وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
4

Certified Information Security Manager: CISM Complete Course

سرفصل های دوره

Complete Information Security Manager CISM Exam Prep - Security Training you need to ace ISACA CISM Exam with Quizzes


1 - Course Overview
  • 1 - Introduction
  • 2 - CISM Overview
  • 3 - Preparing for the Exam

  • 2 - Information Security Governance Enterprise Governance
  • 4 - Domain Overview
  • 5 - Enterprise Governance
  • 6 - Importance of Information Security Governance
  • 7 - Organizational Culture
  • 9 - Organizational Structures Roles and Responsibilities
  • 10 - Steering Committee

  • 3 - Information Security Governance Information Security Strategy
  • 11 - Information Security Strategy
  • 12 - Information Security Strategy Development
  • 13 - Defining Security Objectives
  • 14 - The Desired State
  • 15 - Dynamic Interconnections
  • 16 - Essential Components
  • 17 - Information Governance Frameworks and Standards
  • 18 - Strategic Planning
  • 19 - Risk Assessment and Management
  • 20 - Action Plan to Implement Strategy
  • 21 - Metrics Considerations

  • 4 - Information Risk Assessment Information Risk Assessment
  • 22 - Domain Overview
  • 23 - Risk Identification
  • 24 - Emerging Risks
  • 25 - Risk Management Framework
  • 26 - Emerging Threats
  • 27 - Concept of Vulnerability
  • 28 - Security Baselines
  • 29 - Risk Analysis Evaluation and Assessment
  • 30 - Risk Management with IT Life Cycle
  • 31 - Risk Scenarios
  • 32 - Risk Assessment Process
  • 33 - Other Risk Assessment Approaches
  • 34 - Risk Analysis
  • 35 - Annual Loss Expectancy
  • 36 - Risk Evaluation

  • 5 - Information Risk Assessment Information Risk Response
  • 37 - Information Risk Response
  • 38 - Risk Response Options
  • 39 - Inherent and Residual Risk
  • 40 - Risk and Control Ownership
  • 41 - Risk Communication

  • 6 - Information Security Program Development Management Program Development
  • 42 - Domain Overview
  • 43 - Part A Information Security Program Development
  • 44 - Information Security Program Overview
  • 45 - Essential Elements of an Information Security Program
  • 46 - Applying the Security Program Business Case
  • 47 - Outcomes of Information Security Program Management
  • 48 - Information Security Program Resources
  • 49 - Information Security Program Concepts
  • 50 - Common Information Security Program Challenges
  • 51 - Common Information Security Program Constraints
  • 52 - Information Asset Identification and Classification
  • 53 - Benefits of Classification
  • 54 - Industry Standards and Frameworks
  • 55 - Information Security Management Frameworks
  • 56 - Information Security Framework Components
  • 57 - Information Security Policies Procedures and Guidelines
  • 58 - Standards
  • 59 - Defining an Information Security Program Road Map
  • 60 - Security Program Management and Administrative Activities
  • 61 - Developing an Information Security Program Road Map
  • 62 - Information Security Program Metrics
  • 63 - Security Metrics
  • 64 - Objective of Information Security
  • 65 - Security Program Metrics and Monitoring
  • 66 - Key Attributes of Metrics

  • 7 - Information Security Program Development Management Program Management
  • 67 - Information Security Program Management
  • 68 - Controls and Countermeasures
  • 69 - Control Methods
  • 70 - Control Technology Categories
  • 71 - Technical Security Architecture
  • 72 - Information Security Control Implementation and Integration
  • 73 - Baseline Controls
  • 74 - Information Security Awareness and Training
  • 75 - Integration of the Security Program with IT Operations
  • 76 - Information Security Liaison Responsibilities
  • 77 - Steering Committee
  • 78 - CrossOrganizational Responsibilities
  • 79 - Integration with IT Processes
  • 80 - Benefits of DevOps
  • 81 - Cloud Computing
  • 82 - Management of External Services and Relationships
  • 83 - Recommendations for Outsourcing
  • 84 - Outsourcing Challenges
  • 85 - Information Security Program Communications and Reporting
  • 86 - The PlanDoCheckAct Cycle
  • 87 - Compliance Monitoring and Enforcement
  • 88 - Monitoring Approaches
  • 89 - Measuring Information Security Management Performance
  • 90 - Understanding Metric Worth
  • 91 - Measuring Organizational Awareness
  • 92 - Ongoing Monitoring and Communication

  • 8 - Incident Management Incident Management Readiness
  • 93 - Domain Overview
  • 94 - Incident Management and Incident Response Overview
  • 95 - Goals of Incident Management Practices
  • 96 - Incident Management and Incident Response Plans
  • 97 - Developing Clear Scope and Objectives
  • 98 - Response and Recovery Plan
  • 99 - Detailed Plan of Action for Incident Management
  • 100 - Current State of Incident Response Capability
  • 101 - Developing an Incident Response Plan
  • 102 - Incident Management and Response Teams
  • 103 - Business Impact Analysis
  • 104 - Elements of a Business Impact Analysis
  • 105 - Business Continuity Plan
  • 106 - HighAvailability Considerations
  • 107 - Disaster Recovery Plan
  • 108 - Recovery Sites
  • 109 - IT Facilities Recovery Strategies
  • 110 - Incident Classification Categorization
  • 111 - Incident Management Training Testing and Evaluation
  • 112 - Incident Management Metrics and Indicators
  • 113 - Updating Recovery Plans
  • 114 - Types of Tests

  • 9 - Incident Management Incident Management Operations
  • 115 - Incident Management Operations
  • 116 - Incident Response Technology Foundations
  • 117 - Skills Overview
  • 118 - Incident Investigation and Evaluation
  • 119 - Incident Containment Methods
  • 120 - Incident Eradication and Recovery
  • 121 - Incident Response Plan
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 40888
    حجم: 18592 مگابایت
    مدت زمان: 887 دقیقه
    تاریخ انتشار: ۲ آبان ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید