Course name:
Certified Information Security Manager (CISM)
IT Security is without question one of the hottest and most lucrative areas of Information Technology today and the CISM is one of the most valued credentials in the marketplace.
40 Hours
Information Security Professionals
Information Security
Course outline:
<p>IT Security is without question one of the hottest and most lucrative areas of Information Technology today, and the CISM is one of the most valued credentials in the marketplace. This course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or CIO.</p> <p>The uniquely management-focused certification promotes international security practices and recognizes the individual who manages designs and oversees and assesses an enterprise&rsquo;s information security.</p> <p>The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities.</p> <p>CISM is globally-recognized as the leading credential for information security managers. Our CISM Certified Information Security Manager course provides the student with the knowledge and proficiency to prepare for the CISM certification exam.</p> <p>This course includes in-depth coverage of the four domains that make up the "Body of Knowledge" portion of the CISM exam. This course will provide students with the tools to build their technical skills, as well as manage, design, oversee, and assess an enterprise's information security</p> <p>Learning Objective&nbsp;</p> <p>Students will gain necessary knowledge and experience to provide effective security management. It will prepare the students to pass the exam.</p> <p>Outline</p> <p>Module 1: Information Security Governance</p> <p>1.1 C I S M Introduction</p> <p>1.2 Information Security</p> <p>1.3 Business Goals Objectives And Functions</p> <p>1.4 Business Goals And Information Security</p> <p>1.5 Information Security Threats</p> <p>1.6 Information Security Management</p> <p>1.7 Identity Management</p> <p>1.8 Data Protection</p> <p>1.9 Network Security</p> <p>1.10 Personnel Security</p> <p>1.11 Facilty Security</p> <p>1.12 Security Complianceand Standards</p> <p>1.13 Information Security Strategy</p> <p>1.14 Inputs And Outputs Of The Informtion Security Strategy</p> <p>1.15 Processes In An Information Security Strategy</p> <p>1.16 People In An Information Security Strategy</p> <p>1.17 Technologies In An Information Security Strategy</p> <p>1.18 Logical And Physical Information Security Strategy Architectures</p> <p>1.19 Information Security And Business Functions</p> <p>1.20 Information Security Policies And Enterprise Objectives</p> <p>1.21 International Standards For The Security Management</p> <p>1.22 I S O- I E C27000 Standards</p> <p>1.23 International Info Government Standards</p> <p>1.24 Information Security Government Standards In The United States</p> <p>1.25 Methods Of Coordinating Information Security Activities</p> <p>1.26 How To Develop An Information Security Strategy</p> <p>1.27 Information Security Governance</p> <p>1.28 Role Of The Security In Governance</p> <p>1.29 Scope Of Information Security Governance</p> <p>1.30 Charter Of Information Security Governance</p> <p>1.31 Information Security Governance And Enterprise Governance</p> <p>1.32 How To Align Information Security Strategy With Corporate Governance</p> <p>1.33 Regulatory Requirements And Information Security</p> <p>1.34 Business Impact Of Regulatory Requirements</p> <p>1.35 Liability Management</p> <p>1.36 Liability Management Strategies</p> <p>1.37 How To Identify Legal And Regulatory Requirements</p> <p>1.38 Business Case Development</p> <p>1.39 Budgetary Reporting Methods</p> <p>1.40 Budgetary Planning Strategy</p> <p>1.41 How To Justify Investment In InfOSecurity</p> <p>1.42 Organizational Drivers</p> <p>1.43 Impact Of Drivers On InfOSecurity</p> <p>1.44 Third Party Relationships</p> <p>1.45 How To Identify Drivers Affecting The Organization</p> <p>1.46 Purpose Of Obtaining Commitment To InfOSecurity</p> <p>1.47 Methods For Obtaining Commitment</p> <p>1.48 I S S G</p> <p>1.49 I S S G Roles And Responsibilities</p> <p>1.50 I S S G Operation</p> <p>1.51 How To Obtain Senior Managements Commitment To InfOSecurity</p> <p>1.52 InfOSecurity Management Roles And Responsibilities</p> <p>1.53 How To Define Roles And Responsibilities For InfOSecurity</p> <p>1.54 The Need For Reporting And Communicating</p> <p>1.55 Methods For Reporting In An Organization</p> <p>1.56 Methods Of Communication In An Organization</p> <p>1.57 How To Establish Reporting And Communicating Channels</p> <p>&nbsp;</p> <p>Module 2: Risk Management</p> <p>2.1 Risk</p> <p>2.2 Risk Assessment</p> <p>2.3 Info Threat Types</p> <p>2.4 Info Vulnerabilities</p> <p>2.5 Common Points Of Exposure</p> <p>2.6 InfOSecurity Controls</p> <p>2.7 Types Of InfOSecurity Controls</p> <p>2.8 Common InfOSecurity Countermeasures</p> <p>2.9 Overview Of The Risk Assessment Process</p> <p>2.10 Factors Used In Risk Assessment And Analysis</p> <p>2.11 Risk Assessment Methodologies</p> <p>2.12 Quantitative Risk Assessment- Part1</p> <p>2.13 Quantitative Risk Assessment- Part2</p> <p>2.14 Qualitative Risk Assessment</p> <p>2.15 Hybrid Risk Assessment</p> <p>2.16 Best Practices For InfOSecurity Management</p> <p>2.17 Gap Analysis</p> <p>2.18 How To Implement An Info Risk Assessment Process</p> <p>2.19 Info Classification Schemas</p> <p>2.20 Components Of Info Classification Schemas</p> <p>2.21 Info Ownership Schemas</p> <p>2.22 Components Of Info Ownership Schemas</p> <p>2.23 Info Resource Valuation</p> <p>2.24 Valuation Methodologies</p> <p>2.25 How To Determine Info Asset Classification And Ownership</p> <p>2.26 Baseline Modeling</p> <p>2.27 Control Requirements</p> <p>2.28 Baseline Modeling And Risk Based Assessment Of Control Requirements</p> <p>2.29 How To Conduct Ongoing Threat And Vulnerability Evaluations</p> <p>2.30 B I As</p> <p>2.31 B I A Methods</p> <p>2.32 Factors For Determining Info Resource Sensitivity And Critically</p> <p>2.33 Impact Of Adverse Events</p> <p>2.34 How To Conduct Periodic B I As</p> <p>2.35 Methods For Measuring Effectiveness Of Controls And Countermeasures</p> <p>2.36 Risk Mitigation</p> <p>2.37 Risk Mitigation Strategies</p> <p>2.38 Effect Of Implementing Risk Mitigation Strategies</p> <p>2.39 Acceptable Levels Of Risk</p> <p>2.40 Cost Benefit Analysis</p> <p>2.41 How To Identify And Evaluate Risk Mitigation Strategies</p> <p>2.42 Life Cycle Processes</p> <p>2.43 Life Cycle- Based Risk Management</p> <p>2.44 Risk Management Life Cycle</p> <p>2.45 Business Life Cycle Processes Affected By Risk Management</p> <p>2.46 Life Cycled- Based Risk Management Principles And Practices</p> <p>2.47 How To Integrate Risk Management Into Business Life Cycle Processes</p> <p>2.48 Significant Changes</p> <p>2.49 Risk Management Process</p> <p>2.50 Risk Reporting Methods</p> <p>2.51 Components Of Risk Reports</p> <p>2.52&nbsp; How To Report Changes In Info Risk</p> <p>&nbsp;</p> <p>Module 3: Information Security Program Development</p> <p>3.1 InfOSecurity Strategies</p> <p>3.2 Common InfOSecurity Strategies</p> <p>3.3 InfOSecurity Implementation Plans</p> <p>3.4 Conversation Of Strategies Into Implementation Plans</p> <p>3.5 InfOSecurity Programs</p> <p>3.6 InfOSecurity Program Maintenance</p> <p>3.7 Methods For Maintaining An InfOSecurity Program</p> <p>3.8 Succession Planning</p> <p>3.9 Allocation Of Jobs</p> <p>3.10 Program Documentation</p> <p>3.11 How To Develop Plans To Implement An InfOSecurity Strategy</p> <p>3.12 Security Technologies And Controls</p> <p>3.13 Cryptographic Techniques</p> <p>3.14 Symmetric Cryptography</p> <p>3.15 Public Key Cryptography</p> <p>3.16 Hashes</p> <p>3.17 Access Control</p> <p>3.18 Access Control Categories</p> <p>3.19 Physical Access Controls</p> <p>3.20 Technical Access Controls</p> <p>3.21 Administrative Access Controls</p> <p>3.22 Monitoring Tools</p> <p>3.23 I D Ss</p> <p>3.24 Anti- Virus Systems</p> <p>3.25 Policy- Compliance Systems</p> <p>3.26 Common Activities Required In InfOSecurity Programs</p> <p>3.27 Prerequisites For Implementing The Program</p> <p>3.28 Implementation Plan Management</p> <p>3.29 Types Of Security Controls</p> <p>3.30 InfOSecurity Controls Development</p> <p>3.31 How TOSpecify InfOSecurity Program Activities</p> <p>3.32 Business Assurance Function</p> <p>3.33 Common Business Assurance Functions</p> <p>3.34 Methods For Aligning InfOSecurity Program With Business Assurance Functions</p> <p>3.35 How To Coordinate InfOSecurity Programs With Business Assurance Functions</p> <p>3.36 S L As</p> <p>3.37 Internal Resources</p> <p>3.38 External Resources</p> <p>3.39 Services Provided By External Resources- Part1</p> <p>3.40 Services Provided By External Resources- Part2</p> <p>3.41 Skills Commonly Required For InfOSecurity Program Implementation</p> <p>3.42 Identification Of Resources And Skills Required For A Particular Implementation</p> <p>3.43 Resource Acquisition Methods</p> <p>3.44 Skills Acquisition Methods</p> <p>3.45 How To Identify Resources Needed For InfOSecurity Program Implementation</p> <p>3.46 InfOSecurity Architectures</p> <p>3.47 The S A B S A Model For Security Architecture</p> <p>3.48 Deployment Considerations</p> <p>3.49 Deployment Of InfOSecurity Architectures</p> <p>3.50 How To Develop InfOSecurity Architectures</p> <p>3.51 InfOSecurity Policies</p> <p>3.52 Components Of InfOSecurity Policies</p> <p>3.53 InfOSecurity Policies And The InfOSecurity Strategy</p> <p>3.54 InfOSecurity Policies And Enterprise Business Objectives</p> <p>3.55 InfOSecurity Policy Development Factors</p> <p>3.56 Methods For Communicating InfOSecurity Policies</p> <p>3.57 InfOSecurity Policy Maintenance</p> <p>3.58 How To Develop InfOSecurity Policies</p> <p>3.59 InfOSecurity Awareness Program Training Programs And Education Programs</p> <p>3.60 Security Awareness Training And Education Gap Analysis</p> <p>3.61 Methods For Closing The Security Awareness Training And Education Gaps</p> <p>3.62 Security- Based Cultures And Behaviors</p> <p>3.63 Methods For Establishing And Maintaining A Security- Based Culture In The Enterprise</p> <p>3.64 How To Develop InfOSecurity Awareness Training And Education Programs</p> <p>3.65 Supporting Documentation For InfOSecurity Policies</p> <p>3.66 Standards Procedures Guidelines And Baselines</p> <p>3.67 Codes Of Conduct</p> <p>3.68 N D As</p> <p>3.69 Methods For Developing Supporting Documentation</p> <p>3.70 Methods For Implementing Supporting Documentation And For Communicating Supporting Documentation</p> <p>3.71 Methods For Maintaining Supporting Documentation</p> <p>3.72 C And A</p> <p>3.73 C And A Programs</p> <p>3.74 How To Develop Supporting Documentation For InfOSecurity Policies</p> <p>&nbsp;</p> <p>Module 4: Information Security Program Implementation</p> <p>4.1 Enterprise Business Objectives</p> <p>4.2 Integrating Enterprise Business Objectives And InfOSecurity Policies</p> <p>4.3 Organizational Processes</p> <p>4.4 Change Control</p> <p>4.5 Merges And Acquisitions</p> <p>4.6 Organizational Processes And InfOSecurity Policies</p> <p>4.7 Methods For Integrating InfOSecurity Policies And Organizational Processes</p> <p>4.8 Life Cycle Methodologies</p> <p>4.9 Types Of Life Cycle Methodologies</p> <p>4.10 How To Integrate InfOSecurity Requirements Into Organizational Processes</p> <p>4.11 Types Of Contracts Affected By InfOSecurity Programs</p> <p>4.12 Joint Ventures</p> <p>4.13 Outsourced Provides And InfOSecurity</p> <p>4.14 Business Partners And InfOSecurity</p> <p>4.15 Customers And InfOSecurity</p> <p>4.16 Third Party And InfOSecurity</p> <p>4.17 Risk Management</p> <p>4.18 Risk Management Methods And Techniques For Third Parties</p> <p>4.19 S L As And InfOSecurity</p> <p>4.20 Contracts And InfOSecurity</p> <p>4.21 Due Diligence And InfOSecurity</p> <p>4.22 Suppliers And InfOSecurity</p> <p>4.23 Subcontractors And InfOSecurity</p> <p>4.24 How To Integrate InfOSecurity Controls Into Contracts</p> <p>4.25 InfOSecurity Metrics</p> <p>4.26 Types Of Metrics Commonly Used For InfOSecurity</p> <p>4.27 Metric Design Development And Implementation</p> <p>4.28 Goals Of Evaluating InfOSecurity Controls</p> <p>4.29 Methods Of Evaluating InfOSecurity Controls</p> <p>4.30 Vulnerability Testing</p> <p>4.31 Types Of Vulnerability Testing</p> <p>4.32 Effects Of Vulnerability Assessment And Testing</p> <p>4.33 Vulnerability Correction</p> <p>4.34 Commercial Assessment Tools</p> <p>4.35 Goals Of Tracking InfOSecurity Awareness Training And Education Programs</p> <p>4.36 Methods For Tracking InfOSecurity Awareness Training And Education Programs</p> <p>4.37 Evaluation Of Training Effectiveness Relevance</p> <p>4.38 How To Create InfOSecurity Program Evaluation Metrics</p> <p>Module 5: Information Security Program Management</p> <p>&nbsp;</p> <p>5.1 Management Metrics</p> <p>5.2 Types Of Management Metrics</p> <p>5.3 Data Collection</p> <p>5.4 Periodic Reviews</p> <p>5.5 Monitoring Approaches</p> <p>5.6 K P Is</p> <p>5.7 Types Of Measurements</p> <p>5.8 Other Measurements</p> <p>5.9 InfOSecurity Reviews</p> <p>5.10 The Role Of Assurance Providers</p> <p>5.11 Comparing Internal And External Assurance Providers</p> <p>5.12 Line Management Technique</p> <p>5.13 Budgeting</p> <p>5.14 Staff Management</p> <p>5.15 Facilities</p> <p>5.16 How To Manage InfOSecurity Program Resources</p> <p>5.17 Security Policies</p> <p>5.18 Security Policy Components</p> <p>5.19 Implementation Of InfOSecurity Policies</p> <p>5.20 Administrative Processes And Procedures</p> <p>5.21 Access Control Types</p> <p>5.22 A C M</p> <p>5.23 Access Security Policy Principles</p> <p>5.24 Identity Management And Compliance</p> <p>5.25 Authentication Factors</p> <p>5.26 Remote Access</p> <p>5.27 User Registration</p> <p>5.28 Procurement</p> <p>5.29 How To Enforce Policy And Standards Compliance</p> <p>5.30 Types Of Third Party Relationships</p> <p>5.31 Methods For Managing InfOSecurity Regarding Third Parties</p> <p>5.32 Security Service Providers</p> <p>5.33 Third Party Contract Provisions</p> <p>5.34 Methods To Define Security Requirements In S L As Security Provisions</p> <p>5.35 How To Enforce Contractual InfOSecurity Controls</p> <p>5.36 S D L C</p> <p>5.37 Code Development</p> <p>5.38 Common Techniques For Security Enforcement</p> <p>5.39 How To Enforce InfOSecurity During Systems Development</p> <p>5.40 Maintenance</p> <p>5.41 Methods Of Monitoring Security Activities</p> <p>5.42 Impact Of Change And Configuration Management Activities</p> <p>5.43 How To Maintain InfOSecurity Within An Organization</p> <p>5.44 Due Diligence Activities</p> <p>5.45 Types Of Due Diligence Activities</p> <p>5.46 Reviews Of Info Access</p> <p>5.47 Standards Of Managing And Controlling Info Access</p> <p>5.48 How To Provide InfOSecurity Advice And Guidance</p> <p>5.49 InfOSecurity Awareness</p> <p>5.50 Types Of InfOSecurity Stakeholders</p> <p>5.51 Methods Of Stakeholder Education</p> <p>5.52 Security Stakeholder Education Process</p> <p>5.53 How To Provide InfOSecurity Awareness And Training</p> <p>5.54 Methods Of Testing The Effectiveness Of InfOSecurity Control</p> <p>5.55 The Penetration Testing Process</p> <p>5.56 Types Of Penetration Testing</p> <p>5.57 Password Cracking</p> <p>5.58 Social Engineering Attacks</p> <p>5.59 Social Engineering Types</p> <p>5.60 External Vulnerability Reporting Sources</p> <p>5.61 Regulatory Reporting Requirements</p> <p>5.62 Internal Reporting Requirements</p> <p>5.63 How To Analyze The Effectiveness Of InfOSecurity Controls</p> <p>5.64 Noncompliance Issues</p> <p>5.65 Security Baselines</p> <p>5.66 Events Affecting The Security Baseline</p> <p>5.67 InfOSecurity Problem Management Process</p> <p>5.68 How To Resolve Noncompliance Issues</p> <p>&nbsp;</p> <p>Module 6: Incident Management and Response</p> <p>6.1 Incident Response Capability</p> <p>6.2 Components Of Incident Response</p> <p>6.3 B C P</p> <p>6.4 B I A Phase</p> <p>6.5 Coop</p> <p>6.6 D R P</p> <p>6.7 Alternate Sites</p> <p>6.8 Develop A B C P</p> <p>6.9 Develop A D R P</p> <p>6.10 M T D</p> <p>6.11 R P O</p> <p>6.12 R T O</p> <p>6.13 Data Backup Strategies</p> <p>6.14 Data Backup Types</p> <p>6.15 Data Restoration Strategies</p> <p>6.16 Info Incident Management Practices</p> <p>6.17 I R P</p> <p>6.18 Trigger Events And Types Of Trigger Events</p> <p>6.19 Methods Of Containing Damage</p> <p>6.20 How To Develop An I R P</p> <p>6.21 Escalation Process</p> <p>6.22 Notification Process</p> <p>6.23 I R T</p> <p>6.24 Crisis Communication</p> <p>6.25 How To Establish An Escalation Process</p> <p>6.26 Internal Reporting Requirements</p> <p>6.27 External Reporting Requirements</p> <p>6.28 Communication Process</p> <p>6.29 How To Develop A Communication Process</p> <p>6.30 I R P And D R P</p> <p>6.31 I R P And B C P</p> <p>6.32 Methods Of Identifying Business Resources Essential To Recovery</p> <p>6.33 How To Integrate An I R P</p> <p>6.34 Role Of Primary I R T Members And Role Of Additional I R T Members</p> <p>6.35 Response Team Tools And Equipment</p> <p>6.36 How To Develop I R Ts</p> <p>6.37 B C P Testing</p> <p>6.38 Disaster Recovery Testing</p> <p>6.39 Schedule Disaster Recovery Testing</p> <p>6.40 Refine I R P</p> <p>6.41 How To Test An I R P</p> <p>6.42 Damage Assessment</p> <p>6.43 Business Impacts Caused By Security Incidents</p> <p>6.44 How To Manage Responses To InfOSecurity Incidents</p> <p>6.45 Computer And Digital Forensics</p> <p>6.46 Forensic Requirements For Responding To InfOSecurity Incidents</p> <p>6.47 Evidence Life Cycle</p> <p>6.48 Evidence Collection</p> <p>6.49 Evidence Types</p> <p>6.50 Five Common Rules Of Evidence</p> <p>6.51 Chain Of Custody</p> <p>6.52 How To Investigate An InfOSecurity Incident</p> <p>6.53 P I R Methods</p> <p>6.54 Security Incident Review Process</p> <p>6.55 Investigate Cause Of A Security Incident</p> <p>6.56 Identify Corrective Actions</p> <p>6.57 Reassess Security Risks After A Security Incident</p> <p>6.58 How To Conduct A Post- Incident Review</p> <p>6.59 Pre Test- Test Strategy</p> <p>6.60 Post Test</p>

Copyright © 2011-2014 Aziksa Inc, All rights reserved.