Course curriculum
-
1
Important Notices
-
Attention !
-
Program Introduction
-
ISACA Student Membership
-
ISACA Exam Voucher
-
-
2
CISM Notes
-
CISM Notes
-
-
3
Assessments
-
Benefits of CISM Certification
-
Building Customer Confidence and International Credibility
-
Chief Audit Executives, Audit Partners, and Directors
-
Chief Privacy Officers and Data Protection Officers
-
Competency and Conduct Guidelines
-
Competency and Stakeholder Education Requirements
-
Compliance Executives and Management
-
Disclosure of Work Results
-
Due Diligence and Professional Care Requirements
-
Expanding Knowledge, Skills, and Confidence
-
Governance and Risk Management Standards
-
Increasing Marketability and Career Options
-
Introduction to CISM Certification
-
ISACA Code of Professional Ethics
-
ISACA_ Code of Ethics and Standards
-
IT Management Executives (CIOs, CTOs, Directors, Managers)
-
Meeting Employment Requirements
-
Privacy and Confidentiality Obligations
-
Privacy and Confidentiality Standards
-
Professional Conduct Guidelines
-
Security and Audit Consultants
-
Stakeholder Service Standards
-
Standards for Governance, Risk, and Security Management
-
Support for Professional Education and Development
-
Understanding CISM Certification (1)
-
Applying for the CISM Exam
-
Benefits of CISM Certification
-
Expanding Knowledge, Skills, and Confidence
-
Increasing Marketability and Career Options
-
Introduction to CISM Certification
-
ISACA_ Code of Ethics and Standards
-
Maintaining Your Certification
-
Meeting Employment Requirements
-
The Certification Process Overview
-
Understanding CISM Certification
-
Building Customer Confidence and International Credibility
-
Chief Audit Executives, Audit Partners, and Directors
-
Chief Privacy Officers and Data Protection Officers
-
Competency and Conduct Guidelines
-
Competency and Stakeholder Education Requirements
-
Compliance Executives and Management
-
Disclosure of Work Results
-
Due Diligence and Professional Care Requirements
-
Governance and Risk Management Standards
-
ISACA Code of Professional Ethics
-
IT Management Executives (CIOs, CTOs, Directors, Managers)
-
Privacy and Confidentiality Obligations
-
Privacy and Confidentiality Standards
-
Professional Conduct Guidelines
-
Requirements for Becoming a CISM Professional
-
Security and Audit Consultants
-
Stakeholder Service Standards
-
Standards for Governance, Risk, and Security Management
-
Support for Professional Education and
-
Business alignment
-
Business issue perspective and lack of commitment at board levels
-
Dependence on information systems
-
Establishment of effective organization structure and roles and responsibilities
-
Event identification
-
Executive commitment and security culture development
-
Incident response and compliance
-
Information Security Governance
-
Information security metrics
-
Information security strategy development
-
Introduction to Information Security Governance
-
Monitoring and improvement processes
-
Objectives, strategy, policy, priorities, standards, processes, controls
-
Obstacles to strategy development and execution
-
Process improvement
-
Reason for Security Governance
-
Resources needed to develop and execute a security strategy
-
Risk factors and safeguarding measures
-
Risk management
-
Security governance activities
-
Security Governance Fundamentals
-
Security strategy development
-
Access control and management, configuration, function definition, and process ownership
-
Adherence to policies, security awareness, and incident reporting
-
Aligning security metrics with business goals and objectives
-
BMIS Elements and Dynamic Interconnections
-
Business Alignment
-
Business continuity and disaster recovery planning
-
Business Model for Information Security (BMIS)
-
Business Process and Business Asset Owners
-
Competitive edge through proper security alignment
-
Consideration of culture, asset value, risk tolerance, and legal obligations
-
Culture, governing, architecture, emergence, enabling, support, and human factors
-
Custodial Responsibilities
-
Daily tasks, incident monitoring, and control of security systems
-
Defining roles, responsibilities, rank, and associated tasks in the organization
-
Delegation of asset control to IT personnel while maintaining oversight by business owners
-
Developing Metrics and the Security Balanced Scorecard
-
Efficient use of resources and long-term cost reduction strategies
-
Firewall, IDPS, anti-malware, and DLP metrics for technical and strategic insights
-
General Staff and Monitoring Responsibilities
-
Information Security Governance Metrics
-
Metrics and resource management
-
Multi-layered metrics development for audience-specific reporting
-
Network and Systems Management
-
Network architecture, engineering, and systems oversight
-
Operations and Security Operations
-
People, process, technology, and organization elements in a dynamic model
-
Providing frontline user support and IT technical assistance
-
QA and audit roles for evaluating IT system effectiveness and compliance
-
Quality Assurance and Security Audit
-
RACI charts for responsibilities and decision-making process guidance
-
Resource Management and Value Delivery
-
Risk Management and Performance Metrics
-
Risk tolerance, security incident management, and vulnerability response
-
Risk treatment, coordination of IT and security projects, and review of incidents and laws
-
Roles and Responsibilities
-
Roles in application and data design, maintenance, and testing
-
Security Steering Committee
-
Service Desk and Technical Support
-
Software Development and Data Management
-
Strategic Alignment and Balanced Scorecard
-
Understanding mission, goals, objectives, and strategies
-
reporting
-
Advanced Persistent Threats
-
Asset Classification
-
Asset Identification and Valuation
-
Asset Valuation
-
Benefits and outcomes from an information risk management perspective
-
Cloud-Based Information Assets
-
Components of a risk assessment_ asset value, vulnerabilities, threats, probability, and impact of occurrence
-
Developing a risk management strategy
-
External Environments
-
External Support
-
External Threats
-
Facilities Classification
-
Factor Analysis of Information Risk
-
Framework Components
-
GAP Analyses
-
Hardware Assets
-
Implementing a Risk Management Program
-
Importance of Risk Management
-
Information Assets
-
Information Classification
-
Information Risk Management
-
Integrating risk management into an organization’s practices and culture
-
Integration into the Environment
-
Internal Environments
-
Internal Threats
-
Monitoring and reporting risk
-
NIST Standards (NIST SP 800-39, NIST SP 800-30)
-
Outcomes of Risk Management
-
Risk assessment and risk management frameworks
-
Risk Awareness
-
Risk Communication
-
Risk Consulting
-
Risk Management Concepts
-
Risk Management Context
-
Risk Management Frameworks
-
Risk Management Life Cycle
-
Risk Management Methodologies
-
Risk Management Process
-
Risk Management Strategy
-
Risk Management Technologies
-
Risk treatment options_ mitigate, accept, transfer, avoid
-
Subsystem and Software Assets
-
System Classification
-
The risk management life-cycle process
-
The risk register
-
Threat Identification
-
Virtual Assets
-
IEC 27005
-
Business Continuity Plan
-
Continuity Plan
-
Continuity Testing
-
Disaster Recovery Plans
-
Recovery Strategies
-
Information Asset Security and Control
-
Information Asset Security Policies, Frameworks, Standards, and Guidelines
-
Information Asset Security Policies, Procedures, and Guidelines
-
Policy Development Process
-
Purpose and Benefits
-
COBIT
-
Information Security Frameworks and Standards
-