Certified Information Security Manager (CISM) Cert Prep: 2 Information Security Risk Management

  • 3-4 hours worth of material
  • LinkedIn Learning
  • English
Certified Information Security Manager (CISM) Cert Prep: 2 Information Security Risk Management

Course Overview

Prepare to pass the Certified Information Security Manager (CISM) exam. Explore the detailed information you need to prepare for the Information Risk Management exam domain.

Course Circullum

Introduction
  • Information security risk management
  • What you need to know
  • Study resources
1. Risk Assessment
  • Risk assessment
  • Quantitative risk assessment
  • Information classification
2. Risk Management
  • Risk treatment options
  • Security control selection and implementation
  • Ongoing risk management
  • Risk management frameworks
  • Risk visibility and reporting
3. Malware
  • Comparing viruses, worms, and Trojans
  • Malware payloads
  • Understanding backdoors and logic bombs
  • Botnets
  • Advanced persistent threats
4. Understanding Attackers
  • Cybersecurity adversaries
  • Preventing insider threats
  • Threat intelligence
5. Attack Types
  • Denial of service attacks
  • Eavesdropping attacks
  • DNS attacks
  • Layer 2 attacks
  • Network address spoofing
  • Password attacks
  • Password spraying and credential stuffing
  • Watering hole attacks
6. Social Engineering Attacks
  • Social engineering
  • Impersonation attacks
  • Physical social engineering
7. Vulnerability Scanning and Penetration Testing
  • What is vulnerability management?
  • Identify scan targets
  • Scan configuration
  • Scan perspective
  • Security Content Automation Protocol (SCAP)
  • Common Vulnerability Scoring System (CVSS)
  • Analyzing scan reports
  • Correlating scan results
8. Awareness and Training
  • Security awareness training
  • Compliance training
  • User habits
  • Measuring compliance and security posture
  • Awareness program reviews
9. Business Continuity
  • Business continuity planning
  • Business continuity controls
  • High availability and fault tolerance
10. Disaster Recovery
  • Disaster recovery planning
  • Backups
  • Restoring backups
  • Disaster recovery sites
  • Testing BC/DR plans
11. Supply Chain Risk
  • Managing vendor relationships
  • Vendor agreements
  • Vendor information management
  • Audits and assessments
  • Cloud audits
12. Compliance
  • Legal and compliance risks
  • Privacy compliance
  • Data breaches
  • Intellectual property
Conclusion
  • Continuing your studies
out of 5.0
5 Star 85%
4 Star 75%
3 Star 53%
1 Star 20%

Item Reviews - 3

Submit Reviews

Free Trial Available

This Course Include:
Introduction
  • Information security risk management
  • What you need to know
  • Study resources
1. Risk Assessment
  • Risk assessment
  • Quantitative risk assessment
  • Information classification
2. Risk Management
  • Risk treatment options
  • Security control selection and implementation
  • Ongoing risk management
  • Risk management frameworks
  • Risk visibility and reporting
3. Malware
  • Comparing viruses, worms, and Trojans
  • Malware payloads
  • Understanding backdoors and logic bombs
  • Botnets
  • Advanced persistent threats
4. Understanding Attackers
  • Cybersecurity adversaries
  • Preventing insider threats
  • Threat intelligence
5. Attack Types
  • Denial of service attacks
  • Eavesdropping attacks
  • DNS attacks
  • Layer 2 attacks
  • Network address spoofing
  • Password attacks
  • Password spraying and credential stuffing
  • Watering hole attacks
6. Social Engineering Attacks
  • Social engineering
  • Impersonation attacks
  • Physical social engineering
7. Vulnerability Scanning and Penetration Testing
  • What is vulnerability management?
  • Identify scan targets
  • Scan configuration
  • Scan perspective
  • Security Content Automation Protocol (SCAP)
  • Common Vulnerability Scoring System (CVSS)
  • Analyzing scan reports
  • Correlating scan results
8. Awareness and Training
  • Security awareness training
  • Compliance training
  • User habits
  • Measuring compliance and security posture
  • Awareness program reviews
9. Business Continuity
  • Business continuity planning
  • Business continuity controls
  • High availability and fault tolerance
10. Disaster Recovery
  • Disaster recovery planning
  • Backups
  • Restoring backups
  • Disaster recovery sites
  • Testing BC/DR plans
11. Supply Chain Risk
  • Managing vendor relationships
  • Vendor agreements
  • Vendor information management
  • Audits and assessments
  • Cloud audits
12. Compliance
  • Legal and compliance risks
  • Privacy compliance
  • Data breaches
  • Intellectual property
Conclusion
  • Continuing your studies
  • Provider:LinkedIn Learning
  • Certificate:Certificate Available
  • Language:English
  • Duration:3-4 hours worth of material
  • Language CC:

Do You Have Questions ?

We'll help you to grow your career and growth.
Contact Us Today