Course Highlights
Are you ready to take your information security career to the next level? The Certified Information Security Manager (CISM) certification is the gold standard for information security professionals who want to demonstrate their skills and knowledge in managing and governing information security programs.
In the first chapter of your CISM adventure, you’ll explore the fascinating realm of Information Security Governance. We’ll guide you through crafting governance frameworks that will form the backbone of any secure organisation. Imagine yourself as the guardian of digital fortresses, ensuring that every piece of data is safeguarded with precision and care. With creativity and strategy, you’ll become the architect of robust security policies and frameworks.
As you progress through the course, you’ll dive deep into the intricate world of Information Risk Management. Picture yourself as the master of risk assessment, identifying vulnerabilities and threats that may lurk in the digital shadows. With your newfound knowledge, you can proactively mitigate risks, fortifying your organisation’s defences against cyberattacks. It’s a thrilling journey of strategy and foresight.
But that’s not all. In this adventure, you’ll also develop the expertise needed to create and nurture Information Security Programs. Imagine yourself as the captain of a cyber ship, charting a course towards a secure digital future. Our course will equip you with the practical skills to design, implement, and maintain effective security programs that align with best practices.
Join us in this transformative journey, where you’ll gain knowledge that will set you apart in the world of cybersecurity. Let your creativity shine as you become a Certified Information Security Manager, ready to take on the challenges of the digital age and safeguard the digital realms of businesses worldwide.
Learning outcome
- Understand the tenets of Information Security Governance.
- Develop competencies in Information Risk Management.
- Design robust Information Security Programs.
- Address and mitigate security incidents effectively.
- Lead and influence organizational security policies.
- Stay ahead of potential threats with proactive measures.
- Drive the alignment of security initiatives with business goals.
Course media
Why should I take this course?
- Elevate your profile in the booming field of Information Security.
- Equip yourself with sought-after skills, making you a vital asset to companies.
- Learn from content tailored to cater to the challenges of today’s digital era.
- Boost your confidence in handling security incidents.
- Gain a competitive edge in the cybersecurity job market.
Career Path
- Information Security Analyst
- Risk Management Specialist
- Information Security Program Director
- Incident Response Coordinator
- Cybersecurity Consultant
- Information Governance Officer
Requirements
- Familiarity with basic IT concepts.
- Passion for enhancing organizational security.
- Dedication to continuous learning in a dynamic field.
Course Curriculum
-
Information Security Governance Overview
00:25:00
-
Effective Information Security Governance
00:24:00
-
Information Security Concepts and Technologies
00:20:00
-
Information Security Manager
00:09:00
-
Scope and Charter of Information Security Governance
00:10:00
-
Information Security Governance Metrics
00:23:00
-
Information Security Strategy Overview
00:02:00
-
Creating Information Security Strategy
00:36:00
-
Determining Current State Of Security
00:06:00
-
Information Security Strategy Development
00:10:00
-
Strategy Resources
00:40:00
-
Strategy Constraints
00:07:00
-
Action Plan to Implement Strategy
00:20:00
-
Risk Management Overview
00:16:00
-
Good Information Security Risk Management
00:15:00
-
Information Security Risk Management Concepts
00:13:00
-
Implementing Risk Management
00:17:00
-
Risk Assessment
00:39:00
-
Controls Countermeasures
00:23:00
-
Recovery Time Objectives
00:18:00
-
Risk Monitoring and Communication
00:04:00
-
Development of Information Security Program
00:11:00
-
Information Security Program Objectives
00:09:00
-
Information Security Program Development Concepts
00:14:00
-
Scope and Charter of Information Security Program Development
00:22:00
-
Information Security Management Framework
00:16:00
-
Information Security Framework Components
00:12:00
-
Information Security Program Resources
01:04:00
-
Implementing an Information Security Program
00:27:00
-
Information Infrastructure and Architecture
00:14:00
-
Information Security Program
00:14:00
-
Security Program Services and Operational Activities
00:45:00
-
Incident Management Overview
00:28:00
-
Incident Response Procedures
00:29:00
-
Incident Management Organization
00:19:00
-
Incident Management Resources
00:36:00
-
Incident Management Objectives
00:14:00
-
Incident Management Metrics and Indicators
00:17:00
-
Current State of Incident Response Capability
00:11:00
-
Developing an Incident Response Plan
00:32:00
-
BCP DRP
00:36:00
-
Testing Response and Recovery Plans
00:10:00
-
Executing the Plan
00:27:00
-
Mock Exam- Certified Information Security Manager (CISM) – Complete Video Course
00:20:00
-
Final Exam- Certified Information Security Manager (CISM) – Complete Video Course
00:20:00
-
Order Your Certificate
Offer Ends in

-
Duration:15 hours, 24 minutes
-
Access:1 Year
-
Units:46

