Booking options
£137.99
£137.99
On-Demand course
7 hours 29 minutes
All levels
Get 7.5 hours of videos and downloadable lecture slides for Certified Information Security Manager (CISM) Domain 2
With this CISM Domain 2 video boot camp course, you'll learn all that is necessary to know about information risk management to pass your CISM certification exam.
Included in this course:
• Full CISM Domain 2 videos (7.5 hours)
• Downloadable CISM slides for both domains (234 pages)
• 160+ links for Domain 2 and overall CISM preparation Prepare for the 2017 version of the CISM exam, which is what you will be tested on until the next planned CISM curriculum update by ISACA in 2022. In this Domain 2 boot camp course, you'll learn the following topics:
• Risk identification and risk assessment
• Risk response and mitigation and risk control monitoring and reporting
• COBIT5, NIST 800-37, and NIST 800-53
• Attackers and vishing and phishing
• Incident management and its definitions
• ISO 27001 and 27002 and OWASP
• Vulnerability scanners and networking basics
• Security Information and Event Management (SIEM)
• The OSI model and the TCP/IP model
• IP addresses and port numbers
• IP support protocols, cable types, LAN topologies, and much more The exam is 4 hours long and has 150 multiple-choice questions. To pass the CISM exam, you obviously need to have the right knowledge, but the path to success is to solve a lot of practice questions before taking the exam. All the code and supporting files for this course are available at https://github.com/PacktPublishing/CISM-Certification-Domain-2-Information-Risk-Management-Video-Boot-Camp-2019
Prepare for the 2017 version of the CISM exam (the next planned CISM update is in 2022)
Understand IT security and cybersecurity from a management-level perspective
Get started on your CISM journey
Understand why you should get your CISM certification
This course is for anyone who wants to prepare for the ISACA CISM certification exam, focusing on CISM Domain 2: Information Risk Management. Whether you're a beginner or experienced IT security professional, this course will add to your security and cybersecurity knowledge.
The course helps you understand how ISACA expects you to answer CISM exam questions. You'll be able to spot keywords (PKI, policy, asymmetric, and BCP) and indicators (first, best, last, least, and most), and answer every question from an IT security manager or a risk adviser's point of view, not as an executive or techie.
Learn about management-level IT security and cybersecurity * Prepare for the Certified Information Security Manager exam
https://github.com/packtpublishing/cism-certification-domain-2-information-risk-management-video-boot-camp-2019
Thor Pedersen teaches IT, cybersecurity, and project management, both online and in-person, through his training company-Thor Teaches. His current certifications include CISSP, PMP, CISM, CDPSE, CEH, CompTIA Security+, CCNP R/S, CCNP Enterprise, CCNA R/S, CCNA-Security, CCENT, and 4011 Certified Recognition.
1. Introduction
1. Introduction Introduction: Introduction |
2. Introduction to this course! Introduction: Introduction to this course! |
3. Why you should want to get CISM certified. Introduction: Why you should want to get CISM certified. |
4. The 4 CISM domains Introduction: The 4 CISM domains |
5. Download all the lecture slides from this course! Introduction: Download all the lecture slides from this course! |
6. Links, important topics and where to focus Introduction: Links, important topics and where to focus |
2. How to study for the CISM certification and how to reach your goals
1. How to approach studying for the CISM exam and study plans How to study for the CISM certification and how to reach your goals: How to approach studying for the CISM exam and study plans |
2. How to reach your goal, in this case passing the CISM exam! How to study for the CISM certification and how to reach your goals: How to reach your goal, in this case passing the CISM exam! |
3. CISM Domain 2: Information Risk Management
1. CISM Domain 2 - What we will be covering CISM Domain 1: Information Security Governance: CISM Domain 1 - What we will be covering |
2. Governance, Management, standards, and frameworks CISM Domain 1: Information Security Governance: Governance, Management, standards, and frameworks |
3. Values, vision, and mission CISM Domain 2: Information Risk Management: Risk Assessment |
4. Risk response and mitigation & Risk and Control Monitoring and Reporting CISM Domain 2: Information Risk Management: Risk response and mitigation & Risk and Control Monitoring and Reporting |
5. COBIT5 CISM Domain 2: Information Risk Management: COBIT5 |
6. Attackers, Vishing and Phishing CISM Domain 2: Information Risk Management: Attackers, Vishing and Phishing |
7. Incident Management definitions CISM Domain 2: Information Risk Management: Incident Management definitions |
8. Incident Management CISM Domain 2: Information Risk Management: Incident Management |
9. NIST 800-53 CISM Domain 2: Information Risk Management: NIST 800-53 |
10. NIST 800-37 CISM Domain 2: Information Risk Management: NIST 800-37 |
11. ISO 27001 and 27002 CISM Domain 2: Information Risk Management: ISO 27001 and 27002 |
12. OWASP part 1 CISM Domain 2: Information Risk Management: OWASP part 1 |
13. OWASP part 2 CISM Domain 2: Information Risk Management: OWASP part 2 |
14. Vulnerability scanners CISM Domain 2: Information Risk Management: Vulnerability scanners |
15. Networking basics CISM Domain 2: Information Risk Management: Networking basics |
16. SIEM (Security Information and Event Management) CISM Domain 2: Information Risk Management: SIEM (Security Information and Event Management) |
17. The OSI model CISM Domain 2: Information Risk Management: The OSI model |
18. The TCP/IP model CISM Domain 2: Information Risk Management: The TCP/IP model |
19. IP addresses and port numbers part 1 CISM Domain 2: Information Risk Management: IP addresses and port numbers part 1 |
20. IP addresses and port numbers part 2 CISM Domain 2: Information Risk Management: IP addresses and port numbers part 2 |
21. IP support protocols CISM Domain 2: Information Risk Management: IP support protocols |
22. Cable types CISM Domain 2: Information Risk Management: Cable types |
23. LAN topologies CISM Domain 2: Information Risk Management: LAN topologies |
24. Layer 1 to 3 networking devices CISM Domain 2: Information Risk Management: Layer 1 to 3 networking devices |
25. Firewalls CISM Domain 2: Information Risk Management: Firewalls |
26. Intrusion detection and prevention systems CISM Domain 2: Information Risk Management: Intrusion detection and prevention systems |
27. 0-day attacks CISM Domain 2: Information Risk Management: 0-day attacks |
28. Network authentication protocols CISM Domain 2: Information Risk Management: Network authentication protocols |
29. WIFI CISM Domain 2: Information Risk Management: WIFI |
30. Bluetooth CISM Domain 2: Information Risk Management: Bluetooth |
31. Honeynets and Honeypots CISM Domain 2: Information Risk Management: Honeynets and Honeypots |
32. Secure communications CISM Domain 2: Information Risk Management: Secure communications |
33. Mobile device security CISM Domain 2: Information Risk Management: Mobile device security |
34. Application white-listing CISM Domain 2: Information Risk Management: Application white-listing |
35. Virtualization CISM Domain 2: Information Risk Management: Virtualization |
36. Database security CISM Domain 2: Information Risk Management: Database security |
37. Software vulnerabilities and Attacks CISM Domain 2: Information Risk Management: Software vulnerabilities and Attacks |
38. System vulnerabilities, threats, and countermeasures CISM Domain 2: Information Risk Management: System vulnerabilities, threats, and countermeasures |
39. Physical security part 1 CISM Domain 2: Information Risk Management: Physical security part 1 |
40. Physical security part 2 CISM Domain 2: Information Risk Management: Physical security part 2 |
41. Physical security part 3 CISM Domain 2: Information Risk Management: Physical security part 3 |
42. Site Selection CISM Domain 2: Information Risk Management: Site Selection |
43. Fire suppression and hot and cold aisles CISM Domain 2: Information Risk Management: Fire suppression and hot and cold aisles |
44. Electricity CISM Domain 2: Information Risk Management: Electricity |
45. Backups CISM Domain 2: Information Risk Management: Backups |
46. RAID (Redundant Array of Independent Disks) CISM Domain 2: Information Risk Management: RAID (Redundant Array of Independent Disks) |
47. Redundancy CISM Domain 2: Information Risk Management: Redundancy |
48. Media storage CISM Domain 2: Information Risk Management: Media storage |
49. IOT (Internet Of Things) CISM Domain 2: Information Risk Management: IOT (Internet Of Things) |
50. CISM Domain 2 - What we covered CISM Domain 2: Information Risk Management: CISM Domain 2 - What we covered |
4. The exam and life after it
1. The CISM exam itself, how to mentally and physically prepare for it The exam and life after it: The CISM exam itself, how to mentally and physically prepare for it |
2. Life after passing the CISM certification and being endorsed The exam and life after it: Life after passing the CISM certification and being endorsed |
3. I failed, now what should I do? The exam and life after it: I failed, now what should I do? |