Course Overview

This training is a comprehensive reference guide designed to assist individuals in preparing for the ISACA CISM exam and individuals who wish to understand the roles and responsibilities of an information security manager. It is a current, comprehensive, peer-reviewed information security management global resource.

What You Will Learn

  • Learn how to establish and/or maintain an Information Security Governanace Framework
  • Learn how to manage information risk to an acceptable level based on risk appetite in oerder to meet organizational goals and objectives
  • Learn how to develop and manage Information Security Program
  • Learn how to plan
  • establish and manage the capability to detect
  • investigate
  • respond to and recover from information security incidents to minimize business impact

Program Curriculum

  • Introduction
  • Scope and Exam Info
  • $7 Million Cybersecurity Scholarship by EC-Council

  • Introduction to Information Security Governance
  • Information Security Governance Tasks
  • Information Security Strategy
  • Alignment to the Organizational Goals
  • Security Frameworks
  • IS Roles and Responsibilities
  • Integrated Governance
  • Industry Standards
  • Balanced Scorecard
  • Structure
  • Business Case
  • Security Budget
  • Security Influencers
  • Governance, Risk, and Compliance
  • Obtain Management Commitment
  • Security Management Roles
  • Organizational Structures
  • Effective Communication
  • Security Metrics
  • Chapter 2 Quiz

  • Introduction to Risk Management and Compliance
  • Information Classification
  • Responsibility Assignment
  • Evaluate Risk Impact
  • Asset Validation Methods
  • Legal and Regulatory Requirements
  • Identifying Emerging Threats
  • When It’s Time to Reassess
  • Threat Knowledge
  • Risk Assessments and Analysis Methodology
  • Risk Assessment Methodology
  • Risk Prioritization
  • Risk Factors
  • Risk Reporting
  • Risk Monitoring
  • Risk Treatment Strategies
  • Risk Baselines
  • Monitoring Security Controls
  • Gap Analysis
  • Risk Integration
  • Compliance Reporting
  • Cost Determines Treatment
  • Chapter 3 Quiz

  • Introduction to Information Security Program Development Management
  • Alignment with the Business
  • Acquire and Deploy Security Resources
  • Keep It Running
  • Controls and Counter Measures
  • Security Architecture
  • Standards and Procedures Development
  • Security Controls
  • Security Implementation
  • Awareness and Training
  • Process Integration
  • Contracts and Third Party Security
  • Security Metrics
  • Effectiveness and Applicability Testing
  • Chapter 4 Quiz

  • Introduction to Security Incident Management
  • Incident Response Plan
  • Incident Management Concepts and Practices
  • Integration with DR and BCP
  • Recovery Terms
  • Incident Classification Methods
  • Damage Containment
  • Re-plan
  • Roles and Responsibilities
  • Incident Response Tools and Equipment
  • Reliability of Evidence
  • Validation of Evidence
  • Incident Response Reporting and Procedures
  • Root Cause Analysis
  • Business Impact Analysis
  • Detecting and Analyzing Security Events
  • Incident Management System
  • Chapter 5 Quiz

Passing the Exam

Load more modules

Instructor

Luciano Ferrari

Chief Executive Officer of the IT security and data defense firm Cyology Labs™ in Montréal, Canada

Luciano Ferrari is an information security leader and IoT hacking expert. He holds multiple security certifications, including CISSP, CISM, CRISC, and PCIP, and has worked at Fortune 500 companies in both technical and leadership roles. He drives progress at his own company, LufSec, where he works on security-related issues and projects. Luciano has conducted hundreds of IT security audits and penetration tests, including audits and tests on IoT devices for cable companies. He has also leveraged his IT security expertise in manufacturing, semiconductor, financial, and educational institutions. With his background in electronics and microelectronics, his distinct specialization is definitely on hardware hacking. Luciano is passionate about sharing his knowledge with others and teaching. His other areas of expertise include IT infrastructure, networking, penetration testing, risk, vulnerability, and threat management. In private, he enjoys researching new technologies and participating at security conferences and in bug bounty programs.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8