CISM - Certified Information Security Manager - Mohamed Atef

CISM - Certified Information Security Manager - Mohamed Atef. Get CISM Certified easilyThe CISM certification from ISACA is a program developed for informa...

New SunLurn v2024

Store URL: https://SunLurn.one

21.000+ INSTANT DOWNLOAD PRODUCT

$38.00 $150.00

Digital Download Immediately

 CISM - Certified Information Security Manager - Mohamed AtefCISM - Certified Information Security Manager - Mohamed Atef


Get CISM Certified easily

The CISM certification from ISACA is a program developed for information security managers ,information security professionals and individual who are planning to move to information security management.

Our CISM program will combine the achievement of passing a comprehensive exam with recognition of work with the skills needed to work as Information Security managers and will allow you to clear the CISM exam from the first attempt and get certified with globally recognized certificate.

This course will cover the 4 information security domains with in-depth coverage of the information covering and will provide the students with a lot of real life scenarios and a library of templates with the full support from the instructor.

Download unlimited when you buy CISM - Certified Information Security Manager - Mohamed Atef Course at sunlurn. The market leader in online learning - Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO - Traffic, …

Course Curriculum

Materials and extra resources

  • How to get access to the students portal (3:28)

Introduction

  • Introduction (9:39)
  • Course Outline (8:01)
  • Course Structure (5:44)

Background

  • Background needed (4:40)
  • GRC- Governance, Risk, Compliance (10:35)
  • Senior Management and GRC (7:23)
  • Senior Management and Risk (6:38)
  • Organization Structure (5:23)

Domain 1 : Information Security Governance

  • Introduction to Security Concepts (13:33)
  • Business Goals and Objective (4:53)
  • Information Security Governance (4:09)
  • CIA Triad (5:40)
  • Information Security components (4:00)
  • Security Program Objectives (5:48)
  • Information Security Governance Output. (2:48)
  • Define roles and responsibilities (3:49)
  • GRC (1:18)
  • Governace of Third party (1:28)
  • Establish, monitor, evaluate and report metrics (5:50)

Domain 2 : Information Risk Management and Compliance

  • What is Risk (11:59)
  • Asset Evaluation (18:28)
  • Information Asset Register (7:58)
  • Classification Schemes (4:34)
  • Risk Register (3:20)
  • Alligment of Risk Asemment and BIA (4:03)
  • Business Impact Analysis - BIA (10:09)
  • Ethics Issue (5:29)
  • Control Types (2:56)
  • Control Catagory (3:51)
  • Evaluate information security controls (3:53)

Domain 3 : Information Security Program Development and Management

  • Establish and maintain the information security program (5:18)
  • Information Security Program Element (3:03)
  • Access Control (6:45)
  • Authorization (19:19)
  • Authentication (18:46)
  • IDS (6:53)
  • Firewall (10:38)
  • Cryptography (16:26)
  • Symetric Encryptian (12:38)
  • Asymetric Encryptian (13:47)
  • Network Arch1 (17:04)
  • Hashing (6:05)

Domain 4 : Information Security Incident Management

  • Information Security Incident Managment (10:06)
  • Incident Repsonse Team (6:50)
  • Incident Report (4:11)
  • BCP- DRP (1:24)
  • BCP (14:32)
  • BIA (10:09)
  • MTD-RTO-RPO (11:39)
  • DRP (3:29)
  • Alternative Sites (8:05)

Get Ready for the Exam

  • Be ready for the exam (5:08)