The CISM certification from ISACA is a program developed for information security managers ,information security professionals and individual who are planning to move to information security management.
Our CISM program will combine the achievement of passing a comprehensive exam with recognition of work with the skills needed to work as Information Security managers and will allow you to clear the CISM exam from the first attempt and get certified with globally recognized certificate.
This course will cover the 4 information security domains with in-depth coverage of the information covering and will provide the students with a lot of real life scenarios and a library of templates with the full support from the instructor.
The introduction is going through the CISM certificate information, value and content. The CISM exam content.
During this lecture i explained a brief about each domain in the CISM Course.
CISM course structure and the relations between 4 different domain.
What background you should have before starting ISACA CISM course.
A very important terminologies to define before the CISM training
GRC- Governance, Risk, Compliance
In This lecture explained the role of Senior Management in GRC.
What is the Senior Management role in Risk ?
In this lecture i explained different types of Organization Structure
Before starting any security program implementation . the business goal and objective need to be identified,
What is Information Security Governance ?
What is CIA Triad, C Confidentiality, I Integrity and A Availability,
What is the Information Security content ?
A brief overview Security Program Objectives
In this Lecture I defined the risk.
How can we evaluate our Assets specially things like: Data, Information, Company Reputation
A Sample of information Asset register
How the classification scheme work
A Sample of the risk register
Whats is Business Impact Analysis ?
Ethics Issues in a Computing Environment
Different types f security controls
Different Security Control Categories
Evaluate Information Security Controls
Information Security Program Elements
In this lecture I explain an introduction to access control and what is AAA
First A: Authorization
Second A: Authentication
Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.
CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+
IBM, Cliveland Clink Abu Dhabi (CCAD), Orascom Telecommunication, UAE Ministry of Interior, Egyptian Ministry of Interior, Saudi Ministry of Interior, Prince Naif University for forensic science - KSA, Khalifa University - UAE, Cairo University - Egypt