Video description
18+ hours of video training to prepare you for the CISM certification exam
Overview:
The Pearson Complete Course for CISM Certification offers 18 hours of targeted training to help you get the skills you need to successfully study for the CISM exam. Taught by expert author and trainer Sari Greene, the course covers the four main domains of the CISM exam: Information Security Governance, Information Security Risk Management, Information Security Program Development and Management and Incident Management. The course is also a great resource for anyone who wants to enhance their cybersecurity skills to grow their career.
The Pearson Complete Course for CISM Certification will enable you to learn the skills to design, deploy and manage security policies. The course starts with a basic introduction of the exam modules and topic domains before diving deeper into the main modules which incorporate real-world scenarios and practical applications. Each lesson concludes with a review and a quiz, giving you the opportunity to test what you have learned in the lesson. The course also provides tips and valuable information on how to answer questions and ace the CISM certification exam.
This accessible self-paced video training provides learners with more than 18 hours of in-depth exam topic assessment from one of the leading cybersecurity experts to review each exam objective, so you can use it as a complete study tool for taking the CISM certification exam.
Topics include:
Module 1: Information Security Governance
Module 2: Information Security Risk Management
Module 3: Information Security Program Development & Management
Module 4: Incident Management
Module 5: Attaining Your Certification
Skill Level:Learn How To:- Govern information and cybersecurity fundamentals
- Strategize information strategy
- Manage information security risk
- Manage penetration testing
- Develop and manage InfoSec program ecosystem
- Design and implement wireless connectivity, firewalls, and encryption
- Manage malware and social engineering
Who Should Take This Course:- Primary audience is anyone preparing for the ISACA CISM certification examination.
- Secondary audience is anyone would be like to enhance their cybersecurity skills.
About Pearson Video Training:
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Table of Contents
Introduction
Introduction
Module 1: Information Security Governance
Module introduction
Lesson 1: Enterprise Governance
Learning objectives
1.1 Information and Cybersecurity Fundamentals
1.2 Information Security Governance
1.3 Governance Roles and Responsibilities
1.4 Governance Documents
1.5 Regulatory and Compliance Requirements
1.6 Organizational and Professional Ethics
1.7 Lesson 1 Review and Quiz
Lesson 2: Information Security Strategy
Learning objectives
2.1 Strategy Development
2.2 Information Security Governance Frameworks
2.3 Building a Business Case
2.4 Metrics and Indicators
2.5 Audit and Assurance
2.6 Lesson 2 Review and Quiz
In the Boardroom: Information Security Strategy
Module 2: Information Security Risk Management
Module introduction
Lesson 3: Risk Landscape
Learning objectives
3.1 Risk Concepts
3.2 Vulnerability Identification
3.3 Penetration Testing
3.4 Threat Actors and Attributes
3.5 Threat Modeling
3.6 Lesson 3 Review and Quiz
Lesson 4: Risk Management
Learning objectives
4.1 Risk Governance
4.2 Risk Assessment
4.3 Risk Analysis
4.4 Risk Response
4.5 Risk Monitoring
4.6 Lesson 4 Review and Quiz
In the Boardroom: Information Risk Assessment
Module 3: Information Security Program Development and Management
Module introduction
Lesson 5: Information Security Program Development
Learning objectives
5.1 InfoSec Program Ecosystem
5.2 Information Security Frameworks and Benchmarks
5.3 Information Security Metrics
5.4 SETA Principles and Practices
5.5 Lesson 5 Review and Quiz
Lesson 6: Information Security Program Management
Learning objectives
6.1 Asset Classification
6.2 Controls and Countermeasures
6.3 Control Baselines
6.4 Configuration Management
6.5 Change Control
6.6 Vulnerability and Patch Management
6.7 SDLC and Collaboration
6.8 Cloud Computing
6.9 Vendor and Supply Chain Management
6.10 Lesson 6 Review and Quiz
Lesson 7: Secure Design and Implementation
Learning objectives
7.1 Secure Design Principles
7.2 Security Zones
7.3 Wireless Connectivity
7.4 Firewalls
7.5 Network Access Control
7.6 Access Control Management
7.7 Cryptographic Primer
7.8 Encryption
7.9 Hashing and Digital Signatures
7.10 PKI and Digital Certificates
7.11 Secure Protocols
7.12 Site and Building Security
7.13 Lesson 7 Review and Quiz
In the Boardroom: Secure Design and Implementation
Module 4: Incident Management
Module introduction
Lesson 8: Incident Management
Learning objectives
8.1 Incident Management Planning
8.2 Business Impact Analysis
8.3 Resiliency Concepts
8.4 Backup and Recovery
8.5 Security Incident Response Planning
8.6 Disaster Recovery and Business Continuity Planning
8.7 Plan Readiness
8.8 Lesson 8 Review and Quiz
Lesson 9: Attack Vectors
Learning objectives
9.1 Malware
9.2 Social Engineering
9.3 Digital Infrastructure Attacks
9.4 Validation Attacks
9.5 Environmental Impact
9.6 Lesson 9 Review and Quiz
Lesson 10: Security Incident Response
Learning objectives
10.1 Incident Response
10.2 Detection and Response Tools
10.3 Evidence Handling
10.4 Forensic Examination
10.5 Disclosure and Notification
10.6 Lesson 10 Review and Quiz
In the Boardroom: Incident Detection and Response
Module 5: Attaining Your Certification
Module introduction
Lesson 11: Attaining Your CISM Certification
Learning objectives
11.1 Test Taking Strategies
11.2 Test Day Expectations and Requirements
11.3 The Certification Process
Summary
Summary