وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

CISM – Certified Information Security Manager Full Training

سرفصل های دوره

Prepare for ISACA CISM Exam


1. Course Introduction
  • 1. Meet the Instructor
  • 2. Have a Question Here how to get in touch
  • 3. Rating is Caring
  • 4. Getting the Course Completion Certificate

  • 2. Security Foundations for Security Managers
  • 1. CIA Triad and the Security Objectives
  • 2. Privacy and Security
  • 3. Cyber Kill Chain
  • 4. Cyber Attacks
  • 5. MiTM
  • 6. Malware and Cyber Threats
  • 7. Password Attacks and Rainbow Tables

  • 3. Domain 1 - Security Governance
  • 1. Security Manager Roles
  • 2. Organisational Structure
  • 3. Why Information Security Governance
  • 4. Governance vs Management
  • 5. RACI Matrix
  • 6. Data Owner and Data Custodian
  • 7. Strategy, Goals and Business Alignment
  • 8. Data LifeCycle
  • 9. Data Retention and Disposal
  • 10. Legal regulations and Standards
  • 11. Maturity Assessment Models and PDCA
  • 12. Governance Frameworks
  • 13. IT Balanced Score Card
  • 14. Polices
  • 15. Example of Policies
  • 16. Standards
  • 17. Policies and Standards Review
  • 18. Procedures and Guidelines
  • 19. Security Investment - CAPEX and OPEX, ROI & ROSI
  • 20. Portfolio and Financial Management

  • 4. Domain 2 - Risk Management
  • 1. Risk Management Overview
  • 2. Types of Risk
  • 3. Risk Analysis Evaluation
  • 4. Risk Response
  • 5. Risk Monitoring
  • 6. Key Risk Indicators
  • 7. Risk Management Frameworks
  • 8. Security Controls
  • 9. Types of Security Controls
  • 10. Control Objective
  • 11. Control Objective
  • 12. Controls Assessment and Defence in Depth
  • 13. Understand the Security Layers in Corporate Networks
  • 14. Network Security using Segmentation
  • 15. Firewalls and IPS
  • 16. DMZ and Bastian Host
  • 17. Proxy, Load Balance and Email Security
  • 18. Network Access Control
  • 19. Endpoint Protection Platform

  • 5. Domain 3 - Security Program Development
  • 1. Business Case
  • 2. Enterprise Architecture
  • 3. Social Engineering
  • 4. Security Awareness
  • 5. Personnel Security Measures
  • 6. Software Development Methodologies
  • 7. Secure Coding and Software Development Best Practices
  • 8. DevOps
  • 9. DevSecOps
  • 10. Security Testing and Assessment
  • 11. Security Testing and Assessment - SAST, DAST, SCA
  • 12. Threat Model Overview
  • 13. Threat Model - STRIDE and DREAD
  • 14. AAA Overview
  • 15. MFA and Bio metric Authentication
  • 16. Cryptography Overview
  • 17. Symmetric Encryption
  • 18. Asymmetric Encryption
  • 19. Asymmetric Encryption Use Cases
  • 20. Digital Signature
  • 21. Hashing
  • 22. Public Key Infrastructure
  • 23. Outsourcing and Third Party Management
  • 24. Supply Chain Risk Management
  • 25. System Organization Controls - SOC Audit and Report
  • 26. Physical Security and Facility Design
  • 27. Physical Access Controls
  • 28. CCTV and Facility Monitoring
  • 29. Data and Perimeter Security
  • 30. Securing Power Sources
  • 31. Fire Suppression System

  • 6. Domain 4 - Incident Response and Manageent
  • 1. Incident Management Overview
  • 2. Forensic Investigation and Evidence Collection
  • 3. Problem Management
  • 4. Incident Response Testing and Evaluation
  • 5. Incident Response Training
  • 6. What is Disasters and What is BIA
  • 7. Disaster Recovery Plan
  • 8. Business Continuity Plan
  • 9. Developing BCP and DRP
  • 10. RPO and RTO
  • 11. AIW, SDO, MTO
  • 12. RTO, RPO, MTO relations
  • 13. Recovery Strategies
  • 14. Reciprocal Agreement
  • 15. Testing and Evaluating the BCP and DRP
  • 16. Data Backup
  • 17. Backup Types
  • 18. SOC
  • 19. SIEM
  • 20. EDR and NDR
  • 21. XDR and SOAR
  • 22. Vulnerability Assessment Software
  • 23. Threat Intelligence and MITRE Framework
  • 24. Help Desk and Ticketing System
  • 25. Change Management Overview
  • 26. Types of Changes
  • 27. Configuration Management
  • 28. Patch Management
  • 29. Release Management
  • 30. Virtualisation Concepts
  • 31. Cloud Computing Overview
  • 32. Containerisation Technology and Server-less Computing

  • 7. What is Next
  • 1. Register and Appear for the CISM Exam.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 19007
    حجم: 4956 مگابایت
    مدت زمان: 885 دقیقه
    تاریخ انتشار: ۲۰ شهریور ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید