Certificate in Information Security Management Principles [CISMP]

DifficultyBeginner
AVG Duration13h
Students29
Ratings
5/5
starstarstarstarstar
Content
239

Description

Welcome to Certificate in Information Security Management Principles (CISMP).

You've already met your Subject Matter Expert, Mark Martin, and you're about to see Agent Smith in action. Agent Smith is a character in a Cybercrime case study.

Throughout the course, you will follow him as he infiltrates an organisation, exploits company vulnerabilities, and exposes the weaknesses in the firm’s security. You’ll also hear from our expert Mark, who will explain Smith’s actions and share effective countermeasures to combat these types of attacks.  

The course has been designed to help you learn at your own pace over a two-week period.  

When you’re ready, click on the first step below to get started. 

Certificate

Your certificate for this learning path

Training Content

1
Course - Beginner - 1h 4m
Introduction to information risk management [CISMP]
In this course, you’ll be looking at numerous aspects of the risk matrix including the risk and threats involved in big data, the Internet of Things (IoT), the dark web and social media. You'll also be exploring threat intelligence, unified threat management (UTM), and security risk. You'll also ...
2
Course - Beginner - 28m
Risk management life cycle and treatment [CISMP]
In this course, you'll be examining the risk management life cycle and treatment, you'll learn about qualitative and quantitative methods as well as risk register and asset classification.
3
Exam - 30m
Information risk management: Test yourself [CISMP D1]
Information risk management: Test yourself [CISMP D1]
4
Course - Beginner - 45m
Information life cycle [CISMP]
In this course, you will discover the structures policies and practices which provide a basis for developing the organisation’s information security.
5
Course - Beginner - 20m
Security strategy and legislation [CISMP]
This module focuses on the shareholders, personnel and documentation that go into implementing the organisation’s information assurance programme
6
Course - Beginner - 9m
Information assurance and standards [CISMP]
In this course on Malicious software, you will learn about the various types of Malicious code in detail, contrast the different types before looking at the countermeasures used to combat them. You’ll also encounter non-technical controls, and our expert Mark will show you the OWASP top ten secur...
7
Course - Beginner - 28m
Security incident management [CISMP]
In this module you’ll discover the close relationship between business continuity, disaster recovery and incident management.
8
Exam - 30m
Information Security Framework: Test yourself [CISMP D2]
Information Security Framework: Test yourself [CISMP D2]
9
Course - Beginner - 34m
Information life cycle [CISMP]
This course will explore the necessary steps to take at each part of the information life cycle.
10
Course - Beginner - 44m
Testing, audit and review [CISMP]
In this module you’ll be continuing with the information life cycle by following the process onto Test strategies and approaches through to reporting and verification and finally concluding with auditing and digital forensics.
11
Exam - 30m
Security life cycle: Test yourself [CISMP D3]
Security life cycle: Test yourself [CISMP D3]
12
Course - Beginner - 45m
Procedural and people security [CISMP]
Procedural and people security is a key part of Information Assurance. Threats are not only external; they may also originate with or involve staff/ex-staff members. Therefore, it’s essential that all staff follow correct policies and procedures so they foster an appropriate security culture.
13
Exam - 30m
Procedural and people security: Test yourself [CISMP D4]
Procedural and people security: Test yourself [CISMP D4]
14
Course - Beginner - 36m
Information Life Cycle [CISMP]
In this course on malicious software, you will learn about the various types of malicious code in detail, contrast the different types before looking at look at the countermeasures used to combat them. You’ll also encounter non-technical controls and see the OWASP top 10 security threats.
15
Course - Beginner - 31m
Networks and communications [CIMSP]
In this course you’ll take a deep dive into networks and communications controls, looking at Firewalls, DMZ and VPN among others.
16
Course - Beginner - 30m
Security issues [CISMP]
In this next course you will be taking a closer look at network security issues. These include old technologies like PSTN as well as more recent ones like VoIP, as well as staples like email and mobile.
17
Course - Beginner - 37m
Virtualisation and cloud computing [CISMP]
In this Course on virtualisation and cloud computing, you will learn about the advantages of the cloud, how it works and cloud model types.
18
Course - Beginner - 17m
IT infrastructure security
In this course on IT infrastructure security, we’ll be looking at the SD3 framework and some modern development approaches that seek to incorporate security into the development right from the beginning. You’ll also look at detection and testing in some detail.
19
Exam - 30m
Technical and Security Controls: Test yourself [CISMP D5]
Technical and Security Controls: Test yourself [CISMP D5]
20
Course - Beginner - 9m
Overview of cryptography [CISMP]
This course will begin with a brief history of cryptography, followed by an introduction into some of the security controls that rely on cryptography to this day. You will also be introduced to the four primary areas of cryptography, comprised of cipher algorithms and keys.
21
Course - Beginner - 15m
Hash Functions [CISMP]
One of four primary areas of cryptography, hash functions are the focus of this course, which is designed to inform you of their characteristics, properties, and uses.
22
Course - Beginner - 13m
Keys & models of protection [CISMP]
This course describes how keys are generated, distributed, and managed for the purpose of encoding or decoding cryptographic data. Later, you’ll explore other methods of protection aside from cryptography, to give you a more well-rounded view of asset protection.
23
Exam - 30m
Introduction to Cryptography: Test yourself [CISMP D6]
Introduction to Cryptography: Test yourself [CISMP D6]
24
Course - Beginner - 4m
Layered Security [CISMP]
This Course will begin with looking at a layered approach to security, also known as defence in depth.
25
Course - Beginner - 41m
Physical, technical, and procedural controls [CISMP]
In this Course, you’ll learn how you can protect your organisation using physical, technical, and procedural controls. Part of this Course involves learning what techniques attackers use to work around these controls, which will help you take the necessary steps to stop them should a threat arise.
26
Course - Beginner - 15m
Moving and disposal of equipment [CISMP]
This Course covers the proper ways in which to move property and securely dispose of equipment, factoring in the possible risks and threats to you along the way.
27
Course - Beginner - 6m
Security controls in practice [CISMP]
This Course demonstrates how all of the controls you have learned about so far can be utilised in the context of a delivery or loading area.
28
Exam - 30m
Physical and Environmental Controls: Test yourself [CISMP D7]
Physical and Environmental Controls: Test yourself [CISMP D7]
29
Course - Beginner - 15m
Business continuity: Why do you need it? [CISMP]
This Course will begin by helping you understand the difference between business continuity and disaster recovery. From here, there will be more focus on the value that business continuity brings, before you are introduced to the critical steps for implementing your own plan. Finally, you’ll lear...
30
Course - Beginner - 18m
Implementing Business Continuity in your Organisation [CISMP]
In this Course, you will learn about what it takes to implement your business continuity plan, which covers a wide range of activities for BCM owners to follow. You’ll later turn your attention to disaster recovery (as part of BCM), and how to document, test and communicate your plans. You’ll end...
31
Exam - 30m
Business continuity and disaster recovery: Test yourself [CISMP D8]
Business continuity and disaster recovery: Test yourself [CISMP D8]
32
Exam - 2h
CISMP MOCK Exam [CISMP]
CISMP MOCK Exam [CISMP]
About the Author
Students669
Courses1
Learning paths1

Mark was a Senior Investigating Officer working in Law Enforcement with over 31 years’ experience of working in the various government agencies including the National Crime Agency. He has handled numerous cases involving drug trafficking, money laundering, endangered species, fraud, tackling child abuse online, extortion, hacking, and various other computer crimes. Mark is an advanced mobile and digital Forensics practitioner. Mark has utilized his open-source intelligence skills to locate and identify individuals and criminal organizations online. Mark was one of the founding members of the elite team called the National Hi-Tech Crime Unit, set up in 2001 to tackle online threats.