Course Highlights
Are you ready to take your information security career to the next level? The Certified Information Security Manager (CISM) certification is the gold standard for information security professionals who want to demonstrate their skills and knowledge in managing and governing information security programs.
In the first chapter of your CISM adventure, you’ll explore the fascinating realm of Information Security Governance. We’ll guide you through crafting governance frameworks that will form the backbone of any secure organisation. Imagine yourself as the guardian of digital fortresses, ensuring that every piece of data is safeguarded with precision and care. With creativity and strategy, you’ll become the architect of robust security policies and frameworks.
As you progress through the course, you’ll dive deep into the intricate world of Information Risk Management. Picture yourself as the master of risk assessment, identifying vulnerabilities and threats that may lurk in the digital shadows. With your newfound knowledge, you can proactively mitigate risks, fortifying your organisation’s defences against cyberattacks. It’s a thrilling journey of strategy and foresight.
But that’s not all. In this adventure, you’ll also develop the expertise needed to create and nurture Information Security Programs. Imagine yourself as the captain of a cyber ship, charting a course towards a secure digital future. Our course will equip you with the practical skills to design, implement, and maintain effective security programs that align with best practices.
Join us in this transformative journey, where you’ll gain knowledge that will set you apart in the world of cybersecurity. Let your creativity shine as you become a Certified Information Security Manager, ready to take on the challenges of the digital age and safeguard the digital realms of businesses worldwide.
Learning outcome
- Understand the tenets of Information Security Governance.
- Develop competencies in Information Risk Management.
- Design robust Information Security Programs.
- Address and mitigate security incidents effectively.
- Lead and influence organizational security policies.
- Stay ahead of potential threats with proactive measures.
- Drive the alignment of security initiatives with business goals.
Course media
Why should I take this course?
- Elevate your profile in the booming field of Information Security.
- Equip yourself with sought-after skills, making you a vital asset to companies.
- Learn from content tailored to cater to the challenges of today’s digital era.
- Boost your confidence in handling security incidents.
- Gain a competitive edge in the cybersecurity job market.
Career Path
- Information Security Analyst
- Risk Management Specialist
- Information Security Program Director
- Incident Response Coordinator
- Cybersecurity Consultant
- Information Governance Officer
Requirements
- Familiarity with basic IT concepts.
- Passion for enhancing organizational security.
- Dedication to continuous learning in a dynamic field.
Course Curriculum
-
Information Security Governance Overview00:25:00
-
Effective Information Security Governance00:24:00
-
Information Security Concepts and Technologies00:20:00
-
Information Security Manager00:09:00
-
Scope and Charter of Information Security Governance00:10:00
-
Information Security Governance Metrics00:23:00
-
Information Security Strategy Overview00:02:00
-
Creating Information Security Strategy00:36:00
-
Determining Current State Of Security00:06:00
-
Information Security Strategy Development00:10:00
-
Strategy Resources00:40:00
-
Strategy Constraints00:07:00
-
Action Plan to Implement Strategy00:20:00
-
Risk Management Overview00:16:00
-
Good Information Security Risk Management00:15:00
-
Information Security Risk Management Concepts00:13:00
-
Implementing Risk Management00:17:00
-
Risk Assessment00:39:00
-
Controls Countermeasures00:23:00
-
Recovery Time Objectives00:18:00
-
Risk Monitoring and Communication00:04:00
-
Development of Information Security Program00:11:00
-
Information Security Program Objectives00:09:00
-
Information Security Program Development Concepts00:14:00
-
Scope and Charter of Information Security Program Development00:22:00
-
Information Security Management Framework00:16:00
-
Information Security Framework Components00:12:00
-
Information Security Program Resources01:04:00
-
Implementing an Information Security Program00:27:00
-
Information Infrastructure and Architecture00:14:00
-
Information Security Program00:14:00
-
Security Program Services and Operational Activities00:45:00
-
Incident Management Overview00:28:00
-
Incident Response Procedures00:29:00
-
Incident Management Organization00:19:00
-
Incident Management Resources00:36:00
-
Incident Management Objectives00:14:00
-
Incident Management Metrics and Indicators00:17:00
-
Current State of Incident Response Capability00:11:00
-
Developing an Incident Response Plan00:32:00
-
BCP DRP00:36:00
-
Testing Response and Recovery Plans00:10:00
-
Executing the Plan00:27:00
-
Mock Exam- Certified Information Security Manager (CISM) – Complete Video Course00:20:00
-
Final Exam- Certified Information Security Manager (CISM) – Complete Video Course00:20:00
-
Order Your Certificate
14-Day Money-Back Guarantee
-
Duration:15 hours, 24 minutes
-
Access:1 Year
-
Units:46
Want to get everything for £149
Take Lifetime Pack