Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
CISM: Information Security Governance (Part 1) $74.95
CISM: Information Security Governance (Part 2) $74.95
CISM: Information Security Governance (Part 3) $74.95
CISM: Information Risk Management and Compliance (Part 1) $74.95
CISM: Information Risk Management and Compliance (Part 2) $74.95
CISM: Information Security Incident Management (Part 1) $74.95
CISM: Information Security Incident Management (Part 2) $74.95

Bundle Price: $239.00
Total Savings: $285.65


CISM: Information Security Governance (Part 1)

Information Security Governance is a major part of the job role of an Information Security Manager. The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations. This course looks at the role of information security governance in an organization, the need for senior management support for all policies and procedures that are put in place, the actual role the information security manager, and the core principles and metrics that are used at part of this process. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
  • identify the tasks within the information security governance job practice area
  • recognize the outcomes of information security governance
  • recognize the difference between corporate governance and information security governance
  • match senior management roles with their corresponding responsibilities related to information security governance
  • identify the elements of the information security business model
  • recognize the interconnections between the elements of the information security business model
  • recognize key concepts related to information security governance
  • identify the optimal reporting relationship between senior management and the information security manager
  • label examples of reports about information security according to their intended recipients within an organization
  • identify the goal of converging security-related functions
  • identify categories of key goal indicators
  • recognize key concepts related to information security management

CISM: Information Security Governance (Part 2)

Many companies realize that their information security is not in the state that it should be. As an information security manager, it will be your role to guide your organization to where information-related risks are controlled and sound information security processes are being followed by each and every employee. In order to move a company from a current state, to a desired state, there are many steps that must be taken. This course examines what an information security strategy is, frameworks and models you can use to build your strategy, who the strategy participants are, and constraints that may stand in your way. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
  • match the key participants in developing an information security strategy with their corresponding responsibilities
  • recognize appropriate models for developing an information security strategy
  • label examples of pitfalls that organizations may encounter as they develop an information security strategy
  • assess the effectiveness of a given management team's efforts to develop an information security strategy
  • recognize questions that an information strategy should answer
  • recognize two types of objectives an information security strategy should have
  • identify the key elements of a business case for an information security program
  • recognize key concepts related to approaches for determining the desired state of security
  • identify the aspects of security that must be assessed when determining the current state
  • identify the components of a roadmap for achieving security objectives
  • match constraints that must be considered when developing an information security strategy to their corresponding descriptions
  • assess the efforts of a given management team to create a roadmap for its information security strategy

CISM: Information Security Governance (Part 3)

In order for information security governance to succeed, there must be an action plan put into place to lay the groundwork for success. This course examines the assets, departments, resources, and people that play a role in bringing an action plan to life. This course will also examine the components and constraints of an action plan, along with providing a sample information security strategy to bring it all together. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
  • match organizational resources with descriptions of how they are used in developing an information security strategy
  • distinguish between policies, standards, procedures, and guidelines
  • match employee-related resources with descriptions of how they impact development of an information security strategy
  • identify risk-related resources that become part of an information security strategy
  • match strategies for addressing risk to corresponding examples
  • recognize key concepts related to information security strategy resources
  • match the components of an information security action plan with their corresponding roles within the strategy
  • identify types of metrics used to monitor progress toward achieving information security objectives
  • match indicators that security objectives have been met with their corresponding descriptions
  • recognize the key facts about the components of an information security strategy

CISM: Information Risk Management and Compliance (Part 1)

Information risk management and compliance is a pivotal part of the role of an information security manager. This course will provide an overview of information risk management and compliance, as well as examine the elements that come into play when creating an information risk management plan and the frameworks and methodologies that are used. This course also examines risk assessment, with special attention to methods of risk identification, risk analysis, compliance, and the calculations used for risk impact analysis. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
  • identify the tasks within the information risk management job practice area
  • identify the outcomes of risk management
  • sequence the steps in planning a risk management program
  • recognize the qualities of a good risk management plan
  • match roles in risk management program development with their corresponding responsibilities
  • recognize the steps of the risk management process
  • distinguish between the concepts of risk management, risk analysis, and risk assessment
  • recognizing activities of the risk management program planning process
  • associate steps in the risk management process with specific outcomes of an effective risk management program
  • label examples as either threats or vulnerabilities
  • recognize examples of risk categories
  • recognize the process for conducting a semiquantitative risk analysis
  • match quantitative risk analysis methods with their corresponding descriptions
  • match common risk assessment methodologies with corresponding descriptions
  • recognize risk assessment concepts
  • perform quantitative risk analysis, given a scenario

CISM: Information Risk Management and Compliance (Part 2)

Analysis, mitigation, and monitoring play an extremely important role in information risk management and compliance. This course examines how to properly classify and valuate information assets, perform a business impact analysis, and the principles of disaster recovery. You will learn about the options available to deal with risk, effective controls, and ways to ensure your risk management program is integrated into your organization's other life-cycle processes. You will also examine the many responsibilities of an Information Security Manager related to risk monitoring and reporting. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
  • identify examples of information assets that should be valuated
  • match valuation methods with corresponding examples
  • recognize how to classify information assets
  • match disaster recovery terms with their corresponding definitions
  • recognize considerations related to outsourcing security services to a third-party provider
  • determine information asset valuation methodologies used by a given information security manager
  • perform information asset classification
  • distinguish between examples of RTOs and RPOs
  • match risk treatment options with corresponding examples of their use
  • classify examples of controls
  • identify types of controls
  • recognize considerations when planning controls and countermeasures
  • identify the key responsibilities of an information security manager related to risk monitoring and communication
  • recognize methods of integrating risk management processes with other life-cycle processes within an organization
  • determine appropriate actions to effectively manage a given risk

CISM: Information Security Incident Management (Part 1)

Managing incidents, and the response that is put forward by an organization falls directly under the duties of a CISM. Organizations must have a plan in place, and must know the steps they will take to deal with incidents when they occur. This course examines what incident management is, how responses are prepared, and concepts and technologies that are used when dealing with incidents. This course also looks at the principles, importance of, and outcomes of incident management and how the information security manager, with the approval of senior management, prepares the people and the resources of the organization to deal with incidents when they occur. Finally, this course explains the steps for conducting a business impact analysis as technique used in effective incident management. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
  • identify the tasks within the incident management and response job practice area
  • recognize incident management planning considerations
  • order the steps in the incident management process
  • recognize the elements of an incident management plan
  • match causes of challenges in developing an incident management plan with corresponding solutions
  • recognize key points related to incident management planning
  • matching key incident management roles and their corresponding responsibilities
  • identify the roles that make up an incident response team
  • recognize examples of personal skills required by members of an incident response team
  • recognize examples of technical knowledge required by members of an incident response team
  • recognize the activities that are performed during a business impact analysis
  • conduct a business impact analysis using incident management resources

CISM: Information Security Incident Management (Part 2)

Preparing incident response and recovery plans is a very important part of a CISM's role. This course examines how to identify the current state of incident response capability, identifies the elements of incident response and recovery plans, and discusses principles for effectively managing the plans. This course also examines the importance of testing, documentation, and how to physically prepare recovery sites and related offsite resources. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
  • determine the appropriate method for identifying the current state of response capability for a given company
  • identify the factors that determine incident response capability
  • match phases of an incident response plan with their corresponding descriptions
  • match members of response and recovery teams with their corresponding responsibilities
  • recognize examples of individuals who may require notification in case of a serious security incident
  • recognize the types of insurance coverage that an organization may have
  • label descriptions of different types of recovery sites
  • determine the appropriate type of recovery site given examples of requirements
  • recognize methods for recovering communication and computing systems
  • distinguish between the characteristics of an incident response plan and a recovery plan
  • recognize the method being used to test incident response and recovery plans
  • recognize examples of metrics used for testing incident response and recovery plans
  • identify important aspects of executing incident response and recovery plans
  • recognize key concepts related to testing and incident management
Register Now
Certified Information Security Manager (CISM) 2013 Part 1 e-learning bundle
  • Course ID:
    252710
  • Duration:
    15 hours
  • Price:
    $239