Companies Home Search Profile

CISM - Certified Information Security Manager Full Training

Focused View

Nour | Cyvitrix Train

14:44:11

31 View
  • 1. Meet the Instructor.mp4
    01:39
  • 2. Have a Question Here how to get in touch.mp4
    01:30
  • 3. Rating is Caring.mp4
    03:20
  • 4. Getting the Course Completion Certificate.mp4
    01:13
  • 1. CIA Triad and the Security Objectives.mp4
    07:23
  • 2. Privacy and Security.mp4
    08:02
  • 3. Cyber Kill Chain.mp4
    06:53
  • 4. Cyber Attacks.mp4
    13:50
  • 5. MiTM.mp4
    03:35
  • 6. Malware and Cyber Threats.mp4
    16:20
  • 7. Password Attacks and Rainbow Tables.mp4
    05:35
  • 1. Security Manager Roles.mp4
    10:11
  • 2. Organisational Structure.mp4
    02:55
  • 3. Why Information Security Governance.mp4
    03:06
  • 4. Governance vs Management.mp4
    07:12
  • 5. RACI Matrix.mp4
    05:22
  • 6. Data Owner and Data Custodian.mp4
    10:16
  • 7. Strategy, Goals and Business Alignment.mp4
    08:18
  • 8. Data LifeCycle.mp4
    06:23
  • 9. Data Retention and Disposal.mp4
    09:33
  • 10. Legal regulations and Standards.mp4
    12:22
  • 11. Maturity Assessment Models and PDCA.mp4
    10:07
  • 12. Governance Frameworks.mp4
    05:11
  • 13. IT Balanced Score Card.mp4
    07:54
  • 14. Polices.mp4
    07:21
  • 15. Example of Policies.mp4
    03:52
  • 16. Standards.mp4
    08:26
  • 17. Policies and Standards Review.mp4
    03:37
  • 18. Procedures and Guidelines.mp4
    07:30
  • 19. Security Investment - CAPEX and OPEX, ROI & ROSI.mp4
    09:30
  • 20. Portfolio and Financial Management.mp4
    08:57
  • 1. Risk Management Overview.mp4
    09:52
  • 2. Types of Risk.mp4
    05:01
  • 3. Risk Analysis Evaluation.mp4
    15:22
  • 4. Risk Response.mp4
    07:22
  • 5. Risk Monitoring.mp4
    11:13
  • 6. Key Risk Indicators.mp4
    05:10
  • 7. Risk Management Frameworks.mp4
    02:06
  • 8. Security Controls.mp4
    09:51
  • 9. Types of Security Controls.mp4
    10:58
  • 10. Control Objective.mp4
    05:50
  • 11. Control Objective.mp4
    09:44
  • 12. Controls Assessment and Defence in Depth.mp4
    07:58
  • 13. Understand the Security Layers in Corporate Networks.mp4
    13:19
  • 14. Network Security using Segmentation.mp4
    05:31
  • 15. Firewalls and IPS.mp4
    04:52
  • 16. DMZ and Bastian Host.mp4
    04:20
  • 17. Proxy, Load Balance and Email Security.mp4
    07:51
  • 18. Network Access Control.mp4
    03:11
  • 19. Endpoint Protection Platform.mp4
    14:56
  • 1. Business Case.mp4
    04:30
  • 2. Enterprise Architecture.mp4
    03:50
  • 3. Social Engineering.mp4
    16:06
  • 4. Security Awareness.mp4
    07:31
  • 5. Personnel Security Measures.mp4
    11:55
  • 6. Software Development Methodologies.mp4
    08:57
  • 7. Secure Coding and Software Development Best Practices.mp4
    08:21
  • 8. DevOps.mp4
    07:06
  • 9. DevSecOps.mp4
    08:04
  • 10. Security Testing and Assessment.mp4
    10:31
  • 11. Security Testing and Assessment - SAST, DAST, SCA.mp4
    06:51
  • 12. Threat Model Overview.mp4
    08:59
  • 13. Threat Model - STRIDE and DREAD.mp4
    12:38
  • 14. AAA Overview.mp4
    06:57
  • 15. MFA and Bio metric Authentication.mp4
    10:05
  • 16. Cryptography Overview.mp4
    10:21
  • 17. Symmetric Encryption.mp4
    02:14
  • 18. Asymmetric Encryption.mp4
    13:57
  • 19. Asymmetric Encryption Use Cases.mp4
    12:16
  • 20. Digital Signature.mp4
    05:16
  • 21. Hashing.mp4
    15:22
  • 22. Public Key Infrastructure.mp4
    12:56
  • 23. Outsourcing and Third Party Management.mp4
    18:55
  • 24. Supply Chain Risk Management.mp4
    06:40
  • 25. System Organization Controls - SOC Audit and Report.mp4
    11:47
  • 26. Physical Security and Facility Design.mp4
    15:11
  • 27. Physical Access Controls.mp4
    05:52
  • 28. CCTV and Facility Monitoring.mp4
    04:45
  • 29. Data and Perimeter Security.mp4
    13:34
  • 30. Securing Power Sources.mp4
    08:18
  • 31. Fire Suppression System.mp4
    16:38
  • 1. Incident Management Overview.mp4
    15:27
  • 2. Forensic Investigation and Evidence Collection.mp4
    09:52
  • 3. Problem Management.mp4
    01:43
  • 4. Incident Response Testing and Evaluation.mp4
    05:12
  • 5. Incident Response Training.mp4
    03:24
  • 6. What is Disasters and What is BIA.mp4
    05:22
  • 7. Disaster Recovery Plan.mp4
    05:03
  • 8. Business Continuity Plan.mp4
    05:36
  • 9. Developing BCP and DRP.mp4
    03:21
  • 10. RPO and RTO.mp4
    02:53
  • 11. AIW, SDO, MTO.mp4
    03:17
  • 12. RTO, RPO, MTO relations.mp4
    05:28
  • 13. Recovery Strategies.mp4
    07:11
  • 14. Reciprocal Agreement.mp4
    01:56
  • 15. Testing and Evaluating the BCP and DRP.mp4
    06:19
  • 16. Data Backup.mp4
    07:55
  • 17. Backup Types.mp4
    13:41
  • 18. SOC.mp4
    05:30
  • 19. SIEM.mp4
    08:30
  • 20. EDR and NDR.mp4
    06:55
  • 21. XDR and SOAR.mp4
    06:43
  • 22. Vulnerability Assessment Software.mp4
    05:59
  • 23. Threat Intelligence and MITRE Framework.mp4
    04:26
  • 24. Help Desk and Ticketing System.mp4
    04:17
  • 25. Change Management Overview.mp4
    06:52
  • 26. Types of Changes.mp4
    06:15
  • 27. Configuration Management.mp4
    05:39
  • 28. Patch Management.mp4
    03:10
  • 29. Release Management.mp4
    10:07
  • 30. Virtualisation Concepts.mp4
    04:49
  • 31. Cloud Computing Overview.mp4
    14:06
  • 32. Containerisation Technology and Server-less Computing.mp4
    09:00
  • 1. Register and Appear for the CISM Exam.html
  • Description


    Prepare for ISACA CISM Exam

    What You'll Learn?


    • Understand the key concepts and principles of information security management
    • Develop and implement an effective information security program
    • Understand the importance of risk management and how to manage risks effectively
    • Identify and respond to information security incidents
    • Prepare for and pass the CISM certification exam

    Who is this for?


  • Security analysts and Managers
  • Students who need to gain understanding
  • People who are interested in pursuing this certification
  • IT Manager, and Analysts
  • Auditors and Risk practitioners and compliance specialists
  • Anyone interested in the subject of the training
  • What You Need to Know?


  • No requirements, everything will be explained from scratch, however basic understanding for IT and Security will be beneficial to keep the pace!
  • More details


    Description

    About this course


    CISM stands for Certified Information Security Manager. It is a globally recognized certification for information security management. CISM is offered by ISACA (Information Systems Audit and Control Association), a professional association for IT governance, risk management, and cybersecurity professionals.

    CISM certification is designed for professionals who manage, design, and oversee an enterprise's information security program. It validates their expertise in areas such as information security governance, risk management, incident management, and program development and management. CISM certification demonstrates a professional's ability to understand business objectives and risks and to develop and manage an effective information security program aligning with those objectives.

    To obtain CISM certification, candidates must meet specific experience requirements and pass the CISM exam. The experience requirements typically include a minimum of five years of work experience in information security management, with at least three years of experience in three or more of the CISM domains.

    The CISM exam consists of 150 multiple-choice questions covering four domains:

    1. Information Security Governance (24%)

    2. Information Risk Management (30%)

    3. Information Security Program Development and Management (27%)

    4. Information Security Incident Management (19%)

    Candidates need to achieve a passing score to earn the CISM certification. Upon successfully passing the exam, candidates must adhere to the ISACA Code of Professional Ethics and the CISM continuing professional education (CPE) policy to maintain their certification.

    CISM training is available through various means, including self-study using official ISACA resources, attending instructor-led training courses, or participating in online training programs. These training options provide candidates with the knowledge and skills required to pass the CISM exam and excel in their information security management roles.


    Secure Your Future with Cyvitrix


    In today's digital age, cybersecurity and information security are no longer optional. With an increasing amount of sensitive information being stored and shared online, the need for top-notch security has never been greater. Welcome to Cyvitrix, your ultimate resource for comprehensive and cutting-edge cybersecurity courses.


    At Cyvitrix, we understand that knowledge is power — power to protect, power to prevent, and power to prosper. Our wide range of courses caters to everyone, from beginners who want to understand the basics to professionals seeking advanced skills to stay ahead of the curve.


    Why Choose Cyvitrix?


    1. Industry-Relevant Curriculum: We constantly update our courses to reflect the latest threats and trends in cybersecurity. You'll learn how to deal with real-world scenarios, preparing you for the challenges you'll face in the field.

    2. Expert Instructors: Our courses are taught by industry veterans with years of experience in cybersecurity and information security. They're not just teachers, they're practitioners who have been in the trenches.

    3. Flexible Learning: We believe in making learning accessible. Whether you prefer to study at your own pace online or enjoy the intensity of live online classes, we've got you covered.

    4. Certification: Upon completion of our courses, you'll receive a Cyvitrix certification, a testament to your newfound skills and a valuable addition to your professional profile.

    5. Community: Join a network of like-minded learners and experts. Share insights, ask questions, and build connections in our vibrant community.

    Whether you're looking to advance your career, start a new one, or simply enhance your understanding of cybersecurity, Cyvitrix is your trusted partner on this journey. With our courses, you're not just investing in education; you're investing in your future.

    Take the first step towards empowering your digital life. Enroll in a Cyvitrix course today.


    At Cyvitrix, we provide Training courses that help you as students to conquer and pass your certification exams from first attempt.

    Our courses are designed to provide you all what you need in order not only to pass the exam, but also to apply this knowledge to elevate and support your career objectives

    Why training with us is ideal for you?

    - Excellent quality video content

    - High courses quality

    - Organized materials

    - Real life scenarios and examples

    - Practice questions and questions ideas

    - Up to date content

    - Instructor is available to answer all questions you might get

    - Reasonable pricing


    About this course
    The CISM training course is designed to provide you with a detailed understanding of information security management, risk management, and incident management. The course is divided into four domains, each of which is covered in-depth:

    1. Information Security Governance

    2. Risk Management

    3. Information Security Program Development and Management

    4. Information Security Incident Management

    The course is designed to help you develop the necessary skills to become a successful information security manager by providing you with practical knowledge and hands-on experience.


    Additional Notes

    Course Requirements:
    It is recommended that you have some experience in information security management or a related field.


    Certification:
    Upon completion of the course, you will be eligible to sit for the CISM certification exam. The exam is administered by ISACA and consists of 150 multiple-choice questions. To pass the exam, you must achieve a score of at least 450 out of 800.

    Enroll in the CISM training course today and take the first step towards becoming a certified information security manager!

    Who this course is for:

    • Security analysts and Managers
    • Students who need to gain understanding
    • People who are interested in pursuing this certification
    • IT Manager, and Analysts
    • Auditors and Risk practitioners and compliance specialists
    • Anyone interested in the subject of the training

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Nour | Cyvitrix Train
    Nour | Cyvitrix Train
    Instructor's Courses
    Hi there!As cyber threats continue to evolve and become more sophisticated, the need for skilled cyber-security professionals has never been greater. A cyber-security trainer can play a critical role in preparing individuals and organizations to defend against cyber attacks and protect their sensitive information and assets.Here are 10 reasons why you should train with me as your cyber-security trainer:Expertise: With years of experience working in the cyber-security field, I bring a wealth of knowledge and expertise to my courses. I stay up-to-date with the latest trends and best practices in the industry, and I am dedicated to sharing this knowledge with my students.Comprehensive Training: My courses cover a wide range of cyber-security topics, including network security, cloud security, data protection, threat detection, and incident response. This ensures that learners have a well-rounded understanding of the cyber-security landscape.Practical Insights: My courses are designed to be practical and actionable, with a focus on real-world scenarios and challenges. I provide hands-on exercises and case studies that help learners apply their knowledge and skills in a practical setting.Accessibility: My courses are accessible to learners of all skill levels and backgrounds. I use clear and concise language, and I provide explanations and examples that are easy to understand.Engaging Instruction: I use a variety of teaching methods, including lectures, interactive exercises, and quizzes, to keep learners engaged and motivated. My courses are designed to be dynamic and interesting, with a focus on active learning.Flexibility: My courses are self-paced, which means learners can complete them at their own pace and on their own schedule. This makes it easy for busy professionals to fit training into their busy schedules.Support: I am always available to answer questions and provide support to my students. I am dedicated to helping learners succeed, and I offer personalized support to ensure that students get the most out of their training.Collaboration: I encourage collaboration and communication among learners, which helps to foster a sense of community and support. I provide opportunities for learners to connect with each other and share their experiences and insights.Soft Skills Training: In addition to technical skills, I emphasize the importance of soft skills such as critical thinking, problem-solving, and communication. These skills are essential for success in the security field, and I provide training and guidance on how to develop them.Affordability: My courses are affordable and offer exceptional value for the price. I believe that everyone should have access to quality cyber-security training, and I strive to make my courses accessible to as many learners as possible.As a cyber-security trainer on Udemy, I am committed to helping learners develop the knowledge and skills they need to succeed in the cyber-security field. I am dedicated to providing high-quality training that is relevant, engaging, and practical, and I am always available to answer questions and provide support to my students.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 113
    • duration 14:44:11
    • Release Date 2023/09/10