CISM Certified Information Security Manager

Here's what you will learn
1
Lessons 1: Introduction
- The CISM Exam
- CISM Exam Objectives
- CISM Certification Exam Objective Map
2
Lessons 2: Today's Information Security Manager
- Information Security Objectives
- Role of the Information Security Manager
- Information Security Risks
- Building an Information Security Strategy
- Implementing Security Controls
- Data Protection
- Summary
- Exam Essentials
3
Lessons 3: Information Security Governance and Compliance
- Governance
- Understanding Policy Documents
- Complying with Laws and Regulations
- Adopting Standard Frameworks
- Security Control Verification and Quality Control
- Summary
- Exam Essentials
4
Lessons 4: Information Risk Management
- Analyzing Risk
- Risk Treatment and Response
- Risk Analysis
- Disaster Recovery Planning
- Privacy
- Summary
- Exam Essentials
5
Lessons 5: Cybersecurity Threats
- Exploring Cybersecurity Threats
- Threat Data and Intelligence
- Summary
- Exam Essentials
6
Lessons 6: Information Security Program Development and Management
- Information Security Programs
- Security Awareness and Training
- Managing the Information Security Team
- Managing the Security Budget
- Integrating Security with Other Business Functions
- Summary
- Exam Essentials
7
Lessons 7: Security Assessment and Testing
- Vulnerability Management
- Security Vulnerabilities
- Penetration Testing
- Training and Exercises
- Summary
- Exam Essentials
8
Lessons 8: Cybersecurity Technology
- Endpoint Security
- Network Security
- Cloud Computing Security
- Cryptography
- Code Security
- Identity and Access Management
- Summary
- Exam Essentials
9
Lessons 9: Incident Response
- Security Incidents
- Phases of Incident Response
- Building the Incident Response Plan
- Creating an Incident Response Team
- Coordination and Information Sharing
- Classifying Incidents
- Conducting Investigations
- Plan Training, Testing, and Evaluation
- Summary
- Exam Essentials
10
Lessons 10: Business Continuity and Disaster Recovery
- Planning for Business Continuity
- Project Scope and Planning
- Business Impact Analysis
- Continuity Planning
- Plan Approval and Implementation
- The Nature of Disaster
- System Resilience, High Availability, and Fault Tolerance
- Recovery Strategy
- Recovery Plan Development
- Training, Awareness, and Documentation
- Testing and Maintenance
- Summary
- Exam Essentials
11
Hands-on LAB Activities
Security Assessment and Testing
- Using Nikto
- Consulting a Vulnerability Database
- Configuring a Nessus Scan
- Performing Passive Reconnaissance
- Performing Active Reconnaissance
Cybersecurity Technology
- Simulating the DDoS Attack
- Enabling Intrusion Detection and Prevention
- Creating a VPN Connection
- Implementing Port Security
- Creating a Virtual LAN
- Creating a Demilitarized Zone
- Using Windows Firewall
- Observing an SHA-Generated Hash Value
- Observing an MD5-Generated Hash Value
- Examining Asymmetric Encryption
- Performing Symmetric Encryption
Incident Response
- Completing the Chain of Custody
Business Continuity and Disaster Recovery
- Configuring RAID
- Taking an Incremental Backup
Taking a Full Backup
Be the first to add a review.
Please, login to leave a review