UOP-CMGT559 - Certified Information Security Manager (CISM)

Lessons
Lab
Lab (Add-on)
TestPrep

Skills You’ll Get

1

Risk and Security vs. Opportunity

2

Information Security Governance

  • Security Strategy
  • Information Security Governance framework 
  • Integrating security governance into corporate governance
  • Security Policies: standards, procedures, and guidelines 
  • Business cases to support investments 
  • Internal and external influences on information security strategy 
  • Management and other stakeholder commitment 
  • Roles and Responsibilities 
  • Measuring the effectiveness of the information security strategy 
3

Information Risk Management and Compliance 

  • Information asset classification 
  • Risk management, assessments, vulnerability assessments and threat analyses 
  • Risk treatment options 
  • Manage risk of noncompliance
  • Information security controls
  • Current and desired risk levels: Gap analysis
  • Monitoring risk
4

Information Security Program Development and Management

  • Alignment of IS program with information security strategy
  • Information security manager's role and responsibilities in alignment
  • Information security frameworks
  • Information security architectures
  • Evaluating the effectiveness and efficiency of the IS program
  • Integrating the IS program with IT processes
  • Integrating the IS program into contracts and activities of third parties
  • Controls and countermeasures
  • Security Program Metrics and Monitoring
5

Information Security Incident Management

  • Organizational definition and severity hierarchy for security incidents
  • Incident response plan
  • Processes for timely identification
  • Testing and review
  • Investigating and documenting information security incidents
  • Integration of incident response plan, disaster recovery plan and business continuity plan
6

Managing Risks in Complex Organizations

  • Business Case, Budgetary Reporting Methods And Planning Strategy
  • Baseline And BIAs

1

Risk and Security vs. Opportunity

  • Performing Vulnerability Scanning Using OpenVAS
  • Conducting Vulnerability Scanning Using Nessus
  • Performing Vulnerability Scanning Using OSSIM
2

Information Security Governance

  • Demonstrating Network Mapping and Quarantining a Vulnerable System
  • Using Social Engineering Techniques to Plan an Attack
  • Configuring User Access Control Settings
  • Configuring the Audit Group Policy 
3

Information Risk Management and Compliance 

  • Using the Windows Firewall
  • Configuring IPSec
  • Configuring a VPN
  • Configuring VLAN
4

Information Security Program Development and Management

  • Using OpenSSL to Create a Public/Private Key Pair
  • Taking a Full Backup
  • Enabling Intrusion Prevention and Detection
  • Taking an Incremental Backup

1

Information Risk Management and Compliance 

  • Assigning File or Folder Permissions
  • Configuring a Linux Firewall Using Iptables

Related Courses

All Course
scroll to top