Companies Home Search Profile

Certified Information Security Manager: CISM Complete Course

Focused View

Josh Hicks

14:46:26

0 View
  • 1 - Introduction.mp4
    01:23
  • 2 - CISM Overview.mp4
    03:30
  • 3 - Preparing for the Exam.mp4
    03:39
  • 4 - Domain Overview.mp4
    03:03
  • 5 - Enterprise Governance.mp4
    06:59
  • 6 - Importance of Information Security Governance.mp4
    08:48
  • 7 - Organizational Culture.mp4
    06:01
  • 9 - Organizational Structures Roles and Responsibilities.mp4
    11:53
  • 10 - Steering Committee.mp4
    05:54
  • 11 - Information Security Strategy.mp4
    02:13
  • 12 - Information Security Strategy Development.mp4
    07:53
  • 13 - Defining Security Objectives.mp4
    09:05
  • 14 - The Desired State.mp4
    08:09
  • 15 - Dynamic Interconnections.mp4
    07:41
  • 16 - Essential Components.mp4
    06:57
  • 17 - Information Governance Frameworks and Standards.mp4
    10:43
  • 18 - Strategic Planning.mp4
    13:13
  • 19 - Risk Assessment and Management.mp4
    10:20
  • 20 - Action Plan to Implement Strategy.mp4
    04:25
  • 21 - Metrics Considerations.mp4
    09:12
  • 22 - Domain Overview.mp4
    06:28
  • 23 - Risk Identification.mp4
    04:44
  • 24 - Emerging Risks.mp4
    10:06
  • 25 - Risk Management Framework.mp4
    06:28
  • 26 - Emerging Threats.mp4
    09:10
  • 27 - Concept of Vulnerability.mp4
    04:36
  • 28 - Security Baselines.mp4
    09:50
  • 29 - Risk Analysis Evaluation and Assessment.mp4
    09:26
  • 30 - Risk Management with IT Life Cycle.mp4
    07:57
  • 31 - Risk Scenarios.mp4
    04:11
  • 32 - Risk Assessment Process.mp4
    06:57
  • 33 - Other Risk Assessment Approaches.mp4
    05:01
  • 34 - Risk Analysis.mp4
    06:51
  • 35 - Annual Loss Expectancy.mp4
    04:24
  • 36 - Risk Evaluation.mp4
    03:02
  • 37 - Information Risk Response.mp4
    08:22
  • 38 - Risk Response Options.mp4
    05:03
  • 39 - Inherent and Residual Risk.mp4
    11:16
  • 40 - Risk and Control Ownership.mp4
    11:22
  • 41 - Risk Communication.mp4
    10:54
  • 42 - Domain Overview.mp4
    02:46
  • 43 - Part A Information Security Program Development.mp4
    01:38
  • 44 - Information Security Program Overview.mp4
    04:36
  • 45 - Essential Elements of an Information Security Program.mp4
    06:00
  • 46 - Applying the Security Program Business Case.mp4
    04:42
  • 47 - Outcomes of Information Security Program Management.mp4
    11:20
  • 48 - Information Security Program Resources.mp4
    05:34
  • 49 - Information Security Program Concepts.mp4
    09:27
  • 50 - Common Information Security Program Challenges.mp4
    10:01
  • 51 - Common Information Security Program Constraints.mp4
    05:25
  • 52 - Information Asset Identification and Classification.mp4
    09:31
  • 53 - Benefits of Classification.mp4
    05:11
  • 54 - Industry Standards and Frameworks.mp4
    12:07
  • 55 - Information Security Management Frameworks.mp4
    14:15
  • 56 - Information Security Framework Components.mp4
    11:50
  • 57 - Information Security Policies Procedures and Guidelines.mp4
    05:16
  • 58 - Standards.mp4
    05:39
  • 59 - Defining an Information Security Program Road Map.mp4
    08:25
  • 60 - Security Program Management and Administrative Activities.mp4
    07:50
  • 61 - Developing an Information Security Program Road Map.mp4
    04:07
  • 62 - Information Security Program Metrics.mp4
    11:02
  • 63 - Security Metrics.mp4
    04:54
  • 64 - Objective of Information Security.mp4
    05:43
  • 65 - Security Program Metrics and Monitoring.mp4
    07:23
  • 66 - Key Attributes of Metrics.mp4
    05:56
  • 67 - Information Security Program Management.mp4
    05:46
  • 68 - Controls and Countermeasures.mp4
    07:28
  • 69 - Control Methods.mp4
    05:41
  • 70 - Control Technology Categories.mp4
    04:53
  • 71 - Technical Security Architecture.mp4
    04:12
  • 72 - Information Security Control Implementation and Integration.mp4
    08:08
  • 73 - Baseline Controls.mp4
    10:47
  • 74 - Information Security Awareness and Training.mp4
    09:05
  • 75 - Integration of the Security Program with IT Operations.mp4
    10:53
  • 76 - Information Security Liaison Responsibilities.mp4
    06:24
  • 77 - Steering Committee.mp4
    09:02
  • 78 - CrossOrganizational Responsibilities.mp4
    11:35
  • 79 - Integration with IT Processes.mp4
    07:13
  • 80 - Benefits of DevOps.mp4
    07:06
  • 81 - Cloud Computing.mp4
    07:48
  • 82 - Management of External Services and Relationships.mp4
    07:15
  • 83 - Recommendations for Outsourcing.mp4
    06:24
  • 84 - Outsourcing Challenges.mp4
    09:24
  • 85 - Information Security Program Communications and Reporting.mp4
    10:55
  • 86 - The PlanDoCheckAct Cycle.mp4
    10:03
  • 87 - Compliance Monitoring and Enforcement.mp4
    08:06
  • 88 - Monitoring Approaches.mp4
    04:07
  • 89 - Measuring Information Security Management Performance.mp4
    05:20
  • 90 - Understanding Metric Worth.mp4
    07:28
  • 91 - Measuring Organizational Awareness.mp4
    06:35
  • 92 - Ongoing Monitoring and Communication.mp4
    03:47
  • 93 - Domain Overview.mp4
    03:07
  • 94 - Incident Management and Incident Response Overview.mp4
    07:01
  • 95 - Goals of Incident Management Practices.mp4
    07:01
  • 96 - Incident Management and Incident Response Plans.mp4
    06:07
  • 97 - Developing Clear Scope and Objectives.mp4
    06:36
  • 98 - Response and Recovery Plan.mp4
    07:18
  • 99 - Detailed Plan of Action for Incident Management.mp4
    08:20
  • 100 - Current State of Incident Response Capability.mp4
    04:04
  • 101 - Developing an Incident Response Plan.mp4
    07:35
  • 102 - Incident Management and Response Teams.mp4
    08:58
  • 103 - Business Impact Analysis.mp4
    10:40
  • 104 - Elements of a Business Impact Analysis.mp4
    05:37
  • 105 - Business Continuity Plan.mp4
    07:34
  • 106 - HighAvailability Considerations.mp4
    07:22
  • 107 - Disaster Recovery Plan.mp4
    10:37
  • 108 - Recovery Sites.mp4
    09:31
  • 109 - IT Facilities Recovery Strategies.mp4
    06:00
  • 110 - Incident Classification Categorization.mp4
    06:10
  • 111 - Incident Management Training Testing and Evaluation.mp4
    07:45
  • 112 - Incident Management Metrics and Indicators.mp4
    10:44
  • 113 - Updating Recovery Plans.mp4
    08:48
  • 114 - Types of Tests.mp4
    08:45
  • 115 - Incident Management Operations.mp4
    07:57
  • 116 - Incident Response Technology Foundations.mp4
    08:35
  • 117 - Skills Overview.mp4
    10:04
  • 118 - Incident Investigation and Evaluation.mp4
    04:30
  • 119 - Incident Containment Methods.mp4
    07:48
  • 120 - Incident Eradication and Recovery.mp4
    08:40
  • 121 - Incident Response Plan.mp4
    10:00
  • Description


    Complete Information Security Manager CISM Exam Prep - Security Training you need to ace ISACA CISM Exam with Quizzes

    What You'll Learn?


    • Prepare for the 2022 edition of the CISM: Certified Information Security Manager Exam (the next scheduled CISM update is anticipated in 2027).
    • Gain a management-level understanding of IT Security and Cybersecurity.
    • Recognize the significance of risk management and learn how to manage risks effectively.
    • Design and implement a successful information security program.
    • The candidate will be equipped to confidently attempt and pass the CISM exam.

    Who is this for?


  • Students seeking to pass the CISM Exam
  • Cybersecurity Professionals
  • IT Professionals
  • Business Professionals
  • Information Security Managers
  • What You Need to Know?


  • No prerequisites are needed—everything will be taught from the ground up. However, having a basic understanding of IT and Security can help you keep up with the course content more easily.
  • More details


    Description

    Unlock Your Potential with Our Complete CISM - "Certified Information Security Manager" Training

    Welcome to our CISM Training Course! If you're aiming to advance your career as a Security Manager, CISO, or Senior Security Consultant, this course is your pathway to success.


    Why Choose Our CISM Training?

    Our comprehensive CISM training is meticulously crafted to guide you through the Certified Information Security Manager (CISM) certification process. We cover all essential topics and provide effective strategies to help you succeed in your exam. Our content is aligned with the latest CISM CRM ensuring you receive the most current and relevant information. Additionally, we'll integrate any new updates from future revisions to keep you ahead in the ever-evolving field of information security.


    • Extensive Video Lectures: Dive into 15 hours of detailed video content that breaks down complex concepts, perfect for beginners and seasoned professionals alike.

    • Practice Exams: Test your knowledge with practice questions, including quizzes and post-course exams.

    • Responsive Instructor Support: Get your questions answered promptly within 24-36 hours


    Please Note: This course is an unofficial resource and is not sponsored or endorsed by ISACA. We recommend using this course in conjunction with ISACA’s official study materials to enhance your exam preparation.

    About the CISM Certification

    The Certified Information Security Manager (CISM) certification, offered by the Information Systems Audit and Control Association (ISACA), is a globally recognized credential in information security management. It validates your expertise in managing, designing, and evaluating enterprise information security programs. Earning this certification can significantly boost your career, opening doors to higher-level roles and opportunities in the information security sector.

    Course Highlights

    Our course thoroughly covers the core domains of CISM:

    • Information Security Governance: Learn how to establish and manage governance frameworks, policies, and processes essential to information security.

    • Risk Management: Understand the strategies for identifying, assessing, and mitigating information security risks to support business objectives.

    • Security Program Development: Gain insights into developing and managing a robust information security program aligned with organizational goals.

    • Incident Management: Master the skills needed to plan, establish, and manage effective responses to information security incidents.

    Unique Features of Our Course

    Beyond the core content, our course offers a holistic learning experience:

    • Satisfaction Guaranteed: Benefit from our 30-day money-back guarantee.

    • Certificate of Completion: Upon finishing the course, you'll receive a Udemy certificate that adds value to your professional portfolio.

    • Continuous Support and Updates: Our instructor is committed to your success, offering ongoing support and regularly updating the course to maintain its relevance.

    Disclaimer

    This course is unofficial and not affiliated with ISACA. It's designed to supplement your understanding of the concepts required for the CISM exam.

    Who this course is for:

    • Students seeking to pass the CISM Exam
    • Cybersecurity Professionals
    • IT Professionals
    • Business Professionals
    • Information Security Managers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Hello there! I'm Josh Hicks, and I'm thrilled to be your instructor here on Udemy. With over 15 years of hands-on experience in Information Technology and Information Security, I'm here to share my knowledge and expertise with you.I hold a Bachelor of Science (B.S.) in Information Technology, providing me with a strong foundation in the world of IT.Additionally, I've earned a Master of Business Administration (M.B.A.) with a special emphasis on Project Management. This MBA has equipped me with the skills to effectively manage and lead projects in the dynamic field of technology.Furthermore, I possess a Master of Science (M.S.) in Information Systems Security. My deep understanding of security principles and practices ensures that I can guide you through the complex landscape of safeguarding digital assets.Currently, I am pursuing a Master of Arts (M.A.) in Global Security with a focus on Cybersecurity. This ongoing endeavor allows me to stay up-to-date with the latest trends and challenges in the rapidly evolving world of cybersecurity.Throughout my career, I've had the privilege of working on a wide range of IT and security projects. My real-world experience will provide you with practical insights and solutions that you can apply in your own professional journey.My passion for technology and security, coupled with my academic achievements and extensive industry experience, makes me a dedicated instructor who is committed to helping you succeed. I believe that knowledge is power, and I'm excited to empower you with the skills and understanding you need to excel in Information Technology and Information Security.Join me on this learning adventure, and together, we'll explore the fascinating world of IT and cybersecurity. Whether you're a beginner or an experienced professional, there's always something new to discover in this ever-evolving field.Let's embark on this educational journey together, and I can't wait to see you thrive in the world of technology!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 120
    • duration 14:46:26
    • Release Date 2024/10/12

    Courses related to Cyber Security