Introduction
Introduction and overview
()
1. Governance
Information security governance
()
Frameworks
()
Governance, risk, and compliance
()
COBIT 2019
()
ISO 27000 series
()
NIST Cybersecurity Framework
()
General Data Protection Regulation (GDPR)
()
Capability Maturity Model Integration (CMMI)
()
Legal and compliance
()
Information security strategy
()
Organizational culture
()
2. Risk Management
Risk definitions
()
Bias
()
Developing a risk management program
()
NIST 800-39
()
NIST 800-30
()
Risk management lifecycle
()
Risk assessment and analysis
()
NIST SP 800-37 Rev. 1 and SDLC
()
Risk response
()
Risk action plan
()
Risk acceptance
()
Risk mitigation
()
Risk avoidance, sharing, and transfer
()
Risk scenarios
()
Risk register
()
Cost-benefit analysis and ROI
()
Risk monitoring and communications
()
Risk governance and management
()
Risk review
()
3. Information Security Program
Information security program concepts
()
Elements of an information security program
()
Business case and budget
()
Asset identification and classification
()
Management controls
()
Operational controls, part 1
()
Operational controls, part 2
()
Technical controls
()
Symmetric cryptography
()
Asymmetric cryptography
()
Integrity and non-repudiation
()
Data security and endpoint protection
()
Network protection: segmentation
()
Network address translation
()
Wireless networks
()
Network services
()
Cloud integration
()
4. Incident Management
Incident management overview
()
Incident management processes
()
Incident response plan
()
Business continuity and disaster recovery planning
()
Contingency planning and subplanning
()
Contingency planning and project initiation
()
Business impact analysis (BIA)
()
Preventive controls and contingency strategies
()
Data backup and recovery phase
()
Components of contingency plans
()
Plan testing, training, and exercise
()
ISO 27031
()
Conclusion
Course conclusion
()
Ex_Files_ISACA_CISM_Cert_Prep.zip
(408 KB)