IT Security MentorIT Security Mentor
  • Home
  • About Us
  • Courses

    Select Categories

    • All
    • Cloud Course
      • AWS
    • CompTIA
    • Cyber Security
      • CEH V10
    • Ethical Hacking
    • Network Security

    About Courses

    • Courses Archive
    • Become an Instructor
    • Instructor Profile

    Get 35% of in this month join IT Security Mentor and get Certified Today.

  • Mentors
  • Events
  • Jobs Oriented Course
    • Expert Diploma In Cyber Security
    • Our 6 Months Course
  • Internship
    • Ethical Hacking Internship
    • VAPT Internship Program
  • Services
    • Web Application VAPT Services
    • Network Security VAPT Services

    All

    • Home
    • All courses
    • All
    • Certified Information Systems Manager (CISM)
    CoursesCyber SecurityCertified Information Systems Manager (CISM)
    • Information Security Governance 8

      • Lecture1.1
        Develop an Information Security Strategy
      • Lecture1.2
        Align Information Security Strategy with Corporate Governance
      • Lecture1.3
        Identify Legal and Regulatory Requirements
      • Lecture1.4
        Justify Investment in Information Security
      • Lecture1.5
        Identify Drivers Affecting the Organization
      • Lecture1.6
        Obtain Senior Management Commitment to Information Security
      • Lecture1.7
        Define Roles and Responsibilities for Information Security
      • Lecture1.8
        Establish Reporting and Communication Channels
    • Information Risk Management 7

      • Lecture2.1
        Implement an Information Risk Assessment Process
      • Lecture2.2
        Determine Information Asset Classification and Ownership
      • Lecture2.3
        Conduct Ongoing Threat and Vulnerability Evaluations
      • Lecture2.4
        Conduct Periodic BIAs
      • Lecture2.5
        Identify and Evaluate Risk Mitigation Strategies
      • Lecture2.6
        Integrate Risk Management into Business Life Cycle Processes
      • Lecture2.7
        Report Changes in Information Risk
    • Information Security Program Development 9

      • Lecture3.1
        Develop Plans to Implement an Information Security Strategy
      • Lecture3.2
        Security Technologies and Controls
      • Lecture3.3
        Specify Information Security Program Activities
      • Lecture3.4
        Coordinate Information Security Programs with Business Assurance Functions
      • Lecture3.5
        Identify Resources Needed for Information Security Program Implementation
      • Lecture3.6
        Develop Information Security Architectures
      • Lecture3.7
        Develop Information Security Policies
      • Lecture3.8
        Develop Information Security Awareness, Training, and Education Programs
      • Lecture3.9
        Develop Supporting Documentation for Information Security Policies
    • Information Security Program Implementation 3

      • Lecture4.1
        Integrate Information Security Requirements into Organizational Processes
      • Lecture4.2
        Integrate Information Security Controls into Contracts
      • Lecture4.3
        Create Information Security Program Evaluation Metrics
    • Information Security Program Management 9

      • Lecture5.1
        Manage Information Security Program Resources
      • Lecture5.2
        Enforce Policy and Standards Compliance
      • Lecture5.3
        Enforce Contractual Information Security Controls
      • Lecture5.4
        Enforce Information Security During Systems Development
      • Lecture5.5
        Maintain Information Security Within an Organization
      • Lecture5.6
        Provide Information Security Advice and Guidance
      • Lecture5.7
        Provide Information Security Awareness and Training
      • Lecture5.8
        Analyze the Effectiveness of Information Security Controls
      • Lecture5.9
        Resolve Noncompliance Issues
    • Incident Management and Response 9

      • Lecture6.1
        Develop an Information Security Incident Response Plan
      • Lecture6.2
        Establish an Escalation Process
      • Lecture6.3
        Develop a Communication Process
      • Lecture6.4
        Integrate an IRP
      • Lecture6.5
        Develop IRTs
      • Lecture6.6
        Test an IRP
      • Lecture6.7
        Manage Responses to Information Security Incidents
      • Lecture6.8
        Perform an Information Security Incident Investigation
      • Lecture6.9
        Conduct Post-Incident Reviews
      This content is protected, please login and enroll course to view this content!
      Prev Enforce Information Security During Systems Development
      Next Provide Information Security Advice and Guidance

      Leave A Reply Cancel reply

      Your email address will not be published. Required fields are marked *

      All Courses

      • All
      • Cloud Course
        • AWS
      • CompTIA
      • Cyber Security
        • CEH V10
      • Ethical Hacking
      • Network Security

      Latest Courses

      Cisco Networking Basics Specialization

      Cisco Networking Basics Specialization

      ₹28,000.00 ₹26,500.00
      Certified in Risk and Information Systems Control

      Certified in Risk and Information Systems Control

      ₹30,000.00 ₹29,000.00
      Palo Alto Networks Academy Cyber security Foundation

      Palo Alto Networks Academy Cyber security Foundation

      ₹30,000.00 ₹29,500.00

      Create your free account now and get immediate access to 100s of online courses.

      cyber security course

      +91-7799583079

      support@itsecuritymentor.com

      Company

      • About Us
      • Blog
      • Contact
      • Become a Teacher

      Links

      • Courses
      • Events
      • Gallery
      • FAQs

      Support

      • Activity
      • Cart
      • FAQs
      • My Account

      Recommend

      • Industrial Training
      • Workshops
      • Internship
      • Services

      ©2019 By: ITSM Powered By: DleafTech

      • Privacy
      • Terms
      • Sitemap