ISACA CISM Certified Information Security Manager
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
14 students enrolled
Wishlisted Wishlist

Please confirm that you want to add ISACA CISM Certified Information Security Manager to your Wishlist.

Add to Wishlist

ISACA CISM Certified Information Security Manager

One of the highest paid certifications! Become a Certified Information Security Manager!
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
14 students enrolled
Created by Luciano Ferrari
Last updated 8/2017
English
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
Includes:
  • 8.5 hours on-demand video
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • This training is a comprehensive reference guide designed to assist individuals in preparing for the ISACA CISM exam and individuals who wish to understand the roles and responsibilities of an information security manager. It is a current, comprehensive, peer-reviewed information security management global resource. CISM Domain 1—Information Security Governance Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives CISM Domain 2—Information Risk Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives. CISM Domain 3—Information Security Program Development and Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives. CISM Domain 4—Information Security Incident Management Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.
View Curriculum
Requirements
  • You should have a minimum 2 years of experience of Information Security. And if you are taking the exam you will need a minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas. The work experience must be gained within the 10-year period preceding the application date for certification or within 5 years from the date of originally passing the exam.
Description

This training is a comprehensive reference guide designed to assist individuals in preparing for the ISACA CISM exam and individuals who wish to understand the roles and responsibilities of an information security manager. It is a current, comprehensive, peer-reviewed information security management global resource. 

CISM Domain 1—Information Security Governance
Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives

CISM Domain 2—Information Risk Management
Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.

CISM Domain 3—Information Security Program Development and Management
Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives.

CISM Domain 4—Information Security Incident Management
Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact. 

Who is the target audience?
  • Those who are working in information security and want to become an Information Security Manager
Students Who Viewed This Course Also Viewed
Curriculum For This Course
75 Lectures
08:23:31
+
Introduction
2 Lectures 08:55
+
Information Security Governance
19 Lectures 02:06:50

Information Security Governance Tasks
09:12

Information Security Strategy
08:31

Alignment to Organizational Goals
11:23

Security Frameworks
04:24

IS Roles and Responsibilities
05:41

Integrated Governance
03:47

Industry Standards
09:27

Balanced Scorecard
02:59

Structure
09:07

Business Case
05:55

Security Budget
06:28

Security Influencers
06:24

Governance, Risk and Compliance
05:37

Obtain Management Commitment
05:36

Security Management Roles
07:48

Organizational Structures
08:24

Effective Communication
05:28

Security Metrics
07:12
+
Risk Management and Compliance
22 Lectures 02:38:54
Risk Management and Compliance
08:10

Information Classification
08:40

Responsibility Assignment
03:14

Evaluate Risk Impact
07:45

Asset Validation
08:18

Legal Requirements
08:01

Identifying Emerging Threats
07:26

When It's Time to Reassess
05:19

Threat Knowledge
10:00

Risk Assessments and Analysis Methodologies
07:06

Risk Assessment Methodology
07:15

Risk Prioritization
08:49

Risk Factors
04:53

Risk Reporting
06:48

Risk Monitoring
05:40

Risk Treatment Strategies
06:12

Risk Baselines
08:38

Monitoring Security Controls
04:23

Gap Analysis
08:45

Risk Integration
07:15

Compliance Reporting
10:32

Cost Determines Treatment
05:45
+
Information Security Program Development and Management
14 Lectures 01:38:26
Information Security Program Development Management
07:13

Alignment with the Business
05:56

Acquire and Deploy Security Resources
06:10

Keep it Running
08:18

Controls and Counter Measures
07:47

Security Architecture
06:41

Standards and Procedures Development
06:35

Security Controls
04:46

Security Implementation
08:23

Awareness and Trainining
06:06

Process Integration
06:03

Contracts and Third Party Security
06:51

Security Metrics
11:05

Effectiveness and Applicability Testing
06:32
+
Security Incident Management
17 Lectures 01:44:13
Security Incident Management
10:29

Incident Response Plan
06:03

Incident Management Concepts and Practices
03:47

Integration with DR and BCP
06:53

Recovery Terms
02:53

Incident Classification Methods
05:41

Damage Containment
05:31

Re-plan
06:56

Roles and Responsibilities
06:04

Incident Response Tools and Equipments
09:20

Reliability of Evidence
04:01

Validation of Evidence
04:52

Incident Response Reporting and Procedures
05:35

Root Cause Analysis
05:36

Business Impact Analysis
06:50

Detecting and Analyzing Security Events
06:01

Incident Management System
07:41
+
Passing the Exam
1 Lecture 06:13
Passing the Exam
06:13
About the Instructor
Luciano Ferrari
3.8 Average rating
40 Reviews
194 Students
2 Courses
Founder, LufSec IT Security Consulting

Founder, LufSec IT Security Consulting, Entrepreneur, CISSP, PCIP, CRISC, CISM, CEH, MBA, Microelectronics and Computer Network college degree, +20 years experience in IT and Information Security, Risk Management, Vulnerability Management, Penetration Testing, Security Policies, Ethical Hacking, Raspberry Pi, RTL-SDR (Software Defined Radio) and more recently automotive security, car hacking and self-driving cars.