3.88 out of 5
3.88
263 reviews on Udemy

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM)
Instructor:
Stone River eLearning
1,524 students enrolled
English [Auto-generated]
Govern information security policies
Manage risks and ensure compliance to the information security policies
Develop, manage and implement information security program in an organization
Manage incidents related to information security

The Certified Information Security Manager (CISM) course helps the candidates to achieve the CISM certification. The certification is offered by the Information Systems Audit and Control Association (ISACA) to validate the expertise and knowledge of the candidates regarding the relationship between an information security program and the broader business targets. The certification also validates that the candidate has the hands-on knowledge of developing, managing and implementing an information security program for an organization.

CISM certification is a certification by ISACA for experienced Information security management professionals with work experience in developing and managing information security programs. The CISM course covers the four domains of the CISM certification exam. The course is an ideal preparatory course for the students seeking to gain CISM certification as well as the IT security and information security professionals looking to build on their practical experience.

Course Introduction

1
Course Introduction

Download Supporting files here

2
Instructor Introduction

Domain 01 - Information Security Governance

1
Lesson 1: Information Security Governance Overview
2
Information Security Governance Overview Part1
3
Information Security Governance Overview Part2
4
Information Security Governance Overview Part3
5
Information Security Governance Overview Part4
6
Information Security Governance Overview Part5
7
Importance of Information Security Governance Part1
8
Importance of Information Security Governance Part2
9
Outcomes of Information Security Governance Part1
10
Outcomes of Information Security Governance Part2
11
Outcomes of Information Security Governance Part3
12
Outcomes of Information Security Governance Part4
13
Outcomes of Information Security Governance Part5
14
Outcomes of Information Security Governance Part6
15
Lesson 2: Effective Information Security Governance
16
Business Goals and Objectives Part1
17
Business Goals and Objectives Part2
18
Roles and Responsibilities of Senior Management Part1
19
Roles and Responsibilities of Senior Management Part2
20
Domain Tasks Part1
21
Domain Tasks Part2
22
Business Model for Information Security Part1
23
Business Model for Information Security Part2
24
Business Model for Information Security Part3
25
Business Model for Information Security Part4
26
Dynamic Interconnections Part1
27
Dynamic Interconnections Part2
28
Dynamic Interconnections Part3
29
Dynamic Interconnections Part4
30
Lesson 3: Information Security Concepts and Technologies
31
Information Security Concepts and Technologies Part1
32
Information Security Concepts and Technologies Part2
33
Information Security Concepts and Technologies Part3
34
Technologies Part1
35
Technologies Part2
36
Lesson 4: Information Security Manager
37
Responsibilities
38
Senior Management Commitment Part1
39
Senior Management Commitment Part2
40
Obtaining Senior Management Commitment Part1
41
Obtaining Senior Management Commitment Part2
42
Establishing Reporting and Communication Channels Part1
43
Establishing Reporting and Communication Channels Part2
44
Lesson 5: Scope and Charter of Information Security Governance
45
Assurance Process Integration and Convergence
46
Convergence
47
Governance and Third-Party Relationships
48
Lesson 6: Information Security Governance Metrics
49
Metrics
50
Effective Security Metrics Part1
51
Effective Security Metrics Part2
52
Effective Security Metrics Part3
53
Effective Security Metrics Part4
54
Security Implementation Metrics
55
Strategic Alignment Part1
56
Strategic Alignment Part2
57
Risk Management
58
Value Delivery
59
Resource Management Part1
60
Resource Management Part2
61
Performance Measurement
62
Assurance Process Integration/Convergence
63
Lesson 7: Information Security Strategy Overview
64
Another View of Strategy
65
Lesson 8: Creating Information Security Strategy
66
Information Security Strategy
67
Common Pitfalls Part1
68
Common Pitfalls Part2
69
Objectives of the Information Security Strategy
70
What is the Goal?
71
Defining Objectives
72
Business Linkages
73
Business Case Development Part1
74
Business Case Development Part2
75
Business Case Development Part3
76
Business Case Objectives
77
The Desired State
78
COBIT
79
COBIT Controls
80
COBIT Framework
81
Capability Maturity Model
82
Balanced Scorecard
83
Architectural Approaches
84
ISO/IEC 27001 and 27002
85
Risk Objectives Part1
86
Risk Objectives Part2
87
Lesson 9: Determining Current State Of Security
88
Current Risk Part1
89
Current Risk Part2
90
BIA
91
Lesson 10: Information Security Strategy Development
92
The Roadmap
93
Elements of a Strategy
94
Strategy Resources and Constraints
95
Lesson 11: Strategy Resources
96
Policies and Standards
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
3.9
3.9 out of 5
263 Ratings

Detailed Rating

Stars 5
74
Stars 4
103
Stars 3
61
Stars 2
19
Stars 1
7
a9903b5e917fe45aaa6ca105df132c8a
30-Day Money-Back Guarantee

Includes

15 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion