About This Course
The Certified Information Security Manager certification program is developed specifically for experienced information security managers and those who have information security management responsibilities.
Certified Information Security Manager is globally recognized as the leading credential for information security managers. Our Certified Information Security Manager Certified Information Security Manager course provides the student with the knowledge and proficiency to prepare for the globally recognized Certified Information Security Manager certification exam.
The Certified Information Security Manager certification combines the achievement of passing a comprehensive exam with recognition of work, management and educational experience, providing you with greater credibility in the marketplace.
This course will immerse the student into the subject, with in-depth coverage of the information covering the four domains that make up the body of knowledge for the Certified Information Security Manager exam and will provide the student the tools to build their technical skills to manage, design, oversee and assess an enterprise’s information security.
Our Promise to You
By the end of this course, you will have learned information security management and the responsibilities involved.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about the information security management certification preparedness.
|Section 1 - Introduction|
|Information Security Governance Overview||00:00:00|
|Effective Information Security Governance||00:00:00|
|Information Security Concepts And Technologies||00:00:00|
|Information Security Manager||00:00:00|
|Scope And Charter Of Information Security Governance||00:00:00|
|Information Security Governance Metrics||00:00:00|
|Information Security Strategy Overview||00:00:00|
|Creating Information Security Strategy||00:00:00|
|Determining Current State Of Security||00:00:00|
|Information Security Strategy Development||00:00:00|
|Action Plan To Implement Strategy||00:00:00|
|Section 2 - Information Risk Management|
|Risk Management Overview||00:00:00|
|Good Information Security Risk Management||00:00:00|
|Information Security Risk Management Concepts||00:00:00|
|Implementing Risk Management||00:00:00|
|Recovery Time Objectives||00:00:00|
|Risk Monitoring And Communication||00:00:00|
|Section 3 - Information Security Program Development|
|Development Of Information Security Program||00:00:00|
|Information Security Program Objectives||00:00:00|
|Information Security Program Development Concepts||00:00:00|
|Scope And Charter Of Information Security Program Development||00:00:00|
|Information Security Management Framework||00:00:00|
|Information Security Framework Components||00:00:00|
|Information Security Program Resources||00:00:00|
|Implementing An Information Security Program||00:00:00|
|Information Infrastructure And Architecture||00:00:00|
|Information Security Program||00:00:00|
|Security Program Services And Operational Activities||00:00:00|
|Section 4 - Information Security Incident Management|
|Incident Management Overview||00:00:00|
|Incident Response Procedures||00:00:00|
|Incident Management Organization||00:00:00|
|Incident Management Resources||00:00:00|
|Incident Management Objectives||00:00:00|
|Incident Management Metrics and Indicators||00:00:00|
|Current State Of Incident Response Capability||00:00:00|
|Developing An Incident Response Plan||00:00:00|
|Business Continuity Planning/Disaster Recovery Planning||00:00:00|
|Testing Response And Recovery Plans||00:00:00|
|Executing The Plan||00:00:00|
|Downloadable Materials – Certified Information Security Manager||00:00:00|