Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CISM Cert Prep: 1 Information Security Governance

Description

Prepare for the first domain of the Certified Information Security Manager (CISM) certification exam: Information Security Governance.

Tags

Syllabus

Syllabus IntroductionInformation security governanceWhat you need to know1. Information Security StrategyThe goals of information securityDesigning an information security strategyAligning security with the businessStrategic influencesOrganizational processesSecurity roles and responsibilities2. Industry StandardsControl frameworksDeveloping security baselinesLeveraging industry standardsCustomizing security standards3. Security BudgetingDeveloping a security budgetCapital vs. operational expensesBudget monitoring and reporting4. Security GovernanceInformation security governanceSecurity governance frameworks5. Security PoliciesSecurity policy frameworkSecurity policies6. Data SecurityUnderstanding data securityData security policiesData security rolesData privacyLimiting data collectionPrivileged account management7. Navigating the OrganizationOrganizational structureObtaining leadership support8. Assessing Security ProgramsCollecting security process dataManagement review and approvalSecurity metricsAudits and assessmentsControl management9. Security PrinciplesNeed to know and least privilegeSeparation of duties and responsibilitiesConclusionWhat's next? Read more


CISM Cert Prep: 1 Information Security Governance

Affiliate notice

Prepare for the first domain of the Certified Information Security Manager (CISM) certification exam: Information Security Governance.

Syllabus IntroductionInformation security governanceWhat you need to know1. Information Security StrategyThe goals of information securityDesigning an information security strategyAligning security with the businessStrategic influencesOrganizational processesSecurity roles and responsibilities2. Industry StandardsControl frameworksDeveloping security baselinesLeveraging industry standardsCustomizing security standards3. Security BudgetingDeveloping a security budgetCapital vs. operational expensesBudget monitoring and reporting4. Security GovernanceInformation security governanceSecurity governance frameworks5. Security PoliciesSecurity policy frameworkSecurity policies6. Data SecurityUnderstanding data securityData security policiesData security rolesData privacyLimiting data collectionPrivileged account management7. Navigating the OrganizationOrganizational structureObtaining leadership support8. Assessing Security ProgramsCollecting security process dataManagement review and approvalSecurity metricsAudits and assessmentsControl management9. Security PrinciplesNeed to know and least privilegeSeparation of duties and responsibilitiesConclusionWhat's next? Read more