All in One Offer! | Access Unlimited Courses in any category starting at just $29. Signup today. Offer Ends in: 3 Days!

Browse Library

Get Unlimited Learning Access
$29
3 days left at this price!
30-Day Money-Back Guarantee

It Includes

  • Get Full Access to the platform
  • Access to 16000+ online courses
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Assignments & Projects
  • Online iLab Access
  • Certificate of Completion
  • Download for offline viewing
  • Free Instructor Support
  • Access valid for 1 user only
  • Cancel Anytime
$29
  • This training is a comprehensive reference guide designed to assist individuals in preparing for the ISACA CISM exam and individuals who wish to understand the roles and responsibilities of an information security manager. It is a current, comprehensive, p
  • CISM Domain 1—Information Security Governance Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
  • CISM Domain 2—Information Risk Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.
  • CISM Domain 3—Information Security Program Development and Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.
  • CISM Domain 4—Information Security Incident Management Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.

This training is a comprehensive reference guide designed to assist individuals in preparing for the ISACA CISM exam and individuals who wish to understand the roles and responsibilities of an information security manager. It is a current, comprehensive, peer-reviewed information security management global resource.

 

CISM Domain 1—Information Security Governance

Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives

 

CISM Domain 2—Information Risk Management

Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.

 

CISM Domain 3—Information Security Program Development and Management

Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.

 

CISM Domain 4—Information Security Incident Management

Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.

  • You should have a minimum 2 years of experience of Information Security. And if you are taking the exam you will need a minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas. The work experience must be gained within the 10-year period preceding the application date for certification or within 5 years from the date of originally passing the exam.
  • Those who are working in information security and want to become an Information Security Manager
View More...
  • Section 1 : Introduction 2 Lectures 00:08:55

    • Lecture 1 :
    • Lecture 2 :
    • Scope and Exam Info
  • Section 2 : Information Security Governance 19 Lectures 02:06:50

    • Lecture 1 :
    • Information Security Governance
    • Lecture 2 :
    • Information Security Governance Tasks
    • Lecture 3 :
    • Information Security Strategy
    • Lecture 4 :
    • Alignment to Organizational Goals
    • Lecture 5 :
    • Security Frameworks
    • Lecture 6 :
    • IS Roles and Responsibilities
    • Lecture 7 :
    • Integrated Governance
    • Lecture 8 :
    • Industry Standards
    • Lecture 9 :
    • Balanced Scorecard
    • Lecture 10 :
    • Structure
    • Lecture 11 :
    • Business Case
    • Lecture 12 :
    • Security Budget
    • Lecture 13 :
    • Security Influencers
    • Lecture 14 :
    • Governance, Risk and Compliance
    • Lecture 15 :
    • Obtain Management Commitment
    • Lecture 16 :
    • Organizational Structures
    • Lecture 17 :
    • Effective Communication
    • Lecture 18 :
    • Security Metrics
    • Lecture 19 :
    • Obtain Management Commitment 2
  • Section 3 : Risk Management and Compliance 22 Lectures 02:38:54

    • Lecture 1 :
    • Risk Management and Compliance
    • Lecture 2 :
    • Information Classification
    • Lecture 3 :
    • Responsibility Assignment
    • Lecture 4 :
    • Evaluate Risk Impact
    • Lecture 5 :
    • Asset Validation
    • Lecture 6 :
    • Legal Requirements
    • Lecture 7 :
    • Identifying Emerging Threats
    • Lecture 8 :
    • When It's Time to Reassess
    • Lecture 9 :
    • Threat Knowledge
    • Lecture 10 :
    • Risk Assessments and Analysis Methodologies
    • Lecture 11 :
    • Risk Assessment Methodology
    • Lecture 12 :
    • Risk Prioritization
    • Lecture 13 :
    • Risk Factors
    • Lecture 14 :
    • Risk Reporting
    • Lecture 15 :
    • Risk Monitoring
    • Lecture 16 :
    • Risk Treatment Strategies
    • Lecture 17 :
    • Risk Baselines
    • Lecture 18 :
    • Monitoring Security Controls
    • Lecture 19 :
    • Gap Analysis
    • Lecture 20 :
    • Risk Integration
    • Lecture 21 :
    • Compliance Reporting
    • Lecture 22 :
    • Cost Determines Treatment
  • Section 4 : Information Security Program Development Management 14 Lectures 01:38:25

    • Lecture 1 :
    • Information Security Program Development Management
    • Lecture 2 :
    • Alignment with the Business
    • Lecture 3 :
    • Acquire and Deploy Security Resources
    • Lecture 4 :
    • Keep it Running
    • Lecture 5 :
    • Controls and Counter Measures
    • Lecture 6 :
    • Security Architecture
    • Lecture 7 :
    • Standards and Procedures Development
    • Lecture 8 :
    • Security Controls
    • Lecture 9 :
    • Security Implementation
    • Lecture 10 :
    • Awareness and Trainining
    • Lecture 11 :
    • Process Integration
    • Lecture 12 :
    • Contracts and Third Party Security
    • Lecture 13 :
    • Security Metrics
    • Lecture 14 :
    • Effectiveness and Applicability Testing
  • Section 5 : Security Incident Management 17 Lectures 01:44:11

    • Lecture 1 :
    • Security Incident Management
    • Lecture 2 :
    • Incident Response Plan
    • Lecture 3 :
    • Incident Management Concepts and Practices
    • Lecture 4 :
    • Integration with DR and BCP
    • Lecture 5 :
    • Recovery Terms
    • Lecture 6 :
    • Incident Classification Methods
    • Lecture 7 :
    • Damage Containment
    • Lecture 8 :
    • Re-plan
    • Lecture 9 :
    • Roles and Responsibilities
    • Lecture 10 :
    • Incident Response Tools and Equipments
    • Lecture 11 :
    • Reliability of Evidence
    • Lecture 12 :
    • Validation of Evidence
    • Lecture 13 :
    • Incident Response Reporting and Procedures
    • Lecture 14 :
    • Root Cause Analysis
    • Lecture 15 :
    • Business Impact Analysis
    • Lecture 16 :
    • Detecting and Analyzing Security Events
    • Lecture 17 :
    • Incident Management System
  • Section 6 : Passing the Exam 1 Lectures 00:06:13

    • Lecture 1 :
    • Passing the Exam
  • How do i access the course after purchase?

    Once you purchase a course (Single course or Subscription), you will be able to access the courses instantly online by logging into your account. Use the user name & password that you created while signing up. Once logged in, you can go to the "My Courses" section to access your course.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certification after completing the course?

    Yes. Once you succesfully complete any course on Learnfly marketplace, you get a certiifcate of course completion emailed to you within 24 hours with your name & the Learnfly badge. You can definately brag about it & share it on your social media or with friends as one of your achievement. Click here to view the sample certificate Click Here
  • For how long can i access my course after the purchase?

    If you buy a single course, that course is accessible to you for a lifetime. If you go for a premium subcription, you can access all the courses on Learnfly marketplace till your subscription is Active.
  • Whats the difference between Single Course Purchase & Go Premium option?

    With Single Course Purchase, you only get an access of one single course. Whereas, with premium monhtly or annual subscription, you can access all the existing or new courses on learnfly marketplace. You can decide what option suits you the best and accordingly you can make your purchase.
  • Is there any free trial?

    Currently, we don't have any free trial but it may be available in near future.
  • What is the refund policy?

    We would hate you to leave us. However, if you are not satisfied, you can ask for a full refund within 30 days & we will be happy to assist you further.

Luciano Ferrari,

Luciano Ferrari is an information security leader and IoT hacking expert. Luciano holds multiple security certifications, including CISSP, CRISC, and PCIP, and has worked at Fortune 500 companies in both technical and leadership roles. He drives progress at his own company, LufSec, where he works on security-related issues and projects. Luciano has conducted hundreds of IT security audits and penetration tests, including audits and tests on IoT devices for cable companies. He has also leveraged his IT security expertise in manufacturing, semiconductor, financial, and educational institutions. With his background in electronics and microelectronics, his distinct specialization is definitely on hardware hacking. Luciano is passionate about sharing his knowledge with others and teaching. His other areas of expertise include IT infrastructure, networking, penetration testing, risk, vulnerability, and threat management. In private, he enjoys researching new technologies and participating at security conferences and in bug bounty programs.
View More...
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lecture 80
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lecture 17
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lecture 6
  • cissp-certification-introduction

    CISSP- Certification Introduction

    By : MUKESH SINGH

    Lecture 18
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lecture 40
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lecture 30
Signup & Continue Checkout
By signing up, you agree to our Terms of Use and Privacy Policy
Create New Password
Enter your email address and we'll send you a link to reset your password.