learning path

Certified Information Security Manager (CISM): Part 2 — Domains

Intermediate
Up to 7h 17m
462
5/5
Enhance your skill setDevelop essential skills for thriving in real-world scenarios.
Stay focused, stay committedBoost your learning journey by enrolling: stay focused, consistent and achieve your goals with ease.
Earn a certificate of completionShow your skills and build your credibility when you include them in your resume and LinkedIn profile.

This course provides a deep dive into information security and prepares you for the Certified Information Security Manager (CISM) exam.

By the time you reach the end of this course, you will have a comprehensive understanding of information security and will be well equipped to take the CISM exam.

If you have any feedback relating to this course, please contact us at support@cloudacademy.com.

Learning Objectives

  • Obtain a comprehensive understanding of information security and risk management including roles, functions, resources, goals, strategies, metrics, controls
  • Understand how an organization can identify and analyze risk and learn the constraints to risk management
  • Get a solid understanding of how to build risk management action plan, how people and process are essential for risk management
  • Learn about the training, the technical aspects, and standards for risk management
  • Understanding how to monitor and measure risk, and also mitigate risk through controls
  • Understand how to set goals and strategies for managing information security and learn about the metrics used to measure security performance
  • Obtain a solid understanding of security incident management, set goals for responding to incidents, and understand the additional resources that help for managing incidents

Intended Audience

This course is intended for anyone studying for the Certified Information Security Manager (CISM) exam or who simply wants to learn about information security in general.

Prerequisites

This is a beginner-level course so you don't need to have existing knowledge of information security. We do, however, strongly recommend that you take the CISM: Part 1 — Foundations course before embarking on this one.

Your certificate for this learning path

About the Author

Students
11,971
Courses
76
Learning paths
24

Mr. Leo has been in Information System for 38 years, and an Information Security professional for over 36 years.  He has worked internationally as a Systems Analyst/Engineer, and as a Security and Privacy Consultant.  His past employers include IBM, St. Luke’s Episcopal Hospital, Computer Sciences Corporation, and Rockwell International.  A NASA contractor for 22 years, from 1998 to 2002 he was Director of Security Engineering and Chief Security Architect for Mission Control at the Johnson Space Center.  From 2002 to 2006 Mr. Leo was the Director of Information Systems, and Chief Information Security Officer for the Managed Care Division of the University of Texas Medical Branch in Galveston, Texas.

 

Upon attaining his CISSP license in 1997, Mr. Leo joined ISC2 (a professional role) as Chairman of the Curriculum Development Committee, and served in this role until 2004.   During this time, he formulated and directed the effort that produced what became and remains the standard curriculum used to train CISSP candidates worldwide.  He has maintained his professional standards as a professional educator and has since trained and certified nearly 8500 CISSP candidates since 1998, and nearly 2500 in HIPAA compliance certification since 2004.  Mr. leo is an ISC2 Certified Instructor.

Covered Topics