Let Me Study

Search My One on One Tutor

Select Your Favourite
Category And Start Learning.

( 0 Review )

CISM Training

Original price was: Rs 57,000.00.Current price is: Rs 47,999.00.
Course Level

All Levels

Total Hour

40h

Video Tutorials

137

Course Content

Domain 01: Information Security Governance

  • Lesson One: Information Security Governance Overview
    00:00
  • Information Security Governance Overview Part One
    00:00
  • Information Security Governance Overview Part Two
    00:00
  • Information Security Governance Overview Part Three
    00:00
  • Information Security Governance Overview Part Four
    00:00
  • Information Security Governance Overview Part Five
    00:00
  • Importance of Information Security Governance Part One
    00:00
  • Importance of Information Security Governance Part Two
    00:00
  • Outcomes of Information Security Governance Part one
    00:00
  • Outcomes of Information Security Governance Part Two
    00:00
  • Outcomes of Information Security Governance Part Three
    00:00
  • Outcomes of Information Security Governance Part Four
    00:00
  • Outcomes of Information Security Governance Part Five
    00:00
  • Outcomes of Information Security Governance Part Six
    00:00
  • Lesson Two: Effective Information Security Governance
    00:00
  • Business Goals and Objectives Part One
    00:00
  • Business Goals and Objectives Part Two
    00:00
  • Roles and Responsibilities of Senior Management Part One
    00:00
  • Roles and Responsibilities of Senior Management Part Two
    00:00
  • Domain Tasks Part One
    00:00
  • Domain Tasks Part Two
    00:00
  • Business Model for Information Security Part One
    00:00
  • Business Model for Information Security Part Two
    00:00
  • Business Model for Information Security Part Three
    00:00
  • Business Model for Information Security Part Four
    00:00
  • Dynamic Interconnections Part One
    00:00
  • Dynamic Interconnections Part Two
    00:00
  • Dynamic Interconnections Part Three
    00:00
  • Dynamic Interconnections Part Four
    00:00
  • Lesson Three: Information Security Concepts and Technologies
    00:00
  • Information Security Concepts and Technologies Part One
    00:00
  • Information Security Concepts and Technologies Part Two
    00:00
  • Information Security Concepts and Technologies Part Three
    00:00
  • Technologies Part One
    00:00
  • Technologies Part Two
    00:00
  • Lesson Four: Information Security Manager
    00:00
  • Responsibilities
    00:00
  • Senior Management Commitment Part One
    00:00
  • Senior Management Commitment Part Two
    00:00
  • Obtaining Senior Management Commitment Part One
    00:00
  • Obtaining Senior Management Commitment Part Two
    00:00
  • Establishing Reporting and Communication Channels Part One
    00:00
  • Establishing Reporting and Communication Channels Part Two
    00:00
  • Lesson Five: Scope and Charter of Information Security Governance
    00:00
  • Assurance Process Integration and Convergence
    00:00
  • Convergence
    00:00
  • Governance and Third-Party Relationships
    00:00
  • Lesson Six: Information Security Governance Metrics
    00:00
  • Metrics
    00:00
  • Effective Security Metrics Part One
    00:00
  • Effective Security Metrics Part Two
    00:00
  • Effective Security Metrics Part Three
    00:00
  • Effective Security Metrics Part Four
    00:00
  • Security Implementation Metrics
    00:00
  • Strategic Alignment Part One
    00:00
  • Strategic Alignment Part Two
    00:00
  • Risk Management
    00:00
  • Value Delivery
    00:00
  • Resource Management Part One
    00:00
  • Resource Management Part Two
    00:00
  • Performance Measurement
    00:00
  • Assurance Process Integration/Convergence
    00:00
  • Lesson Seven: Information Security Strategy Overview
    00:00
  • Another View of Strategy
    00:00
  • Lesson Eight: Creating Information Security Strategy
    00:00
  • Information Security Strategy
    00:00
  • Common Pitfalls Part One
    00:00
  • Common Pitfalls Part Two
    00:00
  • Objectives of the Information Security Strategy
    00:00
  • What is the Goal?
    00:00
  • Defining Objectives
    00:00
  • Business Linkages
    00:00
  • Business Case Development Part One
    00:00
  • Business Case Development Part Two
    00:00
  • Business Case Development Part Three
    00:00
  • Business Case Objectives
    00:00
  • The Desired State
    00:00
  • COBIT
    00:00
  • COBIT Controls
    00:00
  • COBIT Framework
    00:00
  • Capability Maturity Model
    00:00
  • Balanced Scorecard
    00:00
  • Architectural Approaches
    00:00
  • ISO/IEC 27001 and 27002
    00:00
  • Risk Objectives Part One
    00:00
  • Risk Objectives Part Two
    00:00
  • Lesson Nine: Determining Current State Of Security
    00:00
  • Current Risk Part One
    00:00
  • Current Risk Part Two
    00:00
  • BIA
    00:00
  • Lesson Ten: Information Security Strategy Development
    00:00
  • The Roadmap
    00:00
  • Elements of a Strategy
    00:00
  • Strategy Resources and Constraints
    00:00
  • Lesson Eleven: Strategy Resources
    00:00
  • Policies and Standards
    00:00
  • Definitions
    00:00
  • Enterprise Information Security Architectures
    00:00
  • Controls
    00:00
  • Countermeasures
    00:00
  • Technologies
    00:00
  • Personnel
    00:00
  • Organizational Structure
    00:00
  • Employee Roles and Responsibilities
    00:00
  • Skills
    00:00
  • Audits
    00:00
  • Compliance Enforcement
    00:00
  • Threat Assessment
    00:00
  • Vulnerability Assessment
    00:00
  • Risk Assessment
    00:00
  • Insurance
    00:00
  • Business Impact Assessment
    00:00
  • Outsourced Security Providers
    00:00
  • Lesson twelve: Strategy Constraints
    00:00
  • Legal and Regulatory Requirements
    00:00
  • Physical Constraints
    00:00
  • The Security Strategy
    00:00
  • Lesson Thirteen: Action Plan to Implement Strategy
    00:00
  • Gap Analysis Part One
    00:00
  • Gap Analysis Part two
    00:00
  • Gap Analysis Part Three
    00:00
  • Policy Development Part One
    00:00
  • Policy Development Part Two
    00:00
  • Standards Development
    00:00
  • Training and Awareness
    00:00
  • Action Plan Metrics
    00:00
  • General Metric Considerations Part One
    00:00
  • General Metric Considerations Part Two
    00:00
  • General Metric Considerations Part Three
    00:00
  • General Metric Considerations Part Four
    00:00
  • CMMFour Statements
    00:00
  • Objectives for CMMFour
    00:00
  • Section Review
    00:00
  • Knowledge Check
    00:00

Domain 02: Information Risk Management and Compliance

Domain 03: Information Security Program Development and Management

Domain 04: Information Security Incident Management

Class Recordings – One on One Training

About Course

CISM (Certified Information Security Manager) training is a comprehensive program designed for IT professionals aiming to excel in information security management. It focuses on key areas such as risk management, governance, incident response, and security strategy. CISM training equips individuals with the knowledge and skills needed to develop and manage an organization’s information security program effectively. It covers industry best practices and standards, enabling students to identify, assess, and mitigate information security risks. Completion of this training, along with passing the CISM certification exam, demonstrates one’s expertise in information security governance and positions them as a valuable asset in protecting an organization’s critical assets and data.

 

Show More

What Will You Learn?

  • 1. Advanced Knowledge
  • 2. Career Advancement
  • 3. Industry Recognition
  • 4. Risk Management Skills
  • 5. Regulatory Compliance
  • 6. Security Leadership
  • 7. Networking

Material Includes

  • Hours On Demanded Videos
  • Full Lifetime Access
  • Access On Mobile and TV
  • PDF Notes
  • Certification Of Complition

Requirements

  • 1. Relevant Experience
  • 2. Official Study Materials
  • 3. CISM Review Course
  • 4. Dedicated Study Time
  • 5. Practice Questions
  • 6. Exam Registration
  • 7. Adherence to Code of Ethics

Audience

  • 1. Information Security Managers
  • 2. Security Consultants
  • 3. Security Auditors
  • 4. IT Managers
  • 5. Risk Management Professionals
  • 6. IT Governance Personnel
Rs 47,999.00 Rs 57,000.00
Enrollment validity: 180 days

Material Includes

  • Hours On Demanded Videos
  • Full Lifetime Access
  • Access On Mobile and TV
  • PDF Notes
  • Certification Of Complition

Share
Share Course
Page Link
Share On Social Media

Want to receive push notifications for all major on-site activities?

✕