This Course is part of a Career Path: Become a Cyber Security Engineer

Course Content

Module 1: Introduction

04:39
1.1 Is CISM for me
20:03
1.2 Welcome and Intro

Domain 1

12:04
2.1 Introduction
06:47
2.2 Priorities for the CISM
18:54
2.3 Priorities for the CISM Part 2
01:24
2.4 Priorities for the CISM Review Questions
14:43
2.5 Corporate Governance
11:05
2.6 Evaluating the Security Environment
22:42
2.7 Information Security Program
18:03
2.8 Security Strategy
12:20
2.9 Roles and Responsibilities
03:22
2.10 Reporting and Compliance
06:37
2.11 Code of Ethics
06:27
2.12 Summary and Review

Domain 2

10:24
3.1 Risk Management Intro
07:11
3.2 Risk Identification
05:48
3.3 Information Security Program Basics
06:23
3.4 Administrative Controls
05:39
3.5 Asset Threats and Vulnerabilities
06:22
3.6 Risk Register
07:55
3.7 Frameworks
01:58
3.8 Information Security Architecture
10:48
3.9 Risk Scenarios
07:55
3.10 Risk Scenarios Continued
07:31
3.11 Risk Assessment Introduction
06:32
3.12 Examples of Risk Analysis Techniques
03:18
3.13 Risk Assessment
06:03
3.14 BCP and DRP
04:32
3.15 Risk Mitigation Reduction and Avoidance
05:20
3.16 Risk Mitigation Transference and Acceptance
06:49
3.17 Selecting a Mitigation Strategy
07:52
3.18 Types of Mitigating Controls
05:44
3.19 Risk and Control Monitoring and Reporting
10:53
3.20 KRI's
05:24
3.21 Tools for Risk Monitoring

Domain 3

03:01
4.1 Information Security Program and Development
05:48
4.2 Information Security Program Concepts
04:34
4.3 Information Security Program Requirements
02:18
4.4 Essential Elements of an Information Security Program
07:55
4.5 Security Frameworks
03:11
4.6 Purpose of Architecture
05:25
4.7 Information Security Frameworks
07:34
4.8 Security Operations Event Monitoring
07:50
4.9 Secure Engineering and Threat Modeling
06:57
4.10 Protecting the Network-Segmentation
06:14
4.11 Protecting the Network-Wireless Security
06:04
4.12 Protecting the Network-Services
02:49
4.13 Protecting the Network through Detection and Network Access Control
05:12
4.14 Data and Endpoint Security
05:18
4.15 Identity and Access Management
07:17
4.16 Third Party Governance
05:08
4.17 Policies Procedures Standards and Guidelines
08:51
4.18 Certification and Accreditation
03:25
4.19 Domain 3 Wrap-up

Domain 4

06:03
5.1 BCP and DRP
08:04
5.2 Incident Management Processes
05:51
5.3 Roles and Responsibilities
08:46
5.4 Making the case for incident response
09:34
5.5 Developing the Incident Response Plan-Capability Assessment
06:07
5.6 Incident Response Planning Processes
10:39
5.7 Incident Detection Devices
05:51
5.8 BCP steps
06:27
5.9 BCP Intro
09:01
5.10 BCP Step 1
10:25
5.11 Business Impact Analysis Step 2
08:44
5.12 BCP Step 3
03:34
5.13 BCP Step 4
09:04
5.14 BCP Roles and Responsibilities
03:03
5.15 BCP subplans
03:51
5.16 Testing the Plan

Course Description

The Certified Information Security Manager (CISM) certification by ISACA was uniquely designed for cyber security management. This certification ensures that global cyber security and information assurance managers are equipped to prepare their organization with security and assurance best practices throughout all reaches of the organization that interact with any data systems. The CISM is ANSI accredited and has a global position as a leader in the field of information assurance management. The CISM is intentionally limited by ISACA and the exam is only offered in certain locations, a few times per year. This exclusivity help to protects the certification's exclusivity.

More information about the CISM certification and exam can be found on the ISACA website.

In this online course, you will be prepared by a Subject Matter Expert instructor (Kelly Handerhan) to both understand the core concepts, as well as become prepared for the CISM certification exam. This online course assumes that you have experience in the field of information assurance management. This online course is designed for management level security professionals.

About Our Online CISM Training Class

The Certified Information Security Manager is a highly coveted certification within the IT field and can often bring higher pay and faster advancement within an organization. The CISM develops, manages and overseas information security systems and is responsible for developing the best security practices. Cybrary's Certified Information Security Manager (CISM) course is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the IT industry. Common pre-requisites to obtain this certification include five years security experience and appropriate educational background as well as a willingness to agree to the CISM Code of Professional Ethics. Key topics in our online CISM training courses include:

  • Information Security Governance - Information Risk Management and Compliance - Information Security Program Development and Management - Information Security Incident Management CEU / CPE: 10 Total Clock Hours: 7 hrs, 9 min Get a Certificate of Completion### What Does the CISM Online Training Course Entail?

The Certified Information Security Manager (CISM) online training course prepares students for certification to become a CISM, which is a highly-regarded credential in the IT industry. With the certification, employees often earn a higher salary and have more opportunity for advancement within their organizations.

Cybrary's CISM training class cover the following key topics:

  • Information Security Governance - Information Risk Management and Compliance - Information Security Program Development and Management - Information Security Incident Management Once completed, you will have all the tools and knowledge to successfully pass the CISM certification examination, which ensures that you will be equipped to provide your company with security and assurance best practices in all areas of the organization that involves data systems.

This course is taught by a subject matter expert instructor who will teach you to be a management level security professional. The CISM online course is a total of 7 hours and 9 minutes of clock time, and you will receive a Certificate of Completion upon finishing the training.

What are the Prerequisites for the CISM Training Course?

While there are not any prerequisites for the CISM training course, it is required that you have five years of security experience and the appropriate education to obtain certification. It is also required that you agree to the CISM Code of Professional Ethics.

Who Should Take the CISM Training Course?

The CISM online class is designed for IT and information security professionals like network engineers, network administrators, IT auditors, IT managers, and any other individuals in the information technology field who want to learn more about information security management. The intended audience should be individuals who want to advance their careers in IT security or who are interested in earning a CISM certification.

What Does a Certified Information Security Manger Do?

Many corporations and government agencies now require that their information security and information technology professionals have a CISM certification. Ultimately, a Certified Information Security Manager is responsible for ensuring that the information security strategies of an organization are aligned with the business objectives. To achieve that goal, CISMs are often required to:

  • Provide guidance, leadership, and training to information security employees
  • Review, implement, document, and update policies and procedures related to information security for the organization
  • Manage security audits and threat and vulnerability assessments
  • Direct responses to any network or system intrusions
  • Ensure that all legal and contractual information security are compliant with rules and regulations and communicating with executive management via compliance reports and audit findings
  • Detecting and preventing intrusion
  • Implement and manage strategies to protect network security overall
  • Manage the information security team and their every day job expectations
  • Evaluate costs and budget for technology changes
  • Hire new staff and obtain new resources for future technology requirements and projects

Specific responsibilities may differ depending upon the organization, its size, and security needs.

What Is Involved in the CISM Certification Exam?

The CISM certification exam is offered by the Information Systems Audit and Control Association (ISACA) in three testing windows throughout the year. Candidates for certification must prove at least five years of applicable work experience within the last 10 years (you can view exceptions for work experience on the ISACA website).

To successfully pass the CISM certification exam, you must score at least 450 on a 200-800 point scale. This is not a percentage or numeric percentage; the score is a conversion of your raw score to a common scale.

Once you have passed the exam, you can apply for certification if all other requirements are met. Your certification is valid for three years.