Special welcome gift. Get 30% off your first purchase with code “TOTALLYLEARN”. Find out more!

  • Categories
    • Agile Management
    • Business Analysis
    • Cloud Computing
    • Cyber Security
    • DevOps
    • IT Service Management
    • Project Management
    • Quality Management
    • IT Networking
    • Home
    • Courses
      • Agile Management
      • Business Analysis
      • Cloud Computing
      • Cyber Security
      • DevOps
      • IT Service Management
      • Project Management
      • Quality Management
      • IT Networking
    • About Us
    • Contact
    • Blog
    • Verification
    Pay
    Pay

    Curriculum

    • 23 Sections
    • 139 Lessons
    • 20 Hours
    Expand all sectionsCollapse all sections
    • CISM Training Introduction
      0
      • Domain 1 : Goverance Fundamental and Organisational Structure
        11
        • 2.1
          Introduction to Domain 1: Information Security Governance
        • 2.2
          Governance vs. Management: Key Differences for CISM Aspirants
        • 2.3
          Establishing Effective Governance Committees
        • 2.4
          Understanding Corporate Structure for Security Governance
        • 2.5
          Deep Dive into Information Security Governance
        • 2.6
          Governance, Risk, and Compliance (GRC) Overview
        • 2.7
          Governance Fundamentals Quiz
        • 2.8
          Defining the Security Function in Your Organization
        • 2.9
          Strategic Security Blind Spot
        • 2.10
          Identifying Security Program Stakeholders
        • 2.11
          Mastering the RACI Matrix for Security Management
      • Domain 1 : Strategy, Business Alignment and Buy-In
        8
        • 3.1
          Aligning Security Strategy, Goals & Business Objectives
        • 3.2
          Conducting an Effective Gap Analysis
        • 3.3
          Navigating Strategy Implementation Constraints
        • 3.4
          Avoiding Strategic Pitfalls and Bias in Security Management
        • 3.5
          Feasibility Analysis and Presenting the Business Case
        • 3.6
          Securing Management Buy-In for Security Initiatives
        • 3.7
          Maturity Assessment Models and the PDCA Cycle
        • 3.8
          The Legacy Security System Upgrade
      • Domain 1: Data Security and Classification
        5
        • 4.1
          Data Lifecycle Management in Security Governance
        • 4.2
          Secure Data Disposal Practices
        • 4.3
          Best Practices for IT Asset Management
        • 4.4
          Data and Asset Classification Quiz
        • 4.5
          Data Owner vs. Data Custodian
      • Domain 1: Policies and Standards
        5
        • 5.1
          Developing Effective Security Policies
        • 5.2
          Policy Development: Top-Down and Bottom-Up Approaches
        • 5.3
          Establishing Security Standards
        • 5.4
          Creating Procedures and Guidelines for Security
        • 5.5
          Policy Development and Review Process
      • Domain 1: Frameworks, Metrics and Domain Conclusion
        4
        • 6.1
          Implementing a Balanced Scorecard (BSC) in Security
        • 6.2
          Leveraging Frameworks for Effective Security Management
        • 6.3
          Cybersecurity Frameworks and Industry Standards
        • 6.4
          Domain 1 Conclusion – Key Takeaways for CISM
      • Domain 2: Risk Fundamentals and Threat Landscape
        10
        • 7.1
          Introduction to Domain 2: Risk Management in Information Security
        • 7.2
          The CIA Triad & Core Security Objectives
        • 7.3
          Identifying and Analyzing Security Vulnerabilities
        • 7.4
          Understanding Cyber Attacks: DoS & DDoS Explained
        • 7.5
          Anti-DDoS Prevention Tools & Techniques
        • 7.6
          Exploring Man-in-the-Middle (MITM) Cyber Attacks
        • 7.7
          Malware Fundamentals & Threat Landscape
        • 7.8
          Best Practices & Security Measures Against Malware
        • 7.9
          Web Application Attacks & OWASP Top Ten Overview
        • 7.10
          Post-Incident Briefing: Understanding and Defending Against Multi-Vector Attacks
      • Domain 2: Risk Management Process and Terminology
        8
        • 8.1
          Overview of Risk Management Concepts
        • 8.2
          Understanding Inherent vs. Residual Risk & Key Terminologies
        • 8.3
          Risk Identification Techniques
        • 8.4
          Performing Risk Analysis
        • 8.5
          Evaluating and Responding to Security Risks
        • 8.6
          Effective Risk Monitoring Strategies
        • 8.7
          Introduction to Risk Management Frameworks
        • 8.8
          Navigating High-Risk Third-Party Data Exposure
      • Domain 2: Security Control and Strategic Mitigation
        9
        • 9.1
          Overview of Security Controls in Risk Mitigation
        • 9.2
          IT General Controls and Strong Security Controls
        • 9.3
          Control Objectives, Compensating Controls & Countermeasures
        • 9.4
          Control Objectives, Compensating Controls & Countermeasures
        • 9.5
          Assessing the Effectiveness of Security Controls
        • 9.6
          Defense in Depth Strategy Explained
        • 9.7
          Introduction to Zero Trust Strategy
        • 9.8
          Best Practices in Security Control Selection
        • 9.9
          Fortifying Our Cloud Environment: Beyond Basic Controls
      • Domain 3: Program Foundation and Human Factors
        9
        • 10.1
          Introduction to Domain 3: Building a Security Program
        • 10.2
          Defining a Security Program: Fundamentals and Importance
        • 10.3
          Developing Comprehensive Security Program Plans
        • 10.4
          Overview of Enterprise Architecture for Security
        • 10.5
          Building a Foundation: The Strategic Security Program
        • 10.6
          Recognizing and Preventing Social Engineering Attacks
        • 10.7
          Enhancing Security Awareness and Training
        • 10.8
          Implementing Effective Personnel Security Measures
        • 10.9
          Securing the Human Element: Beyond Technology
      • Domain 3: Secure Development
        6
        • 11.1
          Software Development Methodologies in a Secure Environment
        • 11.2
          Integrating DevOps into Security Practices
        • 11.3
          Embracing DevSecOps for Continuous Security
        • 11.4
          Understanding the Software Testing Lifecycle
        • 11.5
          Best Practices for Software Security Testing
        • 11.6
          Overview of Threat Modeling in Security Programs
      • Domain 3: Identity and Access Management
        4
        • 12.1
          Overview of Identification, Authentication, Authorization, and Accounting (AAA)
        • 12.2
          What is Identity and Access Management (IAM)?
        • 12.3
          Multi-Factor and Biometric Authentication Best Practices
        • 12.4
          Fortifying Access: Building a Strategic IAM Program
      • Domain 3: Cryptography
        5
        • 13.1
          Cryptography Fundamentals for Security Programs
        • 13.2
          Symmetric Encryption Explained
        • 13.3
          Asymmetric Encryption Fundamentals
        • 13.4
          Understanding Digital Signatures
        • 13.5
          Public Key Infrastructure (PKI) in Practice
      • Domain 3: Cloud Security
        5
        • 14.1
          Cloud Computing Fundamentals for Security Professionals
        • 14.2
          Cloud Deployment Models and Their Security Implications
        • 14.3
          Overview of Cloud Service Models
        • 14.4
          Understanding the Cloud Shared Responsibility Matrix
        • 14.5
          Cloud Contractual & Service Level Agreement (SLA) Requirements
      • Domain 3: Third Party, Supply Chain and Physical Security
        8
        • 15.1
          Overview of Statement on Standards for Attestation Engagements (SSAE)
        • 15.2
          System Organization Controls – SOC Audits and Reporting
        • 15.3
          Best Practices in Outsourcing and Third-Party Management
        • 15.4
          Ensuring Supply Chain Security
        • 15.5
          Navigating Third-Party Risks Post-Outage
        • 15.6
          Vendor Management and Supply Chain Security
        • 15.7
          Physical Security Controls for IT Environments
        • 15.8
          Securing Power Sources and Environmental Controls
      • Domain 3: Program Documentation, Metrics and Conclusion
        5
        • 16.1
          Data Security Measures and Business Record Retention
        • 16.2
          Key Performance Indicators and Monitoring in Security
        • 16.3
          Documenting Your Information Security Program
        • 16.4
          Document Control Systems and Versioning in Security
        • 16.5
          Domain 3 Conclusion – Key Takeaways for CISM
      • Domain 4: Incidence Response Planning and Execution
        7
        • 17.1
          Introduction to Domain 4: Incident Management
        • 17.2
          Overview of Incident Management Processes
        • 17.3
          Developing, Executing, and Testing an Incident Response Plan
        • 17.4
          Forensic Investigation and Evidence Collection Techniques
        • 17.5
          Incident Response Training Essentials
        • 17.6
          Incident Monitoring and Optimization
        • 17.7
          Automation in Incident Response & Use Cases for Security Orchestration & SOAR
      • Domain 4: Post-Incident Activities and Security Operations
        8
        • 18.1
          Post-Incident Activities and Recovery Steps
        • 18.2
          Effective Communication During Security Incidents
        • 18.3
          Legal and Compliance Aspects in Incident Response
        • 18.4
          Analyzing Past Incidents and Golden Rules for Response
        • 18.5
          Post-Breach Review: From Crisis to Compliance & Continuous Improvement
        • 18.6
          Overview of Security Operations Center (SOC) & Managed Detection and Response
        • 18.7
          SIEM Architecture and Monitoring Protocols
        • 18.8
          Advanced Endpoint Detection and Response, EDR, NDR, XDR
      • Domain 4: Business Continuity and Disaster Recovery
        7
        • 19.1
          What Are Disasters and the Importance of Business Impact Analysis (BIA)?
        • 19.2
          Crafting an Effective Disaster Recovery Plan
        • 19.3
          Building a Business Continuity Plan
        • 19.4
          RPO and RTO in Business Continuity and Disaster Recovery Planning
        • 19.5
          Crisis Communication Plan and Communication During Disasters
        • 19.6
          Recovery Sites and Alternate Processing Facilities Explained
        • 19.7
          Testing and Evaluating the BCP and DRP
      • Domain 4: Operational Security and Conclusion
        5
        • 20.1
          Data Backup Strategies Overview
        • 20.2
          Change Management in IT Security
        • 20.3
          Best Practices for Patch Management
        • 20.4
          Essentials of Configuration Management
        • 20.5
          Fortifying Our Systems: The Foundation of Operational Security
      • Study Material
        4
        • 21.1
          Practice Questions for Domain 1
        • 21.2
          Practice Questions for Domain 2
        • 21.3
          Practice Questions for Domain 3
        • 21.4
          Practice Questions for Domain 4
      • Case Studies
        4
        • 22.1
          Business Continuity in Crisis: Securing Operations After a Natural Disaster
        • 22.2
          The Broken Perimeter: Misconfigured Firewalls in a Financial Institution
        • 22.3
          The Shadow Application: Governance Failure in a Marketing Department
        • 22.4
          Pentest Surprise: Exploitable Flaw Found During Internal Assessment
      • CISM Practice Mock Exams
        2
        • 23.1
          CISM Mock Exam 1 – Complete CISM Mock Exam
        • 23.2
          CISM Mock Exam 2 – Complete CISM Mock Exam
      This content is protected, please login and enroll in the course to view this content!
      Recovery Sites and Alternate Processing Facilities Explained
      Prev
      Data Backup Strategies Overview
      Next
      Contact Sale

      Categories

      • Agile Management
      • Project Management
      • Cloud Computing
      • Data Science
      • DevOps
      • BI And Visualization
      • Cyber Security
      • Web Development

      Approach

      • Sales Support
      • No Hidden Fee
      • Transparency
      • 24/7 Support

      24*7 Support

      • Sales Support
      • Discounts
      • Contact us
      • Verification
      • Linkedin
      • Instagram
      • Google Business
      • Refer & Earn

      Important

      • Privacy Policy
      • Refund Policy
      • Terms & Conditions
      • Corporate Trainings

      © Totallylearn.com. All Rights Reserved. Totally Learn

      Connect with us

      PMP®,PMI®, PMI-ACP® and PMBOK® are registered marks of the Project Management Institute, Inc. MongoDB®, Mongo and the leaf logo are the registered trademarks of MongoDB, Inc.

      HomeCourses
      Search

      Search

        Account

        Login with your site account

        Lost your password?

        • ←
        • Contact Us
          Contact Form

        • WhatsApp