The Pearson Complete Course for CISM Certification

Video description

18+ hours of video training to prepare you for the CISM certification exam

Overview:
The Pearson Complete Course for CISM Certification offers 18 hours of targeted training to help you get the skills you need to successfully study for the CISM exam. Taught by expert author and trainer Sari Greene, the course covers the four main domains of the CISM exam: Information Security Governance, Information Security Risk Management, Information Security Program Development and Management and Incident Management. The course is also a great resource for anyone who wants to enhance their cybersecurity skills to grow their career.

The Pearson Complete Course for CISM Certification will enable you to learn the skills to design, deploy and manage security policies. The course starts with a basic introduction of the exam modules and topic domains before diving deeper into the main modules which incorporate real-world scenarios and practical applications. Each lesson concludes with a review and a quiz, giving you the opportunity to test what you have learned in the lesson. The course also provides tips and valuable information on how to answer questions and ace the CISM certification exam.

This accessible self-paced video training provides learners with more than 18 hours of in-depth exam topic assessment from one of the leading cybersecurity experts to review each exam objective, so you can use it as a complete study tool for taking the CISM certification exam.

Topics include:
Module 1: Information Security Governance
Module 2: Information Security Risk Management
Module 3: Information Security Program Development & Management
Module 4: Incident Management
Module 5: Attaining Your Certification

Skill Level:
  • Intermediate to Advanced
Learn How To:
  • Govern information and cybersecurity fundamentals
  • Strategize information strategy
  • Manage information security risk
  • Manage penetration testing
  • Develop and manage InfoSec program ecosystem
  • Design and implement wireless connectivity, firewalls, and encryption
  • Manage malware and social engineering
Who Should Take This Course:
  • Primary audience is anyone preparing for the ISACA CISM certification examination.
  • Secondary audience is anyone would be like to enhance their cybersecurity skills.
About Pearson Video Training:
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.

Table of contents

  1. Introduction
    1. Introduction
  2. Module 1: Information Security Governance
    1. Module introduction
  3. Lesson 1: Enterprise Governance
    1. Learning objectives
    2. 1.1 Information and Cybersecurity Fundamentals
    3. 1.2 Information Security Governance
    4. 1.3 Governance Roles and Responsibilities
    5. 1.4 Governance Documents
    6. 1.5 Regulatory and Compliance Requirements
    7. 1.6 Organizational and Professional Ethics
    8. 1.7 Lesson 1 Review and Quiz
  4. Lesson 2: Information Security Strategy
    1. Learning objectives
    2. 2.1 Strategy Development
    3. 2.2 Information Security Governance Frameworks
    4. 2.3 Building a Business Case
    5. 2.4 Metrics and Indicators
    6. 2.5 Audit and Assurance
    7. 2.6 Lesson 2 Review and Quiz
    8. In the Boardroom: Information Security Strategy
  5. Module 2: Information Security Risk Management
    1. Module introduction
  6. Lesson 3: Risk Landscape
    1. Learning objectives
    2. 3.1 Risk Concepts
    3. 3.2 Vulnerability Identification
    4. 3.3 Penetration Testing
    5. 3.4 Threat Actors and Attributes
    6. 3.5 Threat Modeling
    7. 3.6 Lesson 3 Review and Quiz
  7. Lesson 4: Risk Management
    1. Learning objectives
    2. 4.1 Risk Governance
    3. 4.2 Risk Assessment
    4. 4.3 Risk Analysis
    5. 4.4 Risk Response
    6. 4.5 Risk Monitoring
    7. 4.6 Lesson 4 Review and Quiz
    8. In the Boardroom: Information Risk Assessment
  8. Module 3: Information Security Program Development and Management
    1. Module introduction
  9. Lesson 5: Information Security Program Development
    1. Learning objectives
    2. 5.1 InfoSec Program Ecosystem
    3. 5.2 Information Security Frameworks and Benchmarks
    4. 5.3 Information Security Metrics
    5. 5.4 SETA Principles and Practices
    6. 5.5 Lesson 5 Review and Quiz
  10. Lesson 6: Information Security Program Management
    1. Learning objectives
    2. 6.1 Asset Classification
    3. 6.2 Controls and Countermeasures
    4. 6.3 Control Baselines
    5. 6.4 Configuration Management
    6. 6.5 Change Control
    7. 6.6 Vulnerability and Patch Management
    8. 6.7 SDLC and Collaboration
    9. 6.8 Cloud Computing
    10. 6.9 Vendor and Supply Chain Management
    11. 6.10 Lesson 6 Review and Quiz
  11. Lesson 7: Secure Design and Implementation
    1. Learning objectives
    2. 7.1 Secure Design Principles
    3. 7.2 Security Zones
    4. 7.3 Wireless Connectivity
    5. 7.4 Firewalls
    6. 7.5 Network Access Control
    7. 7.6 Access Control Management
    8. 7.7 Cryptographic Primer
    9. 7.8 Encryption
    10. 7.9 Hashing and Digital Signatures
    11. 7.10 PKI and Digital Certificates
    12. 7.11 Secure Protocols
    13. 7.12 Site and Building Security
    14. 7.13 Lesson 7 Review and Quiz
    15. In the Boardroom: Secure Design and Implementation
  12. Module 4: Incident Management
    1. Module introduction
  13. Lesson 8: Incident Management
    1. Learning objectives
    2. 8.1 Incident Management Planning
    3. 8.2 Business Impact Analysis
    4. 8.3 Resiliency Concepts
    5. 8.4 Backup and Recovery
    6. 8.5 Security Incident Response Planning
    7. 8.6 Disaster Recovery and Business Continuity Planning
    8. 8.7 Plan Readiness
    9. 8.8 Lesson 8 Review and Quiz
  14. Lesson 9: Attack Vectors
    1. Learning objectives
    2. 9.1 Malware
    3. 9.2 Social Engineering
    4. 9.3 Digital Infrastructure Attacks
    5. 9.4 Validation Attacks
    6. 9.5 Environmental Impact
    7. 9.6 Lesson 9 Review and Quiz
  15. Lesson 10: Security Incident Response
    1. Learning objectives
    2. 10.1 Incident Response
    3. 10.2 Detection and Response Tools
    4. 10.3 Evidence Handling
    5. 10.4 Forensic Examination
    6. 10.5 Disclosure and Notification
    7. 10.6 Lesson 10 Review and Quiz
    8. In the Boardroom: Incident Detection and Response
  16. Module 5: Attaining Your Certification
    1. Module introduction
  17. Lesson 11: Attaining Your CISM Certification
    1. Learning objectives
    2. 11.1 Test Taking Strategies
    3. 11.2 Test Day Expectations and Requirements
    4. 11.3 The Certification Process
  18. Summary
    1. Summary

Product information

  • Title: The Pearson Complete Course for CISM Certification
  • Author(s): Sari Greene
  • Release date: September 2022
  • Publisher(s): Pearson
  • ISBN: 0137923856