What you'll learn
- Prepare for the 2017 version of the CISM: Certified Information Security Manager Exam (the next planned CISM update is in 2022).
- Understand IT Security and Cyber Security from a management level perspective.
- Where to start on your CISM certification journey.
- Learn why you want to get your CISM certification, what it can give you.
- Clear understanding of CISM Domain 2: Information Risk Management.
Requirements
- Wanting to learn about management level IT Security and Cyber Security.
- Wanting to pass the CISM: Certified Information Security Manager Exam.
Description
Start your CISMÂ certification journey today with help from Thor Pedersen, the "Best Selling"Â and "Highest Rated"Â CISM instructor on Udemy.
The CISM certification is highly sought after by HR and recruiters, with over 30,000 open CISM jobs in the US.
In Domain 2 we will cover:
- CISM Domain 2 - What we will be covering.
- Risk Identification.
- Risk Assessment.
- Risk response and mitigation & Risk and Control Monitoring and Reporting.
- COBIT5.
- NIST 800-37.
- NIST 800-53.
- Attackers, Vishing and Phishing.
- Incident Management definitions.
- Incident Management.
- ISO 27001 and 27002
- OWASP part 1.
- OWASP part 2.
- Vulnerability scanners.
- Networking basics.
- SIEM (Security Information and Event Management).
- The OSI model.
- The TCP/IP model.
- IP addresses and port numbers part 1.
- IP addresses and port numbers part 2.
- IP support protocols.
- Cable types.
- LAN topologies.
- Layer 1 to 3 networking devices.
- Firewalls.
- Intrusion detection and prevention systems.
- 0-day attacks.
- Network authentication protocols.
- WIFI.
- Bluetooth.
- Honeynets and Honeypots.
- Secure communications.
- Mobile device security.
- Application white-listing.
- Virtualization.
- Database security.
- Software vulnerabilities and Attacks.
- System vulnerabilities, threats, and countermeasures.
- Physical security part 1.
- Physical security part 2.
- Physical security part 3.
- Site Selection.
- Fire suppression and hot and cold aisles.
- Electricity.
- Backups.
- RAID (Redundant Array of Independent Disks).
- Redundancy.
- Media storage.
- IOT (Internet Of Things).
- CISM Domain 2 - What we covered.
- CISM Domain 2 links
Prepare for the 2017 version of the Certified Information Security Manager (CISM) Certification Exam, which is what you will be tested on until the next planned CISM curriculum update by ISACAÂ in 2022.
You'll Also Get:
✔ Lifetime Access to the course and all course updates.
✔ Fast and friendly support in the Q&A section
Who this course is for:
- Anyone wanting lean more about the CISM certification!
- Anyone wanting to learn about CISM Domain 2: Information Risk Management.
- People wanting to grow their IT Security and Cyber Security knowledge.
- New and experienced IT Security professionals.
- Anyone wanting to break into IT Security.
- Students preparing for the ISACA CISM certification exam.
Course Curriculum
- 0302.Risk Identification (7:20)
- 0301.CISM Domain 2 - What we will be covering (1:23)
- 0303.Risk Assessment (13:39)
- 0304.Risk response and mitigation & Risk and Control Monitoring and Reporting (3:41)
- 0305.COBIT5 (7:16)
- 0306.Attackers, Vishing and Phishing (7:46)
- 0307.Incident Management definitions (6:16)
- 0308.Incident Management (14:16)
- 0309.NIST 800-53 (6:53)
- 0310.NIST 800-37 (7:54)
- 0311.ISO 27001 and 27002 (1:53)
- 0312.OWASP part 1 (9:06)
- 0313.OWASP part 2 (12:07)
- 0314.Vulnerability scanners (2:04)
- 0315.Networking basics (8:16)
- 0316.SIEM (Security Information and Event Management) (2:22)
- 0317.The OSI model (14:43)
- 0318.The TCPIP model (6:01)
- 0319.IP addresses and port numbers part 1 (11:07)
- 0320.IP addresses and port numbers part 2 (13:53)
- 0321.IP support protocols (16:02)
- 0322.Cable types (10:01)
- 0323.LAN topologies (9:12)
- 0324.Layer 1 to 3 networking devices (7:54)
- 0325.Firewalls (10:13)
- 0326.Intrusion detection and prevention systems (8:55)
- 0327.0-day attacks (4:16)
- 0328.Network authentication protocols (8:47)
- 0329.WIFI (13:01)
- 0330.Bluetooth (3:14)
- 0331.Honeynets and Honeypots (2:33)
- 0332.Secure communications (14:41)
- 0333.Mobile device security (4:54)
- 0334.Application white-listing (2:19)
- 0335.Virtualization (14:02)
- 0336.Database security (3:21)
- 0337.Software vulnerabilities and Attacks (5:17)
- 0338.System vulnerabilities, threats, and countermeasures (9:21)
- 0339.Physical security part 1 (9:01)
- 0340.Physical security part 2 (9:25)
- 0341.Physical security part 3 (10:13)
- 0342.Site Selection (11:08)
- 0343.Fire suppression and hot and cold aisles (9:54)
- 0344.Electricity (5:35)
- 0345.Backups (8:57)
- 0346.RAID (Redundant Array of Independent Disks) (4:34)
- 0347.Redundancy (7:31)
- 0348.Media storage (6:44)
- 0349.IOT (Internet Of Things) (1:47)
- 0350.CISM Domain 2 - What we covered (1:01)
The Course Tree is a global platform for learning courses online. The school revolves around being sustainable by providing quality education around the globe and that too at affordable prices for people who have a strong longing to learn.