include IT infrastructure, networking, penetration testing, risk, vulnerability, and threat management. In private, he enjoys researching new technologies and participating at security conferences and in bug bounty programs.
View More...
learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

the-complete-ethical-hacking-certification-course

The Complete Ethical Hacking Certif...

By : Mohamed Atef

Lecture 151

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

cissp-certification-introduction

CISSP- Certification Introduction

By : MUKESH SINGH

Lecture 18

practical-blockchain-smart-contracts-ethereum-solidity

Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40

Buy

$19

Sign up and start learning
By signing up, you agree to our Terms of Use and Privacy Policy
Forget Password