About This Course
Who this course is for:
- IT consultants and managers
- IT auditors
- IT security policy makers
- Privacy officers
- Network administrators
- Network security engineers
- Candidates seeking CISM certification
What you’ll learn:
- The four domains that make up the body of knowledge for the Certified Information Security Manager exam
- The tools to build technical skills
- How to manage, design, oversee and assess an enterprise’s information security
Requirements:
- As with the CISM certification exam, the candidates are required to have a minimum of five years of experience in information security management
- Experience in the fields of information security governance, risk management, compliance, and incident management is also preferable
The Certified Information Security Manager certification program is developed specifically for experienced information security managers and those who have information security management responsibilities.
Certified Information Security Manager is globally recognized as the leading credential for information security managers. This course provides the student with the knowledge and proficiency to prepare for the globally recognized Certified Information Security Manager certification exam.
This course will immerse the student into the subject, with in-depth coverage of the information covering the four domains that make up the body of knowledge for the Certified Information Security Manager exam and will provide the student the tools to build their technical skills to manage, design, oversee and assess an enterprise’s information security.
The Certified Information Security Manager certification combines the achievement of passing a comprehensive exam with recognition of work, management and educational experience, providing you with greater credibility in the marketplace.
Our Promise to You
By the end of this course, you will have learned information security management and the responsibilities involved.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about information security management.
Course Curriculum
Section 1 - Introduction | |||
Information Security Governance Overview | 00:00:00 | ||
Effective Information Security Governance | 00:00:00 | ||
Information Security Concepts And Technologies | 00:00:00 | ||
Information Security Manager | 00:00:00 | ||
Scope And Charter Of Information Security Governance | 00:00:00 | ||
Information Security Governance Metrics | 00:00:00 | ||
Information Security Strategy Overview | 00:00:00 | ||
Creating Information Security Strategy | 00:00:00 | ||
Determining Current State Of Security | 00:00:00 | ||
Information Security Strategy Development | 00:00:00 | ||
Strategy Resources | 00:00:00 | ||
Strategy Constraints | 00:00:00 | ||
Action Plan To Implement Strategy | 00:00:00 | ||
Section 2 - Information Risk Management | |||
Risk Management Overview | 00:00:00 | ||
Good Information Security Risk Management | 00:00:00 | ||
Information Security Risk Management Concepts | 00:00:00 | ||
Implementing Risk Management | 00:00:00 | ||
Risk Assessment | 00:00:00 | ||
Controls Countermeasures | 00:00:00 | ||
Recovery Time Objectives | 00:00:00 | ||
Risk Monitoring And Communication | 00:00:00 | ||
Section 3 - Information Security Program Development | |||
Development Of Information Security Program | 00:00:00 | ||
Information Security Program Objectives | 00:00:00 | ||
Information Security Program Development Concepts | 00:00:00 | ||
Scope And Charter Of Information Security Program Development | 00:00:00 | ||
Information Security Management Framework | 00:00:00 | ||
Information Security Framework Components | 00:00:00 | ||
Information Security Program Resources | 00:00:00 | ||
Implementing An Information Security Program | 00:00:00 | ||
Information Infrastructure And Architecture | 00:00:00 | ||
Information Security Program | 00:00:00 | ||
Security Program Services And Operational Activities | 00:00:00 | ||
Section 4 - Information Security Incident Management | |||
Incident Management Overview | 00:00:00 | ||
Incident Response Procedures | 00:00:00 | ||
Incident Management Organization | 00:00:00 | ||
Incident Management Resources | 00:00:00 | ||
Incident Management Objectives | 00:00:00 | ||
Incident Management Metrics and Indicators | 00:00:00 | ||
Current State Of Incident Response Capability | 00:00:00 | ||
Developing An Incident Response Plan | 00:00:00 | ||
Business Continuity Planning/Disaster Recovery Planning | 00:00:00 | ||
Testing Response And Recovery Plans | 00:00:00 | ||
Executing The Plan | 00:00:00 | ||
Downloadable Materials – Certified Information Security Manager | 00:00:00 |