
CISM: Certified Information Security Manager Certification Video Training Course
The complete solution to prepare for for your exam with CISM: Certified Information Security Manager certification video training course. The CISM: Certified Information Security Manager certification video training course contains a complete set of videos that will provide you with thorough knowledge to understand the key concepts. Top notch prep including Isaca CISM exam dumps, study guide & practice test questions and answers.
CISM: Certified Information Security Manager Certification Video Training Course Exam Curriculum
Course Introduction
-
1. Course Introduction
Domain 01 - Information Security Governance
-
1. Lesson 1: Information Security Governance Overview
-
2. Information Security Governance Overview Part1
-
3. Information Security Governance Overview Part2
-
4. Information Security Governance Overview Part3
-
5. Information Security Governance Overview Part4
-
6. Information Security Governance Overview Part5
-
7. Importance of Information Security Governance Part1
-
8. Importance of Information Security Governance Part2
-
9. Outcomes of Information Security Governance Part1
-
10. Outcomes of Information Security Governance Part2
-
11. Outcomes of Information Security Governance Part3
-
12. Outcomes of Information Security Governance Part4
-
13. Outcomes of Information Security Governance Part5
-
14. Outcomes of Information Security Governance Part6
-
15. Lesson 2: Effective Information Security Governance
-
16. Business Goals and Objectives Part1
-
17. Business Goals and Objectives Part2
-
18. Roles and Responsibilities of Senior Management Part1
-
19. Roles and Responsibilities of Senior Management Part2
-
20. Domain Tasks Part1
-
21. Domain Tasks Part2
-
22. Business Model for Information Security Part1
-
23. Business Model for Information Security Part2
-
24. Business Model for Information Security Part3
-
25. Business Model for Information Security Part4
-
26. Dynamic Interconnections Part1
-
27. Dynamic Interconnections Part2
-
28. Dynamic Interconnections Part3
-
29. Dynamic Interconnections Part4
-
30. Lesson 3: Information Security Concepts and Technologies
-
31. Information Security Concepts and Technologies Part1
-
32. Information Security Concepts and Technologies Part2
-
33. Information Security Concepts and Technologies Part3
-
34. Technologies Part1
-
35. Technologies Part2
-
36. Lesson 4: Information Security Manager
-
37. Responsibilities
-
38. Senior Management Commitment Part1
-
39. Senior Management Commitment Part2
-
40. Obtaining Senior Management Commitment Part1
-
41. Obtaining Senior Management Commitment Part2
-
42. Establishing Reporting and Communication Channels Part1
-
43. Establishing Reporting and Communication Channels Part2
-
44. Lesson 5: Scope and Charter of Information Security Governance
-
45. Assurance Process Integration and Convergence
-
46. Convergence
-
47. Governance and Third-Party Relationships
-
48. Lesson 6: Information Security Governance Metrics
-
49. Metrics
-
50. Effective Security Metrics Part1
-
51. Effective Security Metrics Part2
-
52. Effective Security Metrics Part3
-
53. Effective Security Metrics Part4
-
54. Security Implementation Metrics
-
55. Strategic Alignment Part1
-
56. Strategic Alignment Part2
-
57. Risk Management
-
58. Value Delivery
-
59. Resource Management Part1
-
60. Resource Management Part2
-
61. Performance Measurement
-
62. Assurance Process Integration/Convergence
-
63. Lesson 7: Information Security Strategy Overview
-
64. Another View of Strategy
-
65. Lesson 8: Creating Information Security Strategy
-
66. Information Security Strategy
-
67. Common Pitfalls Part1
-
68. Common Pitfalls Part2
-
69. Objectives of the Information Security Strategy
-
70. What is the Goal?
-
71. Defining Objectives
-
72. Business Linkages
-
73. Business Case Development Part1
-
74. Business Case Development Part2
-
75. Business Case Development Part3
-
76. Business Case Objectives
-
77. The Desired State
-
78. COBIT
-
79. COBIT Controls
-
80. COBIT Framework
-
81. Capability Maturity Model
-
82. Balanced Scorecard
-
83. Architectural Approaches
-
84. ISO/IEC 27001 and 27002
-
85. Risk Objectives Part1
-
86. Risk Objectives Part2
-
87. Lesson 9: Determining Current State Of Security
-
88. Current Risk Part1
-
89. Current Risk Part2
-
90. BIA
-
91. Lesson 10: Information Security Strategy Development
-
92. The Roadmap
-
93. Elements of a Strategy
-
94. Strategy Resources and Constraints
-
95. Lesson 11: Strategy Resources
-
96. Policies and Standards
-
97. Definitions
-
98. Enterprise Information Security Architectures
-
99. Controls
-
100. Countermeasures
-
101. Technologies
-
102. Personnel
-
103. Organizational Structure
-
104. Employee Roles and Responsibilities
-
105. Skills
-
106. Audits
-
107. Compliance Enforcement
-
108. Threat Assessment
-
109. Vulnerability Assessment
-
110. Risk Assessment
-
111. Insurance
-
112. Business Impact Assessment
-
113. Outsourced Security Providers
-
114. Lesson 12: Strategy Constraints
-
115. Legal and Regulatory Requirements
-
116. Physical Constraints
-
117. The Security Strategy
-
118. Lesson 13: Action Plan to Implement Strategy
-
119. Gap Analysis Part1
-
120. Gap Analysis Part2
-
121. Gap Analysis Part3
-
122. Policy Development Part1
-
123. Policy Development Part2
-
124. Standards Development
-
125. Training and Awareness
-
126. Action Plan Metrics
-
127. General Metric Considerations Part1
-
128. General Metric Considerations Part2
-
129. General Metric Considerations Part3
-
130. General Metric Considerations Part4
-
131. CMM4 Statements
-
132. Objectives for CMM4
-
133. Domain 01 Review
Domain 02 - Information Risk Management
-
1. Lesson 1: Risk Management Overview
-
2. Risk Management Overview
-
3. Types of Risk Analysis
-
4. The Importance of Risk Management
-
5. Risk Management Outcomes
-
6. Risk Management Strategy
-
7. Lesson 2: Good Information Security Risk Management
-
8. Context and Purpose
-
9. Scope and Charter
-
10. Assets
-
11. Other Risk Management Goals
-
12. Roles and Responsibilities
-
13. Lesson 3: Information Security Risk Management Concepts
-
14. Technologies
-
15. Lesson 4: Implementing Risk Management
-
16. The Risk Management Framework
-
17. The External Environment
-
18. The Internal Environment
-
19. The Risk Management Context
-
20. Gap Analysis
-
21. Other Organizational Support
-
22. Risk Analysis
-
23. Lesson 5: Risk Assessment
-
24. NIST Risk Assessment Methodology
-
25. Aggregated or Cascading Risk
-
26. Other Risk Assessment Approaches
-
27. Identification of Risks
-
28. Threats
-
29. Vulnerabilities Part1
-
30. Vulnerabilities Part2
-
31. Risks
-
32. Analysis of Relevant Risks
-
33. Risk Analysis
-
34. Semi -Quantitative Analysis
-
35. Quantitative Analysis Example
-
36. Evaluation of Risks
-
37. Risk Treatment Options
-
38. Impact
-
39. Lesson 6: Controls Countermeasures
-
40. Controls
-
41. Residual Risk
-
42. Information Resource Valuation
-
43. Methods of Valuing Assets
-
44. Information Asset Classification
-
45. Determining Classification
-
46. Impact Part1
-
47. Impact Part2
-
48. Lesson 7: Recovery Time Objectives
-
49. Recovery Point Objectives
-
50. Service Delivery Objectives
-
51. Third-Party Service Providers
-
52. Working with Lifecycle Processes
-
53. IT System Development
-
54. Project Management Part1
-
55. Project Management Part2
-
56. Lesson 8: Risk Monitoring and Communication
-
57. Risk Monitoring and Communication
-
58. Other Communications
-
59. Domain 02 Review
Domain 03 - Information Security Program Development
-
1. Introduction
-
2. Lesson 1: Development of Information Security Program
-
3. Importance of the Program
-
4. Outcomes of Security Program Development
-
5. Effective Information Security Program Development
-
6. Lesson 2: Information Security Program Objectives
-
7. Cross Organizational Responsibilities
-
8. Program Objectives Part1
-
9. Program Objectives Part2
-
10. Defining Objectives Part1
-
11. Defining Objectives Part2
-
12. Lesson 3: Information Security Program Development Concepts Part1
-
13. Information Security Program Development Concepts Part2
-
14. Technology Resources
-
15. Information Security Manager
-
16. Lesson 4: Scope and Charter of Information Security Program Development
-
17. Assurance Function Integration
-
18. Challenges in Developing Information Security Program
-
19. Pitfalls
-
20. Objectives of the Security Program
-
21. Program Goals
-
22. The Steps of the Security Program
-
23. Defining the Roadmap Part1
-
24. Defining the Roadmap Part2
-
25. Elements of the Roadmap Part1
-
26. Elements of the Roadmap Part2
-
27. Elements of the Roadmap Part3
-
28. Elements of the Roadmap Part4
-
29. Elements of the Roadmap Part5
-
30. Gap Analysis
-
31. Lesson 5: Information Security Management Framework
-
32. Security Management Framework
-
33. COBIT 5
-
34. ISO/IEC 27001
-
35. Lesson 6: Information Security Framework Components
-
36. Operational Components Part1
-
37. Operational Components Part2
-
38. Management Components
-
39. Administrative Components
-
40. Educational and Informational Components
-
41. Lesson 7: Information Security Program Resources
-
42. Resources
-
43. Documentation
-
44. Enterprise Architecture Part1
-
45. Enterprise Architecture Part2
-
46. Enterprise Architecture Part3
-
47. Controls as Strategy Implementation Resources Part1
-
48. Controls as Strategy Implementation Resources Part2
-
49. Controls as Strategy Implementation Resources Part3
-
50. Controls as Strategy Implementation Resources Part4
-
51. Common Control Practices
-
52. Countermeasures
-
53. Technologies Part1
-
54. Technologies Part2
-
55. Technologies Part3
-
56. Technologies Part4
-
57. Personnel Part1
-
58. Personnel Part2
-
59. Security Awareness
-
60. Awareness Topics
-
61. Formal Audits
-
62. Compliance Enforcement
-
63. Project Risk Analysis
-
64. Other Actions
-
65. Other Organizational Support
-
66. Program Budgeting Part1
-
67. Program Budgeting Part2
-
68. Lesson 8: Implementing an Information Security Program
-
69. Policy Compliance
-
70. Standards Compliance
-
71. Training and Education
-
72. ISACA Control Objectives
-
73. Third-party Service Providers Part1
-
74. Third-party Service Providers Part2
-
75. Integration into Lifecycle Processes
-
76. Monitoring and Communication
-
77. Documentation
-
78. The Plan of Action Part1
-
79. The Plan of Action Part2
-
80. Lesson 9: Information Infrastructure and Architecture
-
81. Managing Complexity Part1
-
82. Managing Complexity Part2
-
83. Objectives of Information Security Architectures Part1
-
84. Objectives of Information Security Architectures Part2
-
85. Physical and Environmental Controls
-
86. Lesson 10: Information Security Program
-
87. Information Security Program Deployment Metrics
-
88. Metrics
-
89. Strategic Alignment
-
90. Risk Management
-
91. Value Delivery
-
92. Resource Management
-
93. Assurance Process Integration
-
94. Performance Measurement
-
95. Security Baselines
-
96. Lesson 11: Security Program Services and Operational Activities
-
97. IS Liaison Responsibilities Part1
-
98. IS Liaison Responsibilities Part2
-
99. Cross-Organizational Responsibilities
-
100. Security Reviews and Audits Part1
-
101. Security Reviews and Audits Part2
-
102. Management of Security Technology
-
103. Due Diligence Part1
-
104. Due Diligence Part2
-
105. Compliance Monitoring and Enforcement Part1
-
106. Compliance Monitoring and Enforcement Part2
-
107. Assessment of Risk and Impact Part1
-
108. Assessment of Risk and Impact Part2
-
109. Outsourcing and Service Providers
-
110. Cloud Computing Part1
-
111. Cloud Computing Part2
-
112. Cloud Computing Part3
-
113. Integration with IT Processes
-
114. Domain 03 Review
Domain 04 - Information Security Incident Management
-
1. Lesson 1: Incident Management Overview Part1
-
2. Incident Management Overview Part2
-
3. Incident Management Overview Part3
-
4. Types of Events Part1
-
5. Types of Events Part2
-
6. Goals of Incident Management Part1
-
7. Goals of Incident Management Part2
-
8. Goals of Incident Management Part3
-
9. Lesson 2: Incident Response Procedures Part1
-
10. Incident Response Procedures Part2
-
11. Importance of Incident Management
-
12. Outcomes of Incident Management
-
13. Incident Management
-
14. Concepts Part1
-
15. Concepts Part2
-
16. Concepts Part3
-
17. Incident Management Systems Part1
-
18. Incident Management Systems Part2
-
19. Lesson 3: Incident Management Organization
-
20. Responsibilities Part1
-
21. Responsibilities Part2
-
22. Responsibilities Part3
-
23. Senior Management Commitment
-
24. Lesson 4: Incident Management Resources
-
25. Policies and Standards
-
26. Incident Response Technology Concepts
-
27. Personnel
-
28. Roles and Responsibilities (eNotes)
-
29. Skills
-
30. Awareness and Education
-
31. Audits
-
32. Lesson 5: Incident Management Objectives
-
33. Defining Objectives
-
34. The Desired State
-
35. Strategic Alignment
-
36. Other Concerns
-
37. Lesson 6: Incident Management Metrics and Indicators
-
38. Implementation of the Security Program Management
-
39. Management Metrics and Monitoring Part1
-
40. Management Metrics and Monitoring Part2
-
41. Other Security Monitoring Efforts
-
42. Lesson 7: Current State of Incident Response Capability
-
43. Threats
-
44. Vulnerabilities
-
45. Lesson 8: Developing an Incident Response Plan
-
46. Elements of an Incident Response Plan
-
47. Gap Analysis
-
48. BIA Part1
-
49. BIA Part2
-
50. Escalation Process for Effective IM
-
51. Help Desk Processes for Identifying Security Incidents
-
52. Incident Management and Response Teams
-
53. Organizing, Training, and Equipping the Response Staff
-
54. Incident Notification Process
-
55. Challenges in making an Incident Management Plan
-
56. Lesson 9: BCP/DRP
-
57. Goals of Recovery Operations Part1
-
58. Goals of Recovery Operations Part2
-
59. Choosing a Site Selection Part1
-
60. Choosing a Site Selection Part2
-
61. Implementing the Strategy
-
62. Incident Management Response Teams
-
63. Network Service High-availability
-
64. Storage High-availability
-
65. Risk Transference
-
66. Other Response Recovery Plan Options
-
67. Lesson 10: Testing Response and Recovery Plans
-
68. Periodic Testing
-
69. Analyzing Test Results Part1
-
70. Analyzing Test Results Part2
-
71. Measuring the Test Results
-
72. Lesson 11: Executing the Plan
-
73. Updating the Plan
-
74. Intrusion Detection Policies
-
75. Who to Notify about an Incident
-
76. Recovery Operations
-
77. Other Recovery Operations
-
78. Forensic Investigation
-
79. Hacker / Penetration Methodology
-
80. Domain 04 Review
-
81. Course Closure
About CISM: Certified Information Security Manager Certification Video Training Course
CISM: Certified Information Security Manager certification video training course by prepaway along with practice test questions and answers, study guide and exam dumps provides the ultimate training package to help you pass.
The Certified Information Security Manager certification, popular by the name CISM, is a professional course that includes the area of audit. Sponsored by the Information Systems Audit and Control Association, also known as ISACA, the credential is mostly opted by the professionals who want to prove their judgment and exceptional skills in IS audit, security, and control profession of the CISM exam. The ISACA CISM certificate training is designed to provide you with all the aces to clear the exam at the first attempt.
The key features of the course are that it comes with merely 16 hours of e-learning content with high quality, which also includes a single practice test. The course also offers you 16 CPEs.
Description
The ISACA CISM certification is a management focused course that is promoted by the security practices. It also helps in recognizing the person who is managing the designs and also oversees the assessment of the information security of the enterprise. This advanced certificate provides with validation to the candidates who have claimed that they have the experience and the knowledge that is required to manage and develop the information security program of any enterprise. The certification is mainly designed to provide information to the security managers, IT consultants, aspiring managers, etc. who come with a helping hand to information security program management.
Objectives of the CISM course
- To give proper definition to architecture, designing, and managing of the security of any organization he works with.
- To acquire required knowledge and skills for clearing the CISM certification exam.
- To exhibit a deep understanding of the bonding between the various information security programs and expand the business goals along with its objectives.
- To earn the essential 16 CPEs to obtain the CISM certification exam.
- To develop the knowledge of working for nearly 4 domain areas as designed by the ISACA exam candidate information guide 2015.
Benefits of the CISM certification
- Recognizes the obtaining advance job skills that are required for becoming an information security professional.
- Gives a global recognition by the designation of an information security manager.
- Provides access to the important resources like idea exchanging and peer networking.
- Confirms profession from commitment.
Eligibility
- The individual appearing for the exam must comply with the code of ISACA following the professional ethics.
- The candidate should have an experience of 5 years of working in the field of information security.
- The individual willing to apply for the course should also have 10 years of experience of the work before applying for the exams, related to the application data.
- As a supplement, the candidate can also have an experience of 5 years from the date of passing the exams on the initial stage.
- Out of 5 years, 3 years of the experience should be obtained by performing on the post of information security manager.
Syllabus of the CISM
- Information security governance
- Information security program development and management
- Information risk management and compliance
- Information security incident management
Professionals who can select this course:
- Security consultant
- Security manager
- IT manager / Director
- Security Architect / Auditor
- Security systems engineer
- Chief information security officer
- Information security managers
- IT/IS consultants
- Chief Privacy/Compliance or risk officers
Target audience
- Professionals from science and technology field
- Individuals looking for improvement in Business security program management
- Individuals willing to learn about security and risk management with an advanced level
Conclusion
The ISACA CISM course is a globally recognized certification that comes with advanced skills, which hold prime importance when it comes to information security professional. The certificate holders of the CISM exam are capable to earn with a range of $131,443 to $122,954 on yearly basis in the initial stage. The individual can now also learn about the course through videos that are offered online and offline for effective learning.
Prepaway's CISM: Certified Information Security Manager video training course for passing certification exams is the only solution which you need.
Pass Isaca CISM Exam in First Attempt Guaranteed!
Get 100% Real Exam Questions, Accurate & Verified Answers As Seen in the Real Exam!
30 Days Free Updates, Instant Download!

CISM Premium Bundle
- Premium File 1519 Questions & Answers. Last update: Feb 25, 2021
- Training Course 51 Lectures
- Study Guide 822 Pages
Download 25 Sample Questions that you WILL see in your Isaca CISM exam.
OR
Guarantee your success by buying the full version which covers the full latest pool of questions.
(1519 Questions, Last Updated on Feb 25, 2021)
Free CISM Exam Questions & Isaca CISM Dumps | ||
---|---|---|
Isaca.examlabs.cism.v2021-02-12.by.noah.954q.ete |
Views: 88
Downloads: 7
|
Size: 1.27 MB
|
Isaca.prep4sure.cism.v2020-10-30.by.elizabeth.911q.ete |
Views: 359
Downloads: 113
|
Size: 1.22 MB
|
Isaca.real-exams.cism.v2020-05-23.by.arthur.723q.ete |
Views: 601
Downloads: 301
|
Size: 1.01 MB
|
Isaca.certkiller.cism.v2020-04-11.by.grayson.674q.ete |
Views: 539
Downloads: 220
|
Size: 970.76 KB
|
Isaca.train4sure.cism.v2020-01-18.by.giovanni.691q.ete |
Views: 621
Downloads: 276
|
Size: 1018.18 KB
|
Isaca.Train4sure.Cism.v2018-01-10.by.barbara.378qs.ete |
Views: 2841
Downloads: 1416
|
Size: 677.44 KB
|
Student Feedback
Comments * The most recent comment are at the top
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.
Registration is Free and Easy, You Simply need to provide an email address.
- Trusted By 1.2M IT Certification Candidates Every Month
- Hundreds Hours of Videos
- Instant download After Registration
A confirmation link will be sent to this email address to verify your login.
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register
very nice right the answer in certification training .