
Certified Information Security Manager | CISM
What you’ll learn
- Learn the essential starting points and methods to embark on the path towards obtaining CISM certification.
- Acquire the skills needed to create, oversee, and execute robust information security programs within an organization.
- Gain proficiency in identifying, evaluating, and mitigating risks, while ensuring adherence to information security policies and regulatory standards.
- Learn effective strategies for managing and responding to incidents related to information security, ensuring swift and efficient resolution.
Course Description:
This training serves as a comprehensive reference guide aimed at individuals preparing for the ISACA CISM exam and those interested in understanding the responsibilities of an information security manager. It is a current and globally recognized resource in information security management, reviewed by peers.
Domain 1—Information Security Governance: Establish and maintain an information security governance framework and processes to ensure alignment of the information security strategy with organizational goals and objectives.
Domain 2—Information Risk Management: Manage information risk to an acceptable level based on organizational risk appetite to support achievement of organizational goals and objectives.
Domain 3—Information Security Program Development and Management: Develop and manage information security programs that align with organizational objectives and effectively manage information risks.
Domain 4—Information Security Incident Management: Plan, establish, and oversee the capability to detect, investigate, respond to, and recover from information security incidents to minimize business impact.
Curriculum
- 4 Sections
- 248 Lessons
- Lifetime
- Domain 1: Information Security Governance31
- 1.0Why CISM5 Minutes
- 1.1Exam Domains3 Minutes
- 1.2Exam Requirements2 Minutes
- 1.3How To Register For Exam3 Minutes
- 1.4IS Governance1 Minute
- 1.5What is IS Governance13 Minutes
- 1.6Roles and Responsibilities19 Minutes
- 1.7Business Case2 Minutes
- 1.8Establishing Reporting And Communication Channels4 Minutes
- 1.9Is Governance Of Third Party Relationships6 Minutes
- 1.10IS Governance Metrics9 Minutes
- 1.11Kpi’S And Kgi’S5 Minutes
- 1.12Security Integration6 Minutes
- 1.13Areas To Measure (Metrics)6 Minutes
- 1.14Information Security Strategy Overview & Desired State Of Security6 Minutes
- 1.15Common Pitfalls4 Minutes
- 1.16Developing A Strategy Prerequisites5 Minutes
- 1.17Business Linkages4 Minutes
- 1.18Cobit 55 Minutes
- 1.19Capability Maturity Model Integration (CMMI)5 Minutes
- 1.20Balanced Scorecard (Bsc)3 Minutes
- 1.21The Iso27001-2013 Framework4 Minutes
- 1.22IS Strategy Development3 Minutes
- 1.23Resources3 Minutes
- 1.24Constraints And Considerations For A Security Program9 Minutes
- 1.25Framework3 Minutes
- 1.26Controls8 Minutes
- 1.27Training And Awareness2 Minutes
- 1.28Action Plan Metrics7 Minutes
- 1.29Information Security Program6 Minutes
- 1.30Security Concepts5 Minutes
- Domain 2: Information Risk Management and Compliance55
- 2.0Exam Relevance3 Minutes
- 2.1Definition Of Risk6 Minutes
- 2.2Classifying Assets3 Minutes
- 2.3Risk Management Steps3 Minutes
- 2.4Role Of The Information Security Manager3 Minutes
- 2.5Risk Management Overview3 Minutes
- 2.6Importance And Outcomes Of Risk5 Minutes
- 2.7Risk Management Strategy5 Minutes
- 2.8Risk Communication And Awareness4 Minutes
- 2.9Effective Information Risk Management5 Minutes
- 2.10Risk Appetite And Tolerance2 Minutes
- 2.11Risk Management Process3 Minutes
- 2.12Risk Management Framework – Reference Models3 Minutes
- 2.13Defining The External Environment5 Minutes
- 2.14Defining The Internal Environment4 Minutes
- 2.15Determining Risk Management Context5 Minutes
- 2.16Risk Assessment6 Minutes
- 2.17Risk Analysis Methodologies4 Minutes
- 2.18Information Asset Identification And Valuation4 Minutes
- 2.19Information Assets That Must Be Protected4 Minutes
- 2.20Information Asset Valuation Methods4 Minutes
- 2.21Identification Of Risk2 Minutes
- 2.22Threats3 Minutes
- 2.23Internal Threats And External Threats4 Minutes
- 2.24Advanced Persistent Threat (APT)4 Minutes
- 2.25Emerging Threats3 Minutes
- 2.26Vulnerabilities3 Minutes
- 2.27Likelihood And Impact5 Minutes
- 2.28Risk Register2 Minutes
- 2.29Risk Analysis Approach -Qualitative2 Minutes
- 2.30Risk Analysis Approach -Quantitative3 Minutes
- 2.31Risk Analysis Approach – Annual Loss2 Minutes
- 2.32Risk Analysis Approach – Others3 Minutes
- 2.33Residual Risk3 Minutes
- 2.34Risk Ownership And Accountability3 Minutes
- 2.35Impact3 Minutes
- 2.36Controls4 Minutes
- 2.37Security Incidents And Baselines3 Minutes
- 2.38Information Asset Classification3 Minutes
- 2.39Criticality And Sensitivity Of Assets2 Minutes
- 2.40Recovery Time Objectives (RTO)4 Minutes
- 2.41Recovery Point Objectives (RPO)3 Minutes
- 2.42Maximum Tolerable Outage (MTO)2 Minutes
- 2.43Third Party Service Providers4 Minutes
- 2.44Outsourcing Challenges4 Minutes
- 2.45Risk Management Integration With Life Cycle Processes2 Minutes
- 2.46Due Care2 Minutes
- 2.47Risk Monitoring And Communication3 Minutes
- 2.48Key Risk Indicators (KRIs)3 Minutes
- 2.49Reporting Significant Changes In Risk3 Minutes
- 2.50Training And Awareness3 Minutes
- 2.51Documentation Associated With Risk5 Minutes
- 2.52Compliance Monitoring And Enforcement4 Minutes
- 2.53Resolution On Non-compliance Issues4 Minutes
- 2.54Compliance Enforcement2 Minutes
- Domain 3: Information Security Program Development and Management90
- 3.1Domain 3 slide &Objective2 Minutes
- 3.2Learning Objectives2 Minutes
- 3.3Information Security Program Management Overview2 Minutes
- 3.4Information Security Program2 Minutes
- 3.5Resource Management4 Minutes
- 3.6Security Program Elements3 Minutes
- 3.7Overview3 Minutes
- 3.8Management Challenge3 Minutes
- 3.9Essential Elements3 Minutes
- 3.10Defined Objectives3 Minutes
- 3.11Information Systems3 Minutes
- 3.12Security Program Management4 Minutes
- 3.13Outcomes – Strategic Alignment3 Minutes
- 3.14Outcomes – Risk Management2 Minutes
- 3.15Outcomes -Value Delivery2 Minutes
- 3.16Outcomes – Resource Management3 Minutes
- 3.17Outcomes – Performance Measurement3 Minutes
- 3.18Assurance Process Integration2 Minutes
- 3.19Information Security Program Objectives2 Minutes
- 3.20Information Security Program Concepts4 Minutes
- 3.21Technology Resources3 Minutes
- 3.22Scope And Charter3 Minutes
- 3.23Chain Of Command3 Minutes
- 3.24Information Security Management Framework2 Minutes
- 3.25Risk Management4 Minutes
- 3.26Technical Components3 Minutes
- 3.27Operational Components3 Minutes
- 3.28Managerial Components3 Minutes
- 3.29Administrative Components4 Minutes
- 3.30Educational And Informational Components4 Minutes
- 3.31Elements Of A Road Map3 Minutes
- 3.32Defining The Program Road Map3 Minutes
- 3.33Developing A Security Program Road Map4 Minutes
- 3.34Security Infrastructure And Architecture2 Minutes
- 3.35Enterprise Security Architecture4 Minutes
- 3.36Architectural Approach4 Minutes
- 3.37Enterprise Architecture Domains2 Minutes
- 3.38Objectives Of Security Architecture3 Minutes
- 3.39Business Focus Beyond Technical Domain3 Minutes
- 3.40Security Program Management And Administrative Activities4 Minutes
- 3.41Personnel And Skills4 Minutes
- 3.42Roles And Culture4 Minutes
- 3.43Security-aware Culture2 Minutes
- 3.44Security Awareness Training And Education4 Minutes
- 3.45Preparing An Awareness Program4 Minutes
- 3.46Ethics5 Minutes
- 3.47Documentation3 Minutes
- 3.48Program Development And Project Management3 Minutes
- 3.49Program Budgeting3 Minutes
- 3.50Information Security Problem Management Practices3 Minutes
- 3.51Vendor Management4 Minutes
- 3.52Security Services3 Minutes
- 3.53Program Management Evaluation3 Minutes
- 3.54Plan-do-check-act2 Minutes
- 3.55Legal And Regulatory Requirements3 Minutes
- 3.56Physical And Environmental Factors4 Minutes
- 3.57Cultural Differences2 Minutes
- 3.58Logistics3 Minutes
- 3.59Security Program Services And Operational Activities8 Minutes
- 3.60Cross-organizational Responsibilities3 Minutes
- 3.61Integration Of Security Into Business Units2 Minutes
- 3.62Security Reviews And Audits3 Minutes
- 3.63Security Review Objectives3 Minutes
- 3.64Audits And Auditors6 Minutes
- 3.65Due Diligence2 Minutes
- 3.66Outsourcing And Service Providers5 Minutes
- 3.67Third-party Access3 Minutes
- 3.68Cloud Computing5 Minutes
- 3.69Cloud Characteristics And Service Models5 Minutes
- 3.70Cloud Deployment Models3 Minutes
- 3.71Considerations4 Minutes
- 3.72Integration Of Security3 Minutes
- 3.73Controls And Countermeasures3 Minutes
- 3.74Control -objectives And Strength3 Minutes
- 3.75Control Principles3 Minutes
- 3.76Countermeasures2 Minutes
- 3.77Physical And Environmental Controls3 Minutes
- 3.78Control Technology Categories3 Minutes
- 3.79Management Support Technologies3 Minutes
- 3.80Technical Control Components And Architecture3 Minutes
- 3.81Control Testing And Modification3 Minutes
- 3.82Baseline Controls3 Minutes
- 3.83Trade-offs2 Minutes
- 3.84Control Testing3 Minutes
- 3.85Security Program Metrics And Monitoring2 Minutes
- 3.86Monitoring Approaches2 Minutes
- 3.87Determine Success Of Information Security Investments3 Minutes
- 3.88Measuring Information Security Management Performance5 Minutes
- 3.89Common Information Security Program Challenges5 Minutes
- 3.90Improving Security5 Minutes
- Domain 4: Information Security Incident Management72
- 4.0Introduction, Exam Relevance2 Minutes
- 4.1Learning Objectives2 Minutes
- 4.2Incident Management And Response6 Minutes
- 4.3Incident Response Planning2 Minutes
- 4.4Timeliness3 Minutes
- 4.5Incident Response And Documentation2 Minutes
- 4.6Incident Response Teams2 Minutes
- 4.7External Entities3 Minutes
- 4.8Root Cause Analysis2 Minutes
- 4.9Incident Response Overview2 Minutes
- 4.10Incident Response Requirements4 Minutes
- 4.11Incident Management4 Minutes
- 4.12Irp Bcp Drp2 Minutes
- 4.13Incident Management Life Cycle Phases2 Minutes
- 4.14Planning And Preparation3 Minutes
- 4.15Critical Parts Of Incident Response3 Minutes
- 4.16Incident Response Procedures2 Minutes
- 4.17Importance Of Incident Management4 Minutes
- 4.18Outcomes Of Incident Management4 Minutes
- 4.19Monitoring And Metrics Benefits3 Minutes
- 4.20Incident Response Concepts3 Minutes
- 4.21Incident Management Systems2 Minutes
- 4.22Automated System Efficiencies2 Minutes
- 4.23Incident Management Organisation2 Minutes
- 4.24Emergency Management3 Minutes
- 4.25Responsibilities3 Minutes
- 4.26Incident Management Resources4 Minutes
- 4.27Irp Policies2 Minutes
- 4.28Incident Response Technology Concepts2 Minutes
- 4.29Personnel2 Minutes
- 4.30IRT Response Team Organisation3 Minutes
- 4.31Skills – IR Team3 Minutes
- 4.32Awareness And Education1 Minute
- 4.33Audits2 Minutes
- 4.34Outsourced Security Providers2 Minutes
- 4.35Incident Management – Key Success Factors3 Minutes
- 4.36Defining Incident Management Procedures2 Minutes
- 4.37Current State Of Incident Response2 Minutes
- 4.38Elements Of An Incident Response Plan3 Minutes
- 4.39Gap Analysis1 Minute
- 4.40Business Impact Analysis3 Minutes
- 4.41Bia Goals And Assessment Activities3 Minutes
- 4.42Benefits Of Conducting a Bia2 Minutes
- 4.43Escalation Process For Effective Incident Management3 Minutes
- 4.44Help Service Desk Processes For Identifying Security Incidents2 Minutes
- 4.45Incident Management and Response – Teams Involved2 Minutes
- 4.46Key Decisions To Be Made In Planning2 Minutes
- 4.47Organising, Training And Equipping The Response Staff2 Minutes
- 4.48Incident Notification Process2 Minutes
- 4.49Challenges In Developing An Incident Management Plan2 Minutes
- 4.50Business Continuity And Disaster Recovery – Planning3 Minutes
- 4.51Recovery Operations And Concepts3 Minutes
- 4.52Strategies For Addressing Threats2 Minutes
- 4.53Recovery Sites4 Minutes
- 4.54Basis For Recovery Site Selection4 Minutes
- 4.55Response And Recovery Strategy Implementation2 Minutes
- 4.56Integrating Incident Response With Business Continuity2 Minutes
- 4.57Notification And Supplies2 Minutes
- 4.58Communications Network3 Minutes
- 4.59Continuity Of IT Service3 Minutes
- 4.60Updating Recovery Plans2 Minutes
- 4.61Testing Incident Response And Business Continuity Disaster Recovery Plans3 Minutes
- 4.62Periodic Testing Of The Response And Recovery Plans4 Minutes
- 4.63Testing Categories And Test Results3 Minutes
- 4.64Executing Response And Recovery Plans2 Minutes
- 4.65Post-incident Activities And Investigation2 Minutes
- 4.66Identifying Causes And Corrective Action2 Minutes
- 4.67Document Events2 Minutes
- 4.68Establish Procedures2 Minutes
- 4.69Requirements For Evidence3 Minutes
- 4.70Legal Aspects Of Forensic Evidence2 Minutes
- 4.71Procedures For Investigations2 Minutes