CISM - Certified Information Security Manager from ISACA
4.4 (163 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,333 students enrolled
Wishlisted Wishlist

Please confirm that you want to add CISM - Certified Information Security Manager from ISACA to your Wishlist.

Add to Wishlist

CISM - Certified Information Security Manager from ISACA

Get ISACA CISM - Certified Information Security Manager easily
Bestselling
4.4 (163 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,333 students enrolled
Created by Mohamed Atef
Last updated 2/2017
English
Current price: $10 Original price: $100 Discount: 90% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 6.5 hours on-demand video
  • 11 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Clear CISM Exam from the first attempt and get certified
  • Understand Information Security fundamentals
  • Understand Information Security Domains
  • Information Security Governance
  • Information Risk Management and Compliance
  • Information Security Program Development and Management
  • Information Security Incident Management
View Curriculum
Requirements
  • Students need to have 2 years of experience in Information Security
Description

The CISM certification from ISACA is a program developed for information security managers ,information security professionals and individual who are planning to move to information security management.

Our CISM program will combine the achievement of passing a comprehensive exam with recognition of work  with the skills needed to work as Information Security managers and will allow you to clear the CISM exam from the first attempt and get certified with globally recognized certificate. 

 This course will cover the 4 information security domains with in-depth coverage of the information covering and will provide the students with a lot of real life scenarios and a library of templates with the full support from the instructor.

Who is the target audience?
  • You
  • Cyber Security Professional
  • Information Security Specialist
  • Security Managers
  • Student who want to start learning about security
Students Who Viewed This Course Also Viewed
Curriculum For This Course
52 Lectures
06:40:13
+
Introduction
3 Lectures 23:24

The introduction is going through the CISM certificate information, value and content. The CISM exam content. 

Preview 09:39

During this lecture i explained a brief about each domain in the CISM Course.

Preview 08:01

CISM course structure and the relations between 4 different domain.

Course Structure
05:44
+
Background
5 Lectures 34:39

What background you should have before starting ISACA CISM course. 

Background Needed
04:40

A very important terminologies to define before the CISM training 

GRC- Governance, Risk, Compliance

GRC- Governance, Risk, Compliance
10:35

In This lecture explained the role of Senior Management in GRC. 

Senior Management and GRC
07:23

What is the Senior Management role in Risk ?

Senior Management and Risk
06:38

In this lecture i explained different types of Organization Structure

Organization Structure
05:23
+
Domain 1 : Information Security Governance
11 Lectures 53:16
Introduction to Security Concepts
13:33

Before starting any security program implementation . the business goal and objective need to be identified, 

Business Goals and Objective
04:53

What is Information Security Governance ?

Information Security Governance
04:09

What is CIA Triad, C Confidentiality, I Integrity and A Availability, 

CIA Triad
05:40

What is the Information Security content ? 

Information Security components
04:00

A brief overview Security Program Objectives

Security Program Objectives
05:48

Information Security Governance Output.
Information Security Governance Output.
02:48

INFORMATION SECURITY GOVERNANCE
3 questions

Define roles and responsibilities
03:49

GRC
01:18

Governance of Third- Party
01:28

Establish, monitor, evaluate and report metrics
05:50

INFORMATION SECURITY GOVERNANCE
3 questions
+
Domain 2 : Information Risk Management and Compliance
11 Lectures 01:16:40

In this Lecture I defined the risk. 

What is a Risk ?
11:59

How can we evaluate our Assets specially things like: Data, Information, Company Reputation

Asset Evaluation
18:28

A Sample of information Asset register 

Information Asset Register
07:58

How the classification scheme work

Classification Schemes
04:34

INFORMATION RISK REGISTER
3 questions

A Sample of the risk register

Risk Register
03:20

Alignment of Risk Assessment and BIA
Alignment of Risk Assessment and BIA
04:03

Whats is Business Impact Analysis ? 

Business Impact Analysis - BIA
10:09

Ethics Issues in a Computing Environment

Ethics Issues in a Computing Environment
05:29

Different types f security controls 

Control Types
02:56

Different Security Control Categories

Control Categories
03:51

Evaluate Information Security Controls 

Evaluate information security controls
03:53

Risk Register
3 questions
+
Domain 3 : Information Security Program Development and Management
12 Lectures 02:16:42
Establish and maintain the information security program
Establish and maintain the information security program
05:18

Information Security Program Elements

Information Security Program Elements
03:03

In this lecture I explain an introduction to access control and what is AAA 

Access Control
06:45

First A: Authorization 

Authorization
19:19

Second A: Authentication

Authentication
18:46

INFORMATION SECURITY PROGRAM DEVELOPMENT
3 questions

Intrusion Detection Systems
06:53

Network Architecture Components
17:04

Firewall
10:38

Cryptography
16:26

Symmetric Encryption
12:38

Asymmetric Encryption
13:47

Hashing
06:05

INFORMATION SECURITY PROGRAM DEVELOPMENT 2
3 questions
+
Domain 4 : Information Security Incident Management
9 Lectures 01:10:24
Information Security Incident Managment
10:06

Incident Response Team
06:50

Incident Response Report
04:11

BCP and DRP
01:24

Business Continuity Plans
14:32

INFORMATION SECURITY PROGRAM MANAGEMENT 1
3 questions

Business Impact Analysis
10:09

MTD/RTO/RPO
11:39

Disaster Recovery Plans
03:29

Alternate Sites
08:04

INFORMATION SECURITY PROGRAM MANAGEMENT 2
3 questions
+
Get Ready for the Exam
1 Lecture 05:08
Get Ready for the Exam
05:08
About the Instructor
Mohamed Atef
4.3 Average rating
2,197 Reviews
16,545 Students
12 Courses
Information Security Consultant, Certified Instructor

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.

CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+

Professional Experience:
IBM, Cliveland Clink Abu Dhabi (CCAD), Orascom Telecommunication, UAE Ministry of Interior, Egyptian Ministry of Interior, Saudi Ministry of Interior, Prince Naif University for forensic science - KSA, Khalifa University - UAE, Cairo University - Egypt