Use code COURSEFARM to get 30% OFF on all products!
CISM – Certified Information Security Manager – Mohamed Atef
Original price was: $150.00.$39.00Current price is: $39.00.
Our CISM program will combine the achievement of passing a comprehensive exam with recognition of work with the skills needed to work as Information Security managers and will allow you to clear the CISM exam from the first attempt and get certified with globally recognized certificate.
- Description
- Reviews (0)
Description
CISM – Certified Information Security Manager – Mohamed Atef
Get CISM Certified easily
The CISM certification from ISACA is a program developed for information security managers ,information security professionals and individual who are planning to move to information security management.
Our CISM program will combine the achievement of passing a comprehensive exam with recognition of work with the skills needed to work as Information Security managers and will allow you to clear the CISM exam from the first attempt and get certified with globally recognized certificate.
This course will cover the 4 information security domains with in-depth coverage of the information covering and will provide the students with a lot of real life scenarios and a library of templates with the full support from the instructor.
Lifetime support – Download unlimited when you buy CISM – Certified Information Security Manager – Mohamed Atef Course at Course Farm. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …
Course Curriculum
Materials and extra resources
- How to get access to the students portal (3:28)
Introduction
- Introduction (9:39)
- Course Outline (8:01)
- Course Structure (5:44)
Background
- Background needed (4:40)
- GRC- Governance, Risk, Compliance (10:35)
- Senior Management and GRC (7:23)
- Senior Management and Risk (6:38)
- Organization Structure (5:23)
Domain 1 : Information Security Governance
- Introduction to Security Concepts (13:33)
- Business Goals and Objective (4:53)
- Information Security Governance (4:09)
- CIA Triad (5:40)
- Information Security components (4:00)
- Security Program Objectives (5:48)
- Information Security Governance Output. (2:48)
- Define roles and responsibilities (3:49)
- GRC (1:18)
- Governace of Third party (1:28)
- Establish, monitor, evaluate and report metrics (5:50)
Domain 2 : Information Risk Management and Compliance
- What is Risk (11:59)
- Asset Evaluation (18:28)
- Information Asset Register (7:58)
- Classification Schemes (4:34)
- Risk Register (3:20)
- Alligment of Risk Asemment and BIA (4:03)
- Business Impact Analysis – BIA (10:09)
- Ethics Issue (5:29)
- Control Types (2:56)
- Control Catagory (3:51)
- Evaluate information security controls (3:53)
Domain 3 : Information Security Program Development and Management
- Establish and maintain the information security program (5:18)
- Information Security Program Element (3:03)
- Access Control (6:45)
- Authorization (19:19)
- Authentication (18:46)
- IDS (6:53)
- Firewall (10:38)
- Cryptography (16:26)
- Symetric Encryptian (12:38)
- Asymetric Encryptian (13:47)
- Network Arch1 (17:04)
- Hashing (6:05)
Domain 4 : Information Security Incident Management
- Information Security Incident Managment (10:06)
- Incident Repsonse Team (6:50)
- Incident Report (4:11)
- BCP- DRP (1:24)
- BCP (14:32)
- BIA (10:09)
- MTD-RTO-RPO (11:39)
- DRP (3:29)
- Alternative Sites (8:05)
Get Ready for the Exam
- Be ready for the exam (5:08)
Reviews
There are no reviews yet.