Special welcome gift. Get 30% off your first purchase with code “TOTALLYLEARN”. Find out more!

  • Categories
    • Agile Management
    • Business Analysis
    • Cloud Computing
    • Cyber Security
    • DevOps
    • IT Service Management
    • Project Management
    • Quality Management
    • IT Networking
    • Home
    • Courses
      • Agile Management
      • Business Analysis
      • Cloud Computing
      • Cyber Security
      • DevOps
      • IT Service Management
      • Project Management
      • Quality Management
      • IT Networking
    • About Us
    • Contact
    • Blog
    • Verification
    Pay
    Pay

    Curriculum

    • 23 Sections
    • 139 Lessons
    • 20 Hours
    Expand all sectionsCollapse all sections
    • CISM Training Introduction
      0
      • Domain 1 : Goverance Fundamental and Organisational Structure
        11
        • 2.1
          Introduction to Domain 1: Information Security Governance
        • 2.2
          Governance vs. Management: Key Differences for CISM Aspirants
        • 2.3
          Establishing Effective Governance Committees
        • 2.4
          Understanding Corporate Structure for Security Governance
        • 2.5
          Deep Dive into Information Security Governance
        • 2.6
          Governance, Risk, and Compliance (GRC) Overview
        • 2.7
          Governance Fundamentals Quiz
        • 2.8
          Defining the Security Function in Your Organization
        • 2.9
          Strategic Security Blind Spot
        • 2.10
          Identifying Security Program Stakeholders
        • 2.11
          Mastering the RACI Matrix for Security Management
      • Domain 1 : Strategy, Business Alignment and Buy-In
        8
        • 3.1
          Aligning Security Strategy, Goals & Business Objectives
        • 3.2
          Conducting an Effective Gap Analysis
        • 3.3
          Navigating Strategy Implementation Constraints
        • 3.4
          Avoiding Strategic Pitfalls and Bias in Security Management
        • 3.5
          Feasibility Analysis and Presenting the Business Case
        • 3.6
          Securing Management Buy-In for Security Initiatives
        • 3.7
          Maturity Assessment Models and the PDCA Cycle
        • 3.8
          The Legacy Security System Upgrade
      • Domain 1: Data Security and Classification
        5
        • 4.1
          Data Lifecycle Management in Security Governance
        • 4.2
          Secure Data Disposal Practices
        • 4.3
          Best Practices for IT Asset Management
        • 4.4
          Data and Asset Classification Quiz
        • 4.5
          Data Owner vs. Data Custodian
      • Domain 1: Policies and Standards
        5
        • 5.1
          Developing Effective Security Policies
        • 5.2
          Policy Development: Top-Down and Bottom-Up Approaches
        • 5.3
          Establishing Security Standards
        • 5.4
          Creating Procedures and Guidelines for Security
        • 5.5
          Policy Development and Review Process
      • Domain 1: Frameworks, Metrics and Domain Conclusion
        4
        • 6.1
          Implementing a Balanced Scorecard (BSC) in Security
        • 6.2
          Leveraging Frameworks for Effective Security Management
        • 6.3
          Cybersecurity Frameworks and Industry Standards
        • 6.4
          Domain 1 Conclusion – Key Takeaways for CISM
      • Domain 2: Risk Fundamentals and Threat Landscape
        10
        • 7.1
          Introduction to Domain 2: Risk Management in Information Security
        • 7.2
          The CIA Triad & Core Security Objectives
        • 7.3
          Identifying and Analyzing Security Vulnerabilities
        • 7.4
          Understanding Cyber Attacks: DoS & DDoS Explained
        • 7.5
          Anti-DDoS Prevention Tools & Techniques
        • 7.6
          Exploring Man-in-the-Middle (MITM) Cyber Attacks
        • 7.7
          Malware Fundamentals & Threat Landscape
        • 7.8
          Best Practices & Security Measures Against Malware
        • 7.9
          Web Application Attacks & OWASP Top Ten Overview
        • 7.10
          Post-Incident Briefing: Understanding and Defending Against Multi-Vector Attacks
      • Domain 2: Risk Management Process and Terminology
        8
        • 8.1
          Overview of Risk Management Concepts
        • 8.2
          Understanding Inherent vs. Residual Risk & Key Terminologies
        • 8.3
          Risk Identification Techniques
        • 8.4
          Performing Risk Analysis
        • 8.5
          Evaluating and Responding to Security Risks
        • 8.6
          Effective Risk Monitoring Strategies
        • 8.7
          Introduction to Risk Management Frameworks
        • 8.8
          Navigating High-Risk Third-Party Data Exposure
      • Domain 2: Security Control and Strategic Mitigation
        9
        • 9.1
          Overview of Security Controls in Risk Mitigation
        • 9.2
          IT General Controls and Strong Security Controls
        • 9.3
          Control Objectives, Compensating Controls & Countermeasures
        • 9.4
          Control Objectives, Compensating Controls & Countermeasures
        • 9.5
          Assessing the Effectiveness of Security Controls
        • 9.6
          Defense in Depth Strategy Explained
        • 9.7
          Introduction to Zero Trust Strategy
        • 9.8
          Best Practices in Security Control Selection
        • 9.9
          Fortifying Our Cloud Environment: Beyond Basic Controls
      • Domain 3: Program Foundation and Human Factors
        9
        • 10.1
          Introduction to Domain 3: Building a Security Program
        • 10.2
          Defining a Security Program: Fundamentals and Importance
        • 10.3
          Developing Comprehensive Security Program Plans
        • 10.4
          Overview of Enterprise Architecture for Security
        • 10.5
          Building a Foundation: The Strategic Security Program
        • 10.6
          Recognizing and Preventing Social Engineering Attacks
        • 10.7
          Enhancing Security Awareness and Training
        • 10.8
          Implementing Effective Personnel Security Measures
        • 10.9
          Securing the Human Element: Beyond Technology
      • Domain 3: Secure Development
        6
        • 11.1
          Software Development Methodologies in a Secure Environment
        • 11.2
          Integrating DevOps into Security Practices
        • 11.3
          Embracing DevSecOps for Continuous Security
        • 11.4
          Understanding the Software Testing Lifecycle
        • 11.5
          Best Practices for Software Security Testing
        • 11.6
          Overview of Threat Modeling in Security Programs
      • Domain 3: Identity and Access Management
        4
        • 12.1
          Overview of Identification, Authentication, Authorization, and Accounting (AAA)
        • 12.2
          What is Identity and Access Management (IAM)?
        • 12.3
          Multi-Factor and Biometric Authentication Best Practices
        • 12.4
          Fortifying Access: Building a Strategic IAM Program
      • Domain 3: Cryptography
        5
        • 13.1
          Cryptography Fundamentals for Security Programs
        • 13.2
          Symmetric Encryption Explained
        • 13.3
          Asymmetric Encryption Fundamentals
        • 13.4
          Understanding Digital Signatures
        • 13.5
          Public Key Infrastructure (PKI) in Practice
      • Domain 3: Cloud Security
        5
        • 14.1
          Cloud Computing Fundamentals for Security Professionals
        • 14.2
          Cloud Deployment Models and Their Security Implications
        • 14.3
          Overview of Cloud Service Models
        • 14.4
          Understanding the Cloud Shared Responsibility Matrix
        • 14.5
          Cloud Contractual & Service Level Agreement (SLA) Requirements
      • Domain 3: Third Party, Supply Chain and Physical Security
        8
        • 15.1
          Overview of Statement on Standards for Attestation Engagements (SSAE)
        • 15.2
          System Organization Controls – SOC Audits and Reporting
        • 15.3
          Best Practices in Outsourcing and Third-Party Management
        • 15.4
          Ensuring Supply Chain Security
        • 15.5
          Navigating Third-Party Risks Post-Outage
        • 15.6
          Vendor Management and Supply Chain Security
        • 15.7
          Physical Security Controls for IT Environments
        • 15.8
          Securing Power Sources and Environmental Controls
      • Domain 3: Program Documentation, Metrics and Conclusion
        5
        • 16.1
          Data Security Measures and Business Record Retention
        • 16.2
          Key Performance Indicators and Monitoring in Security
        • 16.3
          Documenting Your Information Security Program
        • 16.4
          Document Control Systems and Versioning in Security
        • 16.5
          Domain 3 Conclusion – Key Takeaways for CISM
      • Domain 4: Incidence Response Planning and Execution
        7
        • 17.1
          Introduction to Domain 4: Incident Management
        • 17.2
          Overview of Incident Management Processes
        • 17.3
          Developing, Executing, and Testing an Incident Response Plan
        • 17.4
          Forensic Investigation and Evidence Collection Techniques
        • 17.5
          Incident Response Training Essentials
        • 17.6
          Incident Monitoring and Optimization
        • 17.7
          Automation in Incident Response & Use Cases for Security Orchestration & SOAR
      • Domain 4: Post-Incident Activities and Security Operations
        8
        • 18.1
          Post-Incident Activities and Recovery Steps
        • 18.2
          Effective Communication During Security Incidents
        • 18.3
          Legal and Compliance Aspects in Incident Response
        • 18.4
          Analyzing Past Incidents and Golden Rules for Response
        • 18.5
          Post-Breach Review: From Crisis to Compliance & Continuous Improvement
        • 18.6
          Overview of Security Operations Center (SOC) & Managed Detection and Response
        • 18.7
          SIEM Architecture and Monitoring Protocols
        • 18.8
          Advanced Endpoint Detection and Response, EDR, NDR, XDR
      • Domain 4: Business Continuity and Disaster Recovery
        7
        • 19.1
          What Are Disasters and the Importance of Business Impact Analysis (BIA)?
        • 19.2
          Crafting an Effective Disaster Recovery Plan
        • 19.3
          Building a Business Continuity Plan
        • 19.4
          RPO and RTO in Business Continuity and Disaster Recovery Planning
        • 19.5
          Crisis Communication Plan and Communication During Disasters
        • 19.6
          Recovery Sites and Alternate Processing Facilities Explained
        • 19.7
          Testing and Evaluating the BCP and DRP
      • Domain 4: Operational Security and Conclusion
        5
        • 20.1
          Data Backup Strategies Overview
        • 20.2
          Change Management in IT Security
        • 20.3
          Best Practices for Patch Management
        • 20.4
          Essentials of Configuration Management
        • 20.5
          Fortifying Our Systems: The Foundation of Operational Security
      • Study Material
        4
        • 21.1
          Practice Questions for Domain 1
        • 21.2
          Practice Questions for Domain 2
        • 21.3
          Practice Questions for Domain 3
        • 21.4
          Practice Questions for Domain 4
      • Case Studies
        4
        • 22.1
          Business Continuity in Crisis: Securing Operations After a Natural Disaster
        • 22.2
          The Broken Perimeter: Misconfigured Firewalls in a Financial Institution
        • 22.3
          The Shadow Application: Governance Failure in a Marketing Department
        • 22.4
          Pentest Surprise: Exploitable Flaw Found During Internal Assessment
      • CISM Practice Mock Exams
        2
        • 23.1
          CISM Mock Exam 1 – Complete CISM Mock Exam
        • 23.2
          CISM Mock Exam 2 – Complete CISM Mock Exam
      This content is protected, please login and enroll in the course to view this content!
      Securing the Human Element: Beyond Technology
      Prev
      Integrating DevOps into Security Practices
      Next
      Contact Sale

      Categories

      • Agile Management
      • Project Management
      • Cloud Computing
      • Data Science
      • DevOps
      • BI And Visualization
      • Cyber Security
      • Web Development

      Approach

      • Sales Support
      • No Hidden Fee
      • Transparency
      • 24/7 Support

      24*7 Support

      • Sales Support
      • Discounts
      • Contact us
      • Verification
      • Linkedin
      • Instagram
      • Google Business
      • Refer & Earn

      Important

      • Privacy Policy
      • Refund Policy
      • Terms & Conditions
      • Corporate Trainings

      © Totallylearn.com. All Rights Reserved. Totally Learn

      Connect with us

      PMP®,PMI®, PMI-ACP® and PMBOK® are registered marks of the Project Management Institute, Inc. MongoDB®, Mongo and the leaf logo are the registered trademarks of MongoDB, Inc.

      HomeCourses
      Search

      Search

        Account

        Login with your site account

        Lost your password?

        • ←
        • Contact Us
          Contact Form

        • WhatsApp