CMGTCB559 - Certified Information Security Manager (CISM)

(UOP-CMGTCB559.AE2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Risk and Security vs. Opportunity 

  • Information Security Objectives
  • Role of the Information Security Manager
  • Information Security Risks
  • Building an Information Security Strategy
  • Implementing Security Controls
  • Data Protection
2

Information Security Governance

  • Governance
  • Understanding Policy Documents
  • Complying with Laws and Regulations
  • Adopting Standard Frameworks
  • Security Control Verification and Quality Control
3

Information Risk Management

  • Analyzing Risk
  • Risk Treatment and Response
  • Risk Analysis
  • Disaster Recovery Planning
  • Privacy
  • Exploring Cybersecurity  Threats
  • Threat Data and Intelligence
4

Information Security Program Development and Management 

  • Information Security Programs
  • Security Awareness and Training
  • Managing the Information Security Team
  • Managing the Security Budget
  • Integrating Security with Other Business Functions
  • Vulnerability Management
  • Security Vulnerabilities
  • Penetration  Testing
  • Training and Exercises
  • Endpoint Security
  • Network Security
  • Cloud Computing Security
  • Cryptography
  • Code Security
  • Identity and Access Management
5

Information Security Incident Management 

  • Security Incidents
  • Phases of Incident Response
  • Building the Incident Response Plan
  • Creating an Incident Response Team
  • Coordination and Information Sharing
  • Classifying Incidents
  • Conducting Investigations
  • Plan Training, Testing, and Evaluation
6

Managing Risks in Complex Organizations

  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Analysis
  • Continuity Planning
  • Plan Approval and Implementation
  • The Nature of Disaster
  • System Resilience, High Availability, and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance

1

Information Security Program Development and Management 

  • Using Nikto
  • Consulting a Vulnerability Database
  • Configuring a Nessus Scan
  • Performing Passive Reconnaissance
  • Performing Active Reconnaissance
  • Simulating the DDoS Attack
  • Enabling Intrusion Detection and Prevention
  • Creating a VPN Connection
  • Implementing Port Security
  • Creating a Virtual LAN
2

Information Security Incident Management 

  • Completing the Chain of Custody
3

Managing Risks in Complex Organizations

  • Configuring RAID
  • Taking an Incremental Backup
  • Taking a Full Backup

Related Courses

All Courses
scroll to top