CISM Certified Information Security Manager
(CISM.AE2) / ISBN : 978-1-64459-516-9
About This Course
Skills You’ll Get
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
10+ Interactive Lessons | 520+ Exercises | 175+ Quizzes | 555+ Flashcards | 455+ Glossary of terms
Gamified TestPrep
125+ Pre Assessment Questions | 2+ Full Length Tests | 125+ Post Assessment Questions | 200+ Practice Test Questions
Hands-On Labs
20+ LiveLab | 20+ Video tutorials | 31+ Minutes
Video Lessons
36+ Videos | 14:07+ Hours
Introduction
- The CISM Exam
- CISM Exam Objectives
- CISM Certification Exam Objective Map
Today's Information Security Manager
- Information Security Objectives
- Role of the Information Security Manager
- Information Security Risks
- Building an Information Security Strategy
- Implementing Security Controls
- Data Protection
- Summary
- Exam Essentials
Information Security Governance and Compliance
- Governance
- Understanding Policy Documents
- Complying with Laws and Regulations
- Adopting Standard Frameworks
- Security Control Verification and Quality Control
- Summary
- Exam Essentials
Information Risk Management
- Analyzing Risk
- Risk Treatment and Response
- Risk Analysis
- Disaster Recovery Planning
- Privacy
- Summary
- Exam Essentials
Cybersecurity Threats
- Exploring Cybersecurity Threats
- Threat Data and Intelligence
- Summary
- Exam Essentials
Information Security Program Development and Management
- Information Security Programs
- Security Awareness and Training
- Managing the Information Security Team
- Managing the Security Budget
- Integrating Security with Other Business Functions
- Summary
- Exam Essentials
Security Assessment and Testing
- Vulnerability Management
- Security Vulnerabilities
- Penetration Testing
- Training and Exercises
- Summary
- Exam Essentials
Cybersecurity Technology
- Endpoint Security
- Network Security
- Cloud Computing Security
- Cryptography
- Code Security
- Identity and Access Management
- Summary
- Exam Essentials
Incident Response
- Security Incidents
- Phases of Incident Response
- Building the Incident Response Plan
- Creating an Incident Response Team
- Coordination and Information Sharing
- Classifying Incidents
- Conducting Investigations
- Plan Training, Testing, and Evaluation
- Summary
- Exam Essentials
Business Continuity and Disaster Recovery
- Planning for Business Continuity
- Project Scope and Planning
- Business Impact Analysis
- Continuity Planning
- Plan Approval and Implementation
- The Nature of Disaster
- System Resilience, High Availability, and Fault Tolerance
- Recovery Strategy
- Recovery Plan Development
- Training, Awareness, and Documentation
- Testing and Maintenance
- Summary
- Exam Essentials
Security Assessment and Testing
- Using Nikto
- Consulting a Vulnerability Database
- Configuring a Nessus Scan
- Performing Passive Reconnaissance
- Performing Active Reconnaissance
Cybersecurity Technology
- Simulating the DDoS Attack
- Enabling Intrusion Detection and Prevention
- Creating a VPN Connection
- Implementing Port Security
- Creating a Virtual LAN
- Creating a Demilitarized Zone
- Using Windows Firewall
- Observing an SHA-Generated Hash Value
- Observing an MD5-Generated Hash Value
- Examining Asymmetric Encryption
- Performing Symmetric Encryption
Incident Response
- Completing the Chain of Custody
Business Continuity and Disaster Recovery
- Configuring RAID
- Taking an Incremental Backup
- Taking a Full Backup
Any questions?Check out the FAQs
Still have unanswered questions and need to get in touch?
Contact Us Now