وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Certified Information Security Manager: CISM Complete Course

سرفصل های دوره

Complete Information Security Manager CISM Exam Prep - Security Training you need to ace ISACA CISM Exam with Quizzes


1 - Course Overview
  • 1 - Introduction
  • 2 - CISM Overview
  • 3 - Preparing for the Exam

  • 2 - Information Security Governance Enterprise Governance
  • 4 - Domain Overview
  • 5 - Enterprise Governance
  • 6 - Importance of Information Security Governance
  • 7 - Organizational Culture
  • 9 - Organizational Structures Roles and Responsibilities
  • 10 - Steering Committee

  • 3 - Information Security Governance Information Security Strategy
  • 11 - Information Security Strategy
  • 12 - Information Security Strategy Development
  • 13 - Defining Security Objectives
  • 14 - The Desired State
  • 15 - Dynamic Interconnections
  • 16 - Essential Components
  • 17 - Information Governance Frameworks and Standards
  • 18 - Strategic Planning
  • 19 - Risk Assessment and Management
  • 20 - Action Plan to Implement Strategy
  • 21 - Metrics Considerations

  • 4 - Information Risk Assessment Information Risk Assessment
  • 22 - Domain Overview
  • 23 - Risk Identification
  • 24 - Emerging Risks
  • 25 - Risk Management Framework
  • 26 - Emerging Threats
  • 27 - Concept of Vulnerability
  • 28 - Security Baselines
  • 29 - Risk Analysis Evaluation and Assessment
  • 30 - Risk Management with IT Life Cycle
  • 31 - Risk Scenarios
  • 32 - Risk Assessment Process
  • 33 - Other Risk Assessment Approaches
  • 34 - Risk Analysis
  • 35 - Annual Loss Expectancy
  • 36 - Risk Evaluation

  • 5 - Information Risk Assessment Information Risk Response
  • 37 - Information Risk Response
  • 38 - Risk Response Options
  • 39 - Inherent and Residual Risk
  • 40 - Risk and Control Ownership
  • 41 - Risk Communication

  • 6 - Information Security Program Development Management Program Development
  • 42 - Domain Overview
  • 43 - Part A Information Security Program Development
  • 44 - Information Security Program Overview
  • 45 - Essential Elements of an Information Security Program
  • 46 - Applying the Security Program Business Case
  • 47 - Outcomes of Information Security Program Management
  • 48 - Information Security Program Resources
  • 49 - Information Security Program Concepts
  • 50 - Common Information Security Program Challenges
  • 51 - Common Information Security Program Constraints
  • 52 - Information Asset Identification and Classification
  • 53 - Benefits of Classification
  • 54 - Industry Standards and Frameworks
  • 55 - Information Security Management Frameworks
  • 56 - Information Security Framework Components
  • 57 - Information Security Policies Procedures and Guidelines
  • 58 - Standards
  • 59 - Defining an Information Security Program Road Map
  • 60 - Security Program Management and Administrative Activities
  • 61 - Developing an Information Security Program Road Map
  • 62 - Information Security Program Metrics
  • 63 - Security Metrics
  • 64 - Objective of Information Security
  • 65 - Security Program Metrics and Monitoring
  • 66 - Key Attributes of Metrics

  • 7 - Information Security Program Development Management Program Management
  • 67 - Information Security Program Management
  • 68 - Controls and Countermeasures
  • 69 - Control Methods
  • 70 - Control Technology Categories
  • 71 - Technical Security Architecture
  • 72 - Information Security Control Implementation and Integration
  • 73 - Baseline Controls
  • 74 - Information Security Awareness and Training
  • 75 - Integration of the Security Program with IT Operations
  • 76 - Information Security Liaison Responsibilities
  • 77 - Steering Committee
  • 78 - CrossOrganizational Responsibilities
  • 79 - Integration with IT Processes
  • 80 - Benefits of DevOps
  • 81 - Cloud Computing
  • 82 - Management of External Services and Relationships
  • 83 - Recommendations for Outsourcing
  • 84 - Outsourcing Challenges
  • 85 - Information Security Program Communications and Reporting
  • 86 - The PlanDoCheckAct Cycle
  • 87 - Compliance Monitoring and Enforcement
  • 88 - Monitoring Approaches
  • 89 - Measuring Information Security Management Performance
  • 90 - Understanding Metric Worth
  • 91 - Measuring Organizational Awareness
  • 92 - Ongoing Monitoring and Communication

  • 8 - Incident Management Incident Management Readiness
  • 93 - Domain Overview
  • 94 - Incident Management and Incident Response Overview
  • 95 - Goals of Incident Management Practices
  • 96 - Incident Management and Incident Response Plans
  • 97 - Developing Clear Scope and Objectives
  • 98 - Response and Recovery Plan
  • 99 - Detailed Plan of Action for Incident Management
  • 100 - Current State of Incident Response Capability
  • 101 - Developing an Incident Response Plan
  • 102 - Incident Management and Response Teams
  • 103 - Business Impact Analysis
  • 104 - Elements of a Business Impact Analysis
  • 105 - Business Continuity Plan
  • 106 - HighAvailability Considerations
  • 107 - Disaster Recovery Plan
  • 108 - Recovery Sites
  • 109 - IT Facilities Recovery Strategies
  • 110 - Incident Classification Categorization
  • 111 - Incident Management Training Testing and Evaluation
  • 112 - Incident Management Metrics and Indicators
  • 113 - Updating Recovery Plans
  • 114 - Types of Tests

  • 9 - Incident Management Incident Management Operations
  • 115 - Incident Management Operations
  • 116 - Incident Response Technology Foundations
  • 117 - Skills Overview
  • 118 - Incident Investigation and Evaluation
  • 119 - Incident Containment Methods
  • 120 - Incident Eradication and Recovery
  • 121 - Incident Response Plan
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 40888
    حجم: 18592 مگابایت
    مدت زمان: 887 دقیقه
    تاریخ انتشار: 2 آبان 1403
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید