Online And On-Site IT Certification Training Across The USA. CISM CISSP CASP Security+ A+ MCDBA MCST MCSE CCNA CCNP CCVP CCSP PMP ITIL Web Design Certification Courses


CISM Certified Information Security Manager Training - OnDemand Learning

YOUR TRUSTED, ON-SITE AND HOME-STUDY TRAINING PARTNER
Have you told someone about RTEK 2000 today?
 

Online, On-demand Study at Affordable Price for Certified Information Security Manager Training.
Product ID: RTK-CISM

Certified Information Security Manager Training

The Best Alternative to In-Class Training:

CISM Training Video
  • Repeat as many times as you want;
  • Full Audio, Video, and Demonstration components;
  • Interactive Hands-on-lab Simulations;
  • Mobile Access via any mobile device
  • Learn at your place
  • Schedule at your own pace and time!
best video training"...The course is well laid out and the instructor is excellent. I enjoyed the convenience of online access from anywhere. I will use your training for the next cert for sure! Thanks."
Ronald Parker, Consultant

Shortcuts to:>

Call now!  Save hundred of dollars with RTEK 2000!
Order Now! for only USD$435.00! (Orig: $495.00)

CISM certification program is developed specifically for experienced information security managersThe CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. CISM is globally recognized as the leading credential for information security managers. Requirements: Five (5) or more years of experience in information security management. Waivers are available for a maximum of two (2) years.

CISM Certified Information Security Manager course trains for CISM 2011 certification exam Our CISM Certified Information Security Manager course provides the student with the knowledge and proficiency to prepare for the globally recognized CISM 2011 certification exam. The CISM certification combines the achievement of passing a comprehensive exam with recognition of work, management and educational experience, providing you with greater credibility in the marketplace. This course will immerse the student into the subject, with in-depth coverage of the information covering the four domains that make up the "Body of Knowledge" for the CISM exam (4 hrs, 200 questions, $440 - $625 reg. fee) and will provide the student the tools to build their technical skills to manage, design, oversee and assess an enterprise's information security.

Package Includes:
  • 12 Months Online On Demand Access Featuring live instructor-led classroom sessions with full audio, video and demonstration components
  • Printable Courseware
  • Software Video Demonstrations
  • Certificate of Completion
  • Self-Assessment Lesson Review Quizzes
  • Free 1 Year Upgrade Policy
  • Mobile Access via any mobile device

The Expert Trainers:
CISM Trainer Kenneth Mayer - Certified CEH Trainer (CCSI, MCT, CCNP, CCDA)

Ken Mayer is a Microsoft Certified Trainer as well as a Certified Ethical Hacker Trainer and Security consultant. He started his career in computer technology in 1980s. He has offered a wide variety of IT training and high Chapter consulting projects for Fortune 500 companies across the United States and Western Euro pe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco in Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS.

CISM Online (On-Demand) Course Outline

Domain 01 - Information Security Governance
  • Lesson 1: Information Security Governance Overview
  • Information Security Governance Overview
  • Importance of Information Security Governance
  • Outcomes of Information Security Governance
  • Lesson 2: Effective Information Security Governance
  • Business Goals and Objectives
  • Roles and Responsibilities of Senior Management
  • Governance, Risk Management and Compliance
  • Business Model for Information Security
  • Dynamic Interconnections
  • Lesson 3: Information Security Concepts and Technologies
  • Information Security Concepts and Technologies
  • Technologies
  • Lesson 4: Information Security Manager
  • Responsibilities
  • Senior Management Commitment
  • Obtaining Senior Management Commitment
  • Establishing Reporting and Communication Channels
  • Lesson 5: Scope and Charter of Information Security Governance
  • Assurance Process Integration and Convergence
  • Convergence
  • Governance and Third-Party Relationships
  • Lesson 6: Information Security Governance Metrics
  • Metrics
  • Effective Security Metrics
  • Security Implementation Metrics
  • Strategic Alignment
  • Risk Management
  • Value Delivery
  • Resource Management
  • Performance Measurement
  • Assurance Process Integration/Convergence
  • Lesson 7: Information Security Strategy Overview
  • Another View of Strategy
  • Lesson 8: Creating Information Security Strategy
  • Information Security Strategy
  • Common Pitfalls
  • Objectives of the Information Security Strategy
  • What is the Goal?
  • Defining Objectives
  • Business Linkages
  • Business Case Development
  • Business Case Objectives
  • The Desired State
  • COBIT
  • COBIT Controls
  • COBIT Framework
  • Capability Maturity Model
  • Balanced Scorecard
  • Architectural Approaches
  • ISO/IEC 27001 and 27002
  • Risk Objectives
  • Lesson 9: Determining Current State Of Security
  • Current Risk
  • BIA
  • Lesson 10: Information Security Strategy Development
  • Elements of a Strategy
  • The Roadmap
  • Strategy Resources and Constraints
  • Lesson 11: Strategy Resources
  • Policies and Standards
  • Definitions
  • Enterprise Information Security Architectures
  • Controls
  • Countermeasures
  • Technologies
  • Personnel
  • Organizational Structure
  • Employee Roles and Responsibilities
  • Skills
  • Audits
  • Compliance Enforcement
  • Threat Assessment
  • Vulnerability Assessment
  • Risk Assessment
  • Insurance
  • Business Impact Assessment
  • Outsourced Security Providers
  • Lesson 12: Strategy Constraints
  • Legal and Regulatory Requirements
  • Physical Constraints
  • The Security Strategy
  • Lesson 13: Action Plan to Implement Strategy
  • Gap Analysis
  • Policy Development
  • Standards Development
  • Training and Awareness
  • Action Plan Metrics
  • General Metric Considerations
  • CMM4 Statements
  • Objectives for CMM4
  • Domain 01 Review
Domain 02 - Information Risk Management
  • Lesson 1: Risk Management Overview
  • Types of Risk Analysis
  • The Importance of Risk Management
  • Risk Management Outcomes
  • Risk Management Strategy
  • Lesson 2: Good Information Security Risk Management
  • Context and Purpose
  • Scope and Charter
  • Assets
  • Other Risk Management Goals
  • Roles and Responsibilities
  • Lesson 3: Information Security Risk Management Concepts
  • Technologies
  • Lesson 4: Implementing Risk Management
  • The Risk Management Framework
  • The External Environment
  • The Internal Environment
  • The Risk Management Context
  • Risk Analysis
  • Lesson 5: Risk Assessment
  • NIST Risk Assessment Methodology
  • Aggregated or Cascading Risk
  • Other Risk Assessment Approaches
  • Identification of Risks
  • Threats
  • Vulnerabilities
  • Risks
  • Analysis of Relevant Risks
  • Risk Analysis
  • Semi-Quantitative Analysis
  • Quantitative Analysis Example
  • Evaluation of Risks
  • Risk Treatment Options
  • Impact
  • Lesson 6: Controls Countermeasures
  • Controls
  • Residual Risk
  • Information Resource Valuation
  • Methods of Valuing Assets
  • Information Asset Classification
  • Determining Classification
  • Impact
  • Lesson 7: Recovery Time Objectives
  • Recovery Point Objectives
  • Service Delivery Objectives
  • Third-Party Service Providers
  • Working with Lifecycle Processes
  • IT System Development
  • Project Management
  • Lesson 8: Risk Monitoring and Communication
  • Risk Monitoring and Communication
  • Other Communications
  • Domain 02 Review
Domain 03 - Information Security Program Development
  • Lesson 1: Development of Information Security Program
  • Importance of the Program
  • Outcomes of Security Program Development
  • Effective Information Security Program Development
  • Cross Organizational Responsibilities
  • Lesson 2: Information Security Program Development Concepts
  • Technology Resources
  • Information Security Manager
  • Lesson 3: Scope and Charter of Information Security Program Development
  • Assurance Function Integration
  • Challenges in Developing Information Security Program
  • Pitfalls
  • Objectives of the Security Program
  • Program Goals
  • The Steps of the Security Program
  • Defining the Roadmap
  • Elements of the Roadmap
  • Gap Analysis
  • Lesson 4: Information Security Program Resources
  • Resources
  • Documentation
  • Enterprise Architecture
  • Controls as Strategy Implementation Resources
  • Common Control Practices
  • Countermeasures
  • Technologies
  • Personnel
  • Security Awareness
  • Awareness Topics
  • Formal Audits
  • Compliance Enforcement
  • Project Risk Analysis
  • Other Actions
  • Other Organizational Support
  • Program Budgeting
  • Lesson 5: Implementing an Information Security Program
  • Policy Compliance
  • Standards Compliance
  • Training and Education
  • ISACA Control Objectives
  • Third-party Service Providers
  • Integration into Lifecycle Processes
  • Monitoring and Communication
  • Documentation
  • The Plan of Action
  • Lesson 6: Information Infrastructure and Architecture
  • Managing Complexity
  • Objectives of Information Security Architectures
  • Physical and Environmental Controls
  • Lesson 7: Information Security Program
  • Documentation
  • Enterprise Architecture
  • Controls as Strategy Implementation Resources
  • Common Control Practices
  • Countermeasures
  • Technologies
  • Personnel
  • Security Awareness
  • Awareness Topics
  • Formal Audits
  • Compliance Enforcement
  • Project Risk Analysis
  • Other Actions
  • Other Organizational Support
  • Program Budgeting
  • Lesson 8: Implementing an Information Security Program
  • Policy Compliance
  • Standards Compliance
  • Training and Education
  • ISACA Control Objectives
  • Third-party Service Providers
  • Integration into Lifecycle Processes
  • Monitoring and Communication
  • Documentation
  • The Plan of Action
  • Lesson 9: Information Infrastructure and Architecture
  • Managing Complexity
  • Objectives of Information Security Architectures
  • Physical and Environmental Controls
  • Lesson 10: Information Security Program
  • Information Security Program Deployment Metrics
  • Metrics
  • Strategic Alignment
  • Risk Management
  • Value Delivery
  • Resource Management
  • Assurance Process Integration
  • Performance Measurement
  • Security Baselines
  • Lesson 11: Security Program Services and Operational Activities
  • IS Liaison Responsibilities
  • Cross-Organizational Responsibilities
  • Security Reviews and Audits
  • Management of Security Technology
  • Due Diligence
  • Compliance Monitoring and Enforcement
  • Assessment of Risk and Impact
  • Outsourcing and Service Providers
  • Cloud Computing
  • Integration with IT Processes
  • Domain 03 Review
Domain 04 - Information Security Incident Management
  • Lesson 1: Incident Management Overview
  • Incident Management Overview
  • Types of Events
  • Goals of Incident Management
  • Lesson 2: Incident Response Procedures
  • Incident Response Procedures
  • Importance of Incident Management
  • Outcomes of Incident Management
  • Incident Management
  • Concepts
  • Incident Management Systems
  • Lesson 3: Incident Management Organization
  • Incident Management Organization
  • Responsibilities
  • Senior Management Commitment
  • Lesson 4: Incident Management Resources
  • Policies and Standards
  • Incident Response Technology Concepts
  • Personnel
  • Roles and Responsibilities (eNotes)
  • Skills
  • Awareness and Education
  • Audits
  • Lesson 5: Incident Management Objectives
  • Defining Objectives
  • The Desired State
  • Strategic Alignment
  • Other Concerns
  • Lesson 6: Incident Management Metrics and Indicators
  • Implementation of the Security Program Management
  • Management Metrics and Monitoring
  • Other Security Monitoring Efforts
  • Lesson 7: Current State of Incident Response Capability
  • Threats
  • Vulnerabilities
  • Lesson 8: Developing an Incident Response Plan
  • Elements of an Incident Response Plan
  • Gap Analysis
  • BIA
  • Escalation Process for Effective IM
  • Help Desk Processes for Identifying Security Incidents
  • Incident Management and Response Teams
  • Organizing, Training, and Equipping the Response Staff
  • Incident Notification Process
  • Challenges in making an Incident Management Plan
  • Lesson 9: BCP/DRP
  • Goals of Recovery Operations
  • Choosing a Site Selection
  • Implementing the Strategy
  • Incident Management Response Teams
  • Network Service High-availability
  • Storage High-availability
  • Risk Transference
  • Other Response Recovery Plan Options
  • Lesson 10: Testing Response and Recovery Plans
  • Periodic Testing
  • Analyzing Test Results
  • Measuring the Test Results
  • Lesson 11: Executing the Plan
  • Updating the Plan
  • Intrusion Detection Policies
  • Who to Notify about an Incident
  • Recovery Operations
  • Other Recovery Operations
  • Forensic Investigation
  • Hacker / Penetration Methodology
  • Domain 04 Review
  • Course Closure

Course Features:

  • Video Lectures and Expert Instruction
    Practical knowledge is essential for success in a real world environment and we have chosen our instructors with this in mind - many of our instructors are business owners and have been employed in their respective fields for decades!
  • PowerPoint
    Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the user. This type of representation allows the user to better interpret the material through charts, definitions, graphs, and more...
  • Easy Navigation
    Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance through exercises.
  • Printable Study Guides
    Printable study guides for the entire course are available. This allows all material to be viewed, reviewed, and printed for viewing at a later date.
  • Review Exercises
    Each section has a review quiz to aid in the learning process by validating the comprehension of the material covered before moving on to a new section.
  • Resume Option
    All courses are resumed to where you left off last session allowing you to learn when it is convenient for you without the hassle of remembering where you where.
  • Full Motion Video
    All courses feature full-motion videos of instructors teaching the information as if they are speaking directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal lesson and learning experience.
  • Certificate of Completion
    Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.
  • Live, Hands-On Demonstrations
    Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing it on screen in front of them.
  • Mobile Access: All our training courses are now available across all mobile devices.