The Certified Information Security Manager (CISM) is a globally recognized certification offered by ISACA, designed for professionals aiming to establish and manage enterprise information security programs. This certification is particularly valuable for individuals in managerial roles within information security, as it focuses on governance, risk management, program development, and incident.
Module 1: Introduction to Information Technology and Security Fundamental Overview of Information Technology Components of a Computer: Hardware and Software Basics of Computer Architecture Networking Fundamentals Understanding Data and Cybersecurity Basics Types of Hackers Common Cybersecurity Threats and Best Practices.
Module 2: Foundations of Information Security Management Defining Information Security, IT Security, and Cybersecurity Governance and its Role in Security Governance vs. Management Organizational Structure and Segregation of Duties Conflict of Interest Avoidance and Defense in Depth Introduction to Governance, Risk Management, and Compliance (GRC).
Module 3: Governance, Risk Management, and Compliance (GRC) GRC Role in Information Security Activities Related to GRC and Information Security Cybersecurity vs. Information.
Module 4: Security Governance Frameworks What is Security Governance? Security Governance Activities SWOT and GAP Analysis Core Questions in GAP Analysis Organizational Finances CIA Triad (Confidentiality, Integrity, and Availability) and its Expansion (DAD).
Module 5: Data Protection and Compliance Introduction to Cyber Risk Management Risk Management Strategies and Processes Risk Levels, Assessment, and Analysis Risk Evaluation and Registers NIST 800-30 Framework Risk Response Strategies: Avoid, Transfer, Mitigate,
Module 6: Information Security Program Development and Management Information Security Programs Security Awareness and Training Managing the Information Security TeamManaging the Security Budget Integrating Security with Other
Module 7: Security Assessment and Testing Vulnerability Management Security Vulnerabilities Penetration Testing Training and.
Module 8: Cybersecurity Technology Endpoint Security Network Security Cloud Computing Security Cryptography Code Security Identity and Access.
Module 9: Business Continuity and Disaster Recovery Configuring RAID Taking an Incremental Backup Taking.
Module 10: Risk Monitoring and Security Control Risk Monitoring and Key Risk Indicators (KRI) Types of Security Controls: Preventive, Deterrent, Corrective Information Technology General Controls (ITGC).
Mobile: 9100348679
Email: coursedivine@gmail.com
You cannot copy content of this page