Information Security Manager: Intermediate

  • 11 Courses | 12h 43m 43s
  • 7 Books | 41h 5m
  • Includes Test Prep
Likes 99 Likes 99
 
Information security management is crucial to organizations. Explore the development and management of information security programs.

GETTING STARTED

CISM 2020: Information Security & Business Process Alignment

  • Playable
    1. 
    Course Overview
    2m 5s
    NOW PLAYING
  • Playable
    2. 
    Information Security Management
    3m 30s
    UP NEXT

COURSES INCLUDED

CISM 2020: Information Security & Business Process Alignment
Proper IT governance starts with aligning IT solutions with business processes. In this course, you'll explore how to identify the relationship between IT security and business objectives. You'll examine in detail how various regulations and security standards, such as HIPAA, GDPR, and PCI DSS, can influence an organization's IT security decisions, going through seven of such regulations one-by-one. Next, you'll examine the cloud services, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) to determine how responsibility is divided between provider and consumer. Lastly, you'll investigate several public cloud providers' security accreditations. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.
14 videos | 1h 19m has Assessment available Badge
CISM 2020: Managing IT Risk
Using on-premises and cloud computing IT environments introduces an element of risk. In this course, you'll explore risk management concepts, including gap analysis and SWOT, as well as strategies to manage risk, such as applying risk treatments and creating a risk register. Additionally, you'll outline data governance and examine the responsibilities of specific data roles, including the data owner and data custodian. You'll then work with data classification using Amazon Macie and Microsoft FSRM. Moving on, you'll learn how to tag cloud resources and carry out cloud risk assessments. You'll explore how to determine if specific security controls are worth implementing to protect assets. Lastly, you'll investigate how to establish a security awareness program through the organization. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.
14 videos | 1h 26m has Assessment available Badge
CISM 2020: Cryptography & PKI
Securing data at rest and in transit over a network is accomplished through the use of cryptography. In this course, you'll explore the concepts of hashing and encryption. You'll start by studying how cryptography addresses IT security before gaining hands-on experience generating file hashes and encrypting data at rest. Some of the methods you'll practice will be using Microsoft EFS and AxCrypt to protect files, Microsoft BitLocker to protect disk volumes, PuTTYgen to generate key pairs, and wiping disk data. Moving along, you'll examine and work with PKI certificate authorities, deploying and requesting both Microsoft and AWS certificate authorities. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.
14 videos | 1h has Assessment available Badge
Information Security Governance Part I
Explore the information security strategy techniques and best practices for a governance framework to meet your organizational goals and objectives.
11 videos | 1h 18m has Assessment available Badge
Information Security Governance Part II
Examine the roles and security responsibilities of organizational staff, as well as effective communication and reporting techniques needed as part of an effective security governance framework.
10 videos | 1h 15m has Assessment available Badge
Information Risk Management Part I
Discover how to implement an effective information risk management strategy for your organization, including how to recognize information asset classification, ownership, and threats, vulnerabilities, and exposures.
10 videos | 58m has Assessment available Badge
Information Risk Management Part II
Explore risk assessment and analysis methodologies, such as risk treatment, risk response, and gap analysis techniques, that can be used as part of your organization’s risk management strategy.
11 videos | 57m has Assessment available Badge
Information Security Program Development Part I
Create an effective information security program by examining the security technologies available, as well as techniques and best practices involved in meeting security regulations, standards, and guidelines.
9 videos | 56m has Assessment available Badge
Information Security Program Development Part II
Information security is only effective if everyone involved is on-board and properly trained. Discover how to develop security awareness and training programs, and how to implement and test the effectiveness of security controls.
9 videos | 1h has Assessment available Badge
Information Security Incident Management Part I
Explore the fundamentals of security incident management, including methods for classifying incidents, roles, responsibilities, and training for incident response team members, and notification and escalation processes.
10 videos | 1h 4m has Assessment available Badge
Information Security Incident Management Part II
Security incidents can have a huge cost factor on an organization. Examine incident logging, analyzing, and documenting, as well as techniques for responding to and recovering from information security incidents.
10 videos | 1h 4m has Assessment available Badge
SHOW MORE
FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Practical Information Security Management: A Complete Guide to Planning and Implementation
Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information security practice, hire the right people, and strike the best balance between security controls, costs, and risks.
Book Duration 6h 51m Book Authors By Tony Campbell

Book

Information Security Policies, Procedures, and Standards: A Practitioner's Reference
Highlighting key terminology, policy development concepts and methods, and suggested document structures, this practical guide includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards.
Book Duration 3h 18m Book Authors By Douglas J. Landoll

Book

Assessing Information Security: Strategies, Tactics, Logic and Framework, Second Edition
Providing expert guidance on information security, underpinned by a profound understanding of human conflict, this book draws on the work of Clausewitz and Sun Tzu, and applies it to the understanding of information security.
Book Duration 5h 33m Book Authors By Andrew Vladimirov, Andriej Michajlowski, Konstantin Gavrilenko

Book

Building Effective Cybersecurity Programs: A Security Manager’s Handbook
Intended to give you the knowledge and guidance that will allow you to choose wisely and avoid pitfalls, this practical resource lays out a step-by-step roadmap you can follow as you build or enhance your cybersecurity program.
Book Duration 4h 11m Book Authors By Tari Schreider

Book

Information Technology Risk Management and Compliance in Modern Organizations
Including extensive coverage on a broad range of topics, this book is a pivotal reference source featuring the latest scholarly research on the need for an effective chain of information management and clear principles of information technology governance.
Book Duration 6h 41m Book Authors By John Walp, Manish Gupta, Pavankumar Mulgund (eds), Raj Sharman

Book

Information Security for Managers
Utilizing an incremental development method called knowledge scaffolding, this text provides an overview of conceptual and applied knowledge of information and systems security.
Book Duration 13h 39m Book Authors By Daniel C. Phelps, John N. Gathegi, Michael Workman

Book

Lessons Learned: Critical Information Infrastructure Protection: How to Protect Critical Information Infrastructure
Helping you understand how to protect your critical information infrastructure (CII), this book aims to teach the IT framework from within, allowing you to reduce dependence on IT systems and put in place the necessary processes and procedures to help protect your CII.
Book Duration 52m Book Authors By Toomas Viira
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Likes 187 Likes 187  
CHANNEL Security Trends
Likes 39 Likes 39