• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

CISM Certification Domain 2: Information Risk Management Video Boot Camp 2019

CISM Certification Domain 2: Information Risk Management Video Boot Camp 2019

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 7 hours 29 minutes

  • All levels

Description

Get 7.5 hours of videos and downloadable lecture slides for Certified Information Security Manager (CISM) Domain 2

With this CISM Domain 2 video boot camp course, you'll learn all that is necessary to know about information risk management to pass your CISM certification exam.
Included in this course:
• Full CISM Domain 2 videos (7.5 hours)
• Downloadable CISM slides for both domains (234 pages)
• 160+ links for Domain 2 and overall CISM preparation Prepare for the 2017 version of the CISM exam, which is what you will be tested on until the next planned CISM curriculum update by ISACA in 2022. In this Domain 2 boot camp course, you'll learn the following topics:
• Risk identification and risk assessment
• Risk response and mitigation and risk control monitoring and reporting
• COBIT5, NIST 800-37, and NIST 800-53
• Attackers and vishing and phishing
• Incident management and its definitions
• ISO 27001 and 27002 and OWASP
• Vulnerability scanners and networking basics
• Security Information and Event Management (SIEM)
• The OSI model and the TCP/IP model
• IP addresses and port numbers
• IP support protocols, cable types, LAN topologies, and much more The exam is 4 hours long and has 150 multiple-choice questions. To pass the CISM exam, you obviously need to have the right knowledge, but the path to success is to solve a lot of practice questions before taking the exam. All the code and supporting files for this course are available at https://github.com/PacktPublishing/CISM-Certification-Domain-2-Information-Risk-Management-Video-Boot-Camp-2019

What You Will Learn

Prepare for the 2017 version of the CISM exam (the next planned CISM update is in 2022)
Understand IT security and cybersecurity from a management-level perspective
Get started on your CISM journey
Understand why you should get your CISM certification

Audience

This course is for anyone who wants to prepare for the ISACA CISM certification exam, focusing on CISM Domain 2: Information Risk Management. Whether you're a beginner or experienced IT security professional, this course will add to your security and cybersecurity knowledge.

Approach

The course helps you understand how ISACA expects you to answer CISM exam questions. You'll be able to spot keywords (PKI, policy, asymmetric, and BCP) and indicators (first, best, last, least, and most), and answer every question from an IT security manager or a risk adviser's point of view, not as an executive or techie.

Key Features

Learn about management-level IT security and cybersecurity * Prepare for the Certified Information Security Manager exam

Github Repo

https://github.com/packtpublishing/cism-certification-domain-2-information-risk-management-video-boot-camp-2019

About the Author
Thor Pedersen

Thor Pedersen teaches IT, cybersecurity, and project management, both online and in-person, through his training company-Thor Teaches. His current certifications include CISSP, PMP, CISM, CDPSE, CEH, CompTIA Security+, CCNP R/S, CCNP Enterprise, CCNA R/S, CCNA-Security, CCENT, and 4011 Certified Recognition.

Course Outline

1. Introduction

1. Introduction

Introduction: Introduction

2. Introduction to this course!

Introduction: Introduction to this course!

3. Why you should want to get CISM certified.

Introduction: Why you should want to get CISM certified.

4. The 4 CISM domains

Introduction: The 4 CISM domains

5. Download all the lecture slides from this course!

Introduction: Download all the lecture slides from this course!

6. Links, important topics and where to focus

Introduction: Links, important topics and where to focus

2. How to study for the CISM certification and how to reach your goals

1. How to approach studying for the CISM exam and study plans

How to study for the CISM certification and how to reach your goals: How to approach studying for the CISM exam and study plans

2. How to reach your goal, in this case passing the CISM exam!

How to study for the CISM certification and how to reach your goals: How to reach your goal, in this case passing the CISM exam!

3. CISM Domain 2: Information Risk Management

1. CISM Domain 2 - What we will be covering

CISM Domain 1: Information Security Governance: CISM Domain 1 - What we will be covering

2. Governance, Management, standards, and frameworks

CISM Domain 1: Information Security Governance: Governance, Management, standards, and frameworks

3. Values, vision, and mission

CISM Domain 2: Information Risk Management: Risk Assessment

4. Risk response and mitigation & Risk and Control Monitoring and Reporting

CISM Domain 2: Information Risk Management: Risk response and mitigation & Risk and Control Monitoring and Reporting

5. COBIT5

CISM Domain 2: Information Risk Management: COBIT5

6. Attackers, Vishing and Phishing

CISM Domain 2: Information Risk Management: Attackers, Vishing and Phishing

7. Incident Management definitions

CISM Domain 2: Information Risk Management: Incident Management definitions

8. Incident Management

CISM Domain 2: Information Risk Management: Incident Management

9. NIST 800-53

CISM Domain 2: Information Risk Management: NIST 800-53

10. NIST 800-37

CISM Domain 2: Information Risk Management: NIST 800-37

11. ISO 27001 and 27002

CISM Domain 2: Information Risk Management: ISO 27001 and 27002

12. OWASP part 1

CISM Domain 2: Information Risk Management: OWASP part 1

13. OWASP part 2

CISM Domain 2: Information Risk Management: OWASP part 2

14. Vulnerability scanners

CISM Domain 2: Information Risk Management: Vulnerability scanners

15. Networking basics

CISM Domain 2: Information Risk Management: Networking basics

16. SIEM (Security Information and Event Management)

CISM Domain 2: Information Risk Management: SIEM (Security Information and Event Management)

17. The OSI model

CISM Domain 2: Information Risk Management: The OSI model

18. The TCP/IP model

CISM Domain 2: Information Risk Management: The TCP/IP model

19. IP addresses and port numbers part 1

CISM Domain 2: Information Risk Management: IP addresses and port numbers part 1

20. IP addresses and port numbers part 2

CISM Domain 2: Information Risk Management: IP addresses and port numbers part 2

21. IP support protocols

CISM Domain 2: Information Risk Management: IP support protocols

22. Cable types

CISM Domain 2: Information Risk Management: Cable types

23. LAN topologies

CISM Domain 2: Information Risk Management: LAN topologies

24. Layer 1 to 3 networking devices

CISM Domain 2: Information Risk Management: Layer 1 to 3 networking devices

25. Firewalls

CISM Domain 2: Information Risk Management: Firewalls

26. Intrusion detection and prevention systems

CISM Domain 2: Information Risk Management: Intrusion detection and prevention systems

27. 0-day attacks

CISM Domain 2: Information Risk Management: 0-day attacks

28. Network authentication protocols

CISM Domain 2: Information Risk Management: Network authentication protocols

29. WIFI

CISM Domain 2: Information Risk Management: WIFI

30. Bluetooth

CISM Domain 2: Information Risk Management: Bluetooth

31. Honeynets and Honeypots

CISM Domain 2: Information Risk Management: Honeynets and Honeypots

32. Secure communications

CISM Domain 2: Information Risk Management: Secure communications

33. Mobile device security

CISM Domain 2: Information Risk Management: Mobile device security

34. Application white-listing

CISM Domain 2: Information Risk Management: Application white-listing

35. Virtualization

CISM Domain 2: Information Risk Management: Virtualization

36. Database security

CISM Domain 2: Information Risk Management: Database security

37. Software vulnerabilities and Attacks

CISM Domain 2: Information Risk Management: Software vulnerabilities and Attacks

38. System vulnerabilities, threats, and countermeasures

CISM Domain 2: Information Risk Management: System vulnerabilities, threats, and countermeasures

39. Physical security part 1

CISM Domain 2: Information Risk Management: Physical security part 1

40. Physical security part 2

CISM Domain 2: Information Risk Management: Physical security part 2

41. Physical security part 3

CISM Domain 2: Information Risk Management: Physical security part 3

42. Site Selection

CISM Domain 2: Information Risk Management: Site Selection

43. Fire suppression and hot and cold aisles

CISM Domain 2: Information Risk Management: Fire suppression and hot and cold aisles

44. Electricity

CISM Domain 2: Information Risk Management: Electricity

45. Backups

CISM Domain 2: Information Risk Management: Backups

46. RAID (Redundant Array of Independent Disks)

CISM Domain 2: Information Risk Management: RAID (Redundant Array of Independent Disks)

47. Redundancy

CISM Domain 2: Information Risk Management: Redundancy

48. Media storage

CISM Domain 2: Information Risk Management: Media storage

49. IOT (Internet Of Things)

CISM Domain 2: Information Risk Management: IOT (Internet Of Things)

50. CISM Domain 2 - What we covered

CISM Domain 2: Information Risk Management: CISM Domain 2 - What we covered

4. The exam and life after it

1. The CISM exam itself, how to mentally and physically prepare for it

The exam and life after it: The CISM exam itself, how to mentally and physically prepare for it

2. Life after passing the CISM certification and being endorsed

The exam and life after it: Life after passing the CISM certification and being endorsed

3. I failed, now what should I do?

The exam and life after it: I failed, now what should I do?

Course Content

  1. CISM Certification Domain 2: Information Risk Management Video Boot Camp 2019

About The Provider

Packt
Packt
Birmingham
Founded in 2004 in Birmingham, UK, Packt’s mission is to help the world put software to work in new ways, through the delivery of effective learning and i...
Read more about Packt

Tags

Reviews