Curriculum
- 23 Sections
- 139 Lessons
- 20 Hours
Expand all sectionsCollapse all sections
- CISM Training Introduction0
- Domain 1 : Goverance Fundamental and Organisational Structure11
- 2.1Introduction to Domain 1: Information Security Governance
- 2.2Governance vs. Management: Key Differences for CISM Aspirants
- 2.3Establishing Effective Governance Committees
- 2.4Understanding Corporate Structure for Security Governance
- 2.5Deep Dive into Information Security Governance
- 2.6Governance, Risk, and Compliance (GRC) Overview
- 2.7Governance Fundamentals Quiz
- 2.8Defining the Security Function in Your Organization
- 2.9Strategic Security Blind Spot
- 2.10Identifying Security Program Stakeholders
- 2.11Mastering the RACI Matrix for Security Management
- Domain 1 : Strategy, Business Alignment and Buy-In8
- 3.1Aligning Security Strategy, Goals & Business Objectives
- 3.2Conducting an Effective Gap Analysis
- 3.3Navigating Strategy Implementation Constraints
- 3.4Avoiding Strategic Pitfalls and Bias in Security Management
- 3.5Feasibility Analysis and Presenting the Business Case
- 3.6Securing Management Buy-In for Security Initiatives
- 3.7Maturity Assessment Models and the PDCA Cycle
- 3.8The Legacy Security System Upgrade
- Domain 1: Data Security and Classification5
- Domain 1: Policies and Standards5
- Domain 1: Frameworks, Metrics and Domain Conclusion4
- Domain 2: Risk Fundamentals and Threat Landscape10
- 7.1Introduction to Domain 2: Risk Management in Information Security
- 7.2The CIA Triad & Core Security Objectives
- 7.3Identifying and Analyzing Security Vulnerabilities
- 7.4Understanding Cyber Attacks: DoS & DDoS Explained
- 7.5Anti-DDoS Prevention Tools & Techniques
- 7.6Exploring Man-in-the-Middle (MITM) Cyber Attacks
- 7.7Malware Fundamentals & Threat Landscape
- 7.8Best Practices & Security Measures Against Malware
- 7.9Web Application Attacks & OWASP Top Ten Overview
- 7.10Post-Incident Briefing: Understanding and Defending Against Multi-Vector Attacks
- Domain 2: Risk Management Process and Terminology8
- 8.1Overview of Risk Management Concepts
- 8.2Understanding Inherent vs. Residual Risk & Key Terminologies
- 8.3Risk Identification Techniques
- 8.4Performing Risk Analysis
- 8.5Evaluating and Responding to Security Risks
- 8.6Effective Risk Monitoring Strategies
- 8.7Introduction to Risk Management Frameworks
- 8.8Navigating High-Risk Third-Party Data Exposure
- Domain 2: Security Control and Strategic Mitigation9
- 9.1Overview of Security Controls in Risk Mitigation
- 9.2IT General Controls and Strong Security Controls
- 9.3Control Objectives, Compensating Controls & Countermeasures
- 9.4Control Objectives, Compensating Controls & Countermeasures
- 9.5Assessing the Effectiveness of Security Controls
- 9.6Defense in Depth Strategy Explained
- 9.7Introduction to Zero Trust Strategy
- 9.8Best Practices in Security Control Selection
- 9.9Fortifying Our Cloud Environment: Beyond Basic Controls
- Domain 3: Program Foundation and Human Factors9
- 10.1Introduction to Domain 3: Building a Security Program
- 10.2Defining a Security Program: Fundamentals and Importance
- 10.3Developing Comprehensive Security Program Plans
- 10.4Overview of Enterprise Architecture for Security
- 10.5Building a Foundation: The Strategic Security Program
- 10.6Recognizing and Preventing Social Engineering Attacks
- 10.7Enhancing Security Awareness and Training
- 10.8Implementing Effective Personnel Security Measures
- 10.9Securing the Human Element: Beyond Technology
- Domain 3: Secure Development6
- 11.1Software Development Methodologies in a Secure Environment
- 11.2Integrating DevOps into Security Practices
- 11.3Embracing DevSecOps for Continuous Security
- 11.4Understanding the Software Testing Lifecycle
- 11.5Best Practices for Software Security Testing
- 11.6Overview of Threat Modeling in Security Programs
- Domain 3: Identity and Access Management4
- Domain 3: Cryptography5
- Domain 3: Cloud Security5
- Domain 3: Third Party, Supply Chain and Physical Security8
- 15.1Overview of Statement on Standards for Attestation Engagements (SSAE)
- 15.2System Organization Controls – SOC Audits and Reporting
- 15.3Best Practices in Outsourcing and Third-Party Management
- 15.4Ensuring Supply Chain Security
- 15.5Navigating Third-Party Risks Post-Outage
- 15.6Vendor Management and Supply Chain Security
- 15.7Physical Security Controls for IT Environments
- 15.8Securing Power Sources and Environmental Controls
- Domain 3: Program Documentation, Metrics and Conclusion5
- Domain 4: Incidence Response Planning and Execution7
- 17.1Introduction to Domain 4: Incident Management
- 17.2Overview of Incident Management Processes
- 17.3Developing, Executing, and Testing an Incident Response Plan
- 17.4Forensic Investigation and Evidence Collection Techniques
- 17.5Incident Response Training Essentials
- 17.6Incident Monitoring and Optimization
- 17.7Automation in Incident Response & Use Cases for Security Orchestration & SOAR
- Domain 4: Post-Incident Activities and Security Operations8
- 18.1Post-Incident Activities and Recovery Steps
- 18.2Effective Communication During Security Incidents
- 18.3Legal and Compliance Aspects in Incident Response
- 18.4Analyzing Past Incidents and Golden Rules for Response
- 18.5Post-Breach Review: From Crisis to Compliance & Continuous Improvement
- 18.6Overview of Security Operations Center (SOC) & Managed Detection and Response
- 18.7SIEM Architecture and Monitoring Protocols
- 18.8Advanced Endpoint Detection and Response, EDR, NDR, XDR
- Domain 4: Business Continuity and Disaster Recovery7
- 19.1What Are Disasters and the Importance of Business Impact Analysis (BIA)?
- 19.2Crafting an Effective Disaster Recovery Plan
- 19.3Building a Business Continuity Plan
- 19.4RPO and RTO in Business Continuity and Disaster Recovery Planning
- 19.5Crisis Communication Plan and Communication During Disasters
- 19.6Recovery Sites and Alternate Processing Facilities Explained
- 19.7Testing and Evaluating the BCP and DRP
- Domain 4: Operational Security and Conclusion5
- Study Material4
- Case Studies4
- CISM Practice Mock Exams2
Governance vs. Management: Key Differences for CISM Aspirants
Next