CISM Cert Prep: 2 Information Risk Management

Go to class
Write Review

Free Online Course: CISM Cert Prep: 2 Information Risk Management provided by LinkedIn Learning is a comprehensive online course, which lasts for 3-4 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. CISM Cert Prep: 2 Information Risk Management is taught by Mike Chapple.

Overview
  • Prepare to pass the Certified Information Security Manager (CISM) exam. Explore the detailed information you need to prepare for the Information Risk Management exam domain.

Syllabus
  • Introduction

    • Information risk management
    • What you need to know
    • Study resources
    1. Risk Assessment
    • Risk assessment
    • Quantitative risk assessment
    • Information classification
    2. Risk Management
    • Risk treatment options
    • Security control selection and implementation
    • Ongoing risk management
    • Risk management frameworks
    • Risk visibility and reporting
    3. Malware
    • Comparing viruses, worms, and trojans
    • Comparing adware, spyware, and ransomware
    • Understanding backdoors and logic bombs
    • Botnets
    • Advanced persistent threats
    4. Understanding Attackers
    • Cybersecurity adversaries
    • Preventing insider threats
    • Threat intelligence
    5. Attack Types
    • Denial of service attacks
    • Eavesdropping attacks
    • Network attacks
    • Network address spoofing
    • Password attacks
    • Watering hole attacks
    6. Social Engineering Attacks
    • Social engineering
    • Impersonation attacks
    • Physical social engineering
    7. Vulnerability Scanning and Penetration Testing
    • Security assessment tools
    • Scanning for vulnerabilities
    • Assessing threats
    • Threat assessment techniques
    • Penetration testing
    • Advanced vulnerability scanning
    8. Awareness and Training
    • Security policy training and procedures
    • Compliance training
    • User habits
    • User-based threats
    • Measuring compliance and security posture
    • Awareness program reviews
    9. Business Continuity
    • Business continuity planning
    • Business continuity controls
    • High availability and fault tolerance
    10. Disaster Recovery
    • Disaster recovery planning
    • Backups
    • Validating backups
    • Disaster recovery sites
    • Testing BC/DR plans
    11. Supply Chain Risk
    • Managing vendor relationships
    • Vendor agreements
    • Vendor information management
    12. Compliance
    • Legal and regulatory compliance
    • Privacy compliance
    • Intellectual property
    • Data breaches
    Conclusion
    • What's next?