Are you ready to take your information security career to the next level? The Certified Information Security Manager (CISM) certification is the gold standard for information security professionals who want to demonstrate their skills and knowledge in managing and governing information security programs.
In the first chapter of your CISM adventure, you’ll explore the fascinating realm of Information Security Governance. We’ll guide you through crafting governance frameworks that will form the backbone of any secure organisation. Imagine yourself as the guardian of digital fortresses, ensuring that every piece of data is safeguarded with precision and care. With creativity and strategy, you’ll become the architect of robust security policies and frameworks.
As you progress through the course, you’ll dive deep into the intricate world of Information Risk Management. Picture yourself as the master of risk assessment, identifying vulnerabilities and threats that may lurk in the digital shadows. With your newfound knowledge, you can proactively mitigate risks, fortifying your organisation’s defences against cyberattacks. It’s a thrilling journey of strategy and foresight.
But that’s not all. In this adventure, you’ll also develop the expertise needed to create and nurture Information Security Programs. Imagine yourself as the captain of a cyber ship, charting a course towards a secure digital future. Our course will equip you with the practical skills to design, implement, and maintain effective security programs that align with best practices.
Join us in this transformative journey, where you’ll gain knowledge that will set you apart in the world of cybersecurity. Let your creativity shine as you become a Certified Information Security Manager, ready to take on the challenges of the digital age and safeguard the digital realms of businesses worldwide.
Learning outcome
Understand the tenets of Information Security Governance.
Develop competencies in Information Risk Management.
Design robust Information Security Programs.
Address and mitigate security incidents effectively.
Lead and influence organizational security policies.
Stay ahead of potential threats with proactive measures.
Drive the alignment of security initiatives with business goals.
Scope and Charter of Information Security Governance
00:10:00
Information Security Governance Metrics
00:23:00
Information Security Strategy Overview
00:02:00
Creating Information Security Strategy
00:36:00
Determining Current State Of Security
00:06:00
Information Security Strategy Development
00:10:00
Strategy Resources
00:40:00
Strategy Constraints
00:07:00
Action Plan to Implement Strategy
00:20:00
Information Risk Management
Risk Management Overview
00:16:00
Good Information Security Risk Management
00:15:00
Information Security Risk Management Concepts
00:13:00
Implementing Risk Management
00:17:00
Risk Assessment
00:39:00
Controls Countermeasures
00:23:00
Recovery Time Objectives
00:18:00
Risk Monitoring and Communication
00:04:00
Information Security Program Development
Development of Information Security Program
00:11:00
Information Security Program Objectives
00:09:00
Information Security Program Development Concepts
00:14:00
Scope and Charter of Information Security Program Development
00:22:00
Information Security Management Framework
00:16:00
Information Security Framework Components
00:12:00
Information Security Program Resources
01:04:00
Implementing an Information Security Program
00:27:00
Information Infrastructure and Architecture
00:14:00
Information Security Program
00:14:00
Security Program Services and Operational Activities
00:45:00
Information Security Incident Management
Incident Management Overview
00:28:00
Incident Response Procedures
00:29:00
Incident Management Organization
00:19:00
Incident Management Resources
00:36:00
Incident Management Objectives
00:14:00
Incident Management Metrics and Indicators
00:17:00
Current State of Incident Response Capability
00:11:00
Developing an Incident Response Plan
00:32:00
BCP DRP
00:36:00
Testing Response and Recovery Plans
00:10:00
Executing the Plan
00:27:00
Mock Exam
Mock Exam- Certified Information Security Manager (CISM) – Complete Video Course
00:20:00
Final Exam
Final Exam- Certified Information Security Manager (CISM) – Complete Video Course
00:20:00
Order Your Certificate
Order Your Certificate
00:00:00
Don't just take our word for it
Amazing workshop.
Very informative for the freshers like me. Learned a lot of things about digital marketing. I'm really thankful.
Aarini Sinha
It was a great experience. The course was jampacked with excellent information. And when I needed help, Skill-up helped me with technical problems instantly. Fast feedback.
Varsha Sivamohan
I am currently signed on to several courses with skill up. I have just finished my second one. The courses are informative and good for all types of learners. I recommend them.
Judith Taylor
The support team was FANTASTIC!!! Very quick to respond and even though I was nervous as I am not good at tests, they made me feel comfortable.
I am very grateful for the support
Charlie Anderson
Completed the Level 3 Mental Health Support Worker course, very good and highly recommend it.
Very good course, enjoyed it thoroughly and important in my line of work as a Support worker.
Parmjit Dosanjh
I am pleased to have completed my online course in Mental Health First Aid with SkillUp. All the modules were detailed & comprehensive with review questions, which really helped me to grasp the information & prepared me well for the mock test & final exam.
Shan
I was a bit nervous about the course but I gave a try,it's perfect and I still can't believe I paid a peanut to acquire such a course,the sliding show and introduction was well understood.i will recommend skill up to anyone interested to persuade a meaningful career,and also to the support team keep doing the good work.💪
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.