Certified Information Security Manager CISM Training
Certified Information Security Manager CISM Training
Certified Information Security Manager CISM - Online E-Learning Training. Bestellen en direct starten voor de beste prijs.
Lees meer- Merk:
- ISACA
- Kortingen:
-
- Koop 2 voor €351,82 per stuk en bespaar 2%
- Koop 3 voor €348,23 per stuk en bespaar 3%
- Koop 4 voor €344,64 per stuk en bespaar 4%
- Koop 5 voor €341,05 per stuk en bespaar 5%
- Koop 10 voor €323,10 per stuk en bespaar 10%
- Koop 25 voor €305,15 per stuk en bespaar 15%
- Koop 50 voor €287,20 per stuk en bespaar 20%
- Beschikbaarheid:
- Op voorraad
- Levertijd:
- Voor 17:00 uur besteld! Start vandaag. Gratis Verzending.
- Award Winning E-learning
- De laagste prijs garantie
- Persoonlijke service van ons deskundige team
- Betaal veilig online of op factuur
- Bestel en start binnen 24 uur
Certified Information Security Manager CISM E-Learning Training
Verwerf de kennis om de informatiebeveiliging van een onderneming te beheren, ontwerpen, overzien en beoordelen terwijl u zich voorbereidt op de CISM-certificering.
De CISM-cursus en -certificering is bedoeld voor mensen die de informatiebeveiligingsfunctie van een onderneming beheren, ontwerpen, overzien en beoordelen.
de informatiebeveiligingsfunctie van een onderneming.
Vereisten:
Vijf (5) of meer jaar ervaring in informatiebeveiligingsmanagement. Ervaringsvrijstellingen zijn
beschikbaar voor maximaal twee (2) jaar.
ISACA® Certified.
E-learning courses (21 hours +):
CISM 2022: Information Security Governance
Course: 1 Hour, 40 Minutes
- Course Overview
- Business Model for Information Security (BMIS)
- Asset Identification and Classification
- Supply Chain Security
- Personnel Management
- Information Security Programs
- Reviewing Service-level Agreements (SLAs)
- Change Management
- Configuration Management
- Organizational Security Policies
- IT Maturity Models
- Capital Versus Operating Expenses
- Chain of Custody
- Organizational Culture and Security
- Use of Control Objectives for Information Technologies (COBIT) for IT Governance
- Course Summary
CISM 2022: Business Continuity & Security
Course: 1 Hour, 13 Minutes
- Course Overview
- Business Continuity Plan (BCP) and Business Impact Analysis (BIA)
- Disaster Recovery Plan (DRP)
- Data Roles
- IT Security Roles
- Contractual Obligations
- Security Baselines
- Establishing a Performance Baseline on Windows Server
- Establishing a Performance Baseline in the Azure Cloud
- Physical Security
- Security Control Types
- Course Summary
CISM 2022: Incident Response
Course: 42 Minutes
- Course Overview
- Incident Response Plan (IRP)
- Incident Escalation
- Incident Eradication
- Incident Containment
- Post-incident Lessons Learned
- Automating Incident Response in the Cloud
- Course Summary
CISM 2022: Security Standards
Course: 53 Minutes
- Course Overview
- The European Union's General Data Protection Regulation (GDPR)
- ISO/IEC Standards
- America's Health Insurance Portability and Accountability Act (HIPAA)
- America's Federal Risk and Authorization Management Program (FedRamp)
- Payment Card Industry Data Security Standard (PCI DSS)
- Canada's Personal Information Protection and Electronic Documents Act (PIPEDA)
- China's Personal Information Protection Law (PIPL)
- Using the Cloud Controls Matrix (CCM)
- Course Summary
CISM 2022: Managing Risk
Course: 50 Minutes
- Course Overview
- Risk Management
- Annual Loss Expectancy (ALE)
- Risk Assessments
- Risk Acceptance
- Risk Avoidance
- Risk Transfer
- Risk Reduction
- Course Summary
CISM 2022: Data Privacy
Course: 57 Minutes
- Course Overview
- Personally Identifiable Information (PII)
- Data Residency
- Data Loss Prevention (DLP)
- Classifying Data with Amazon Macie
- Classifying Data with Microsoft Purview Governance
- Configuring Windows Server Data Classification
- Using Tags to Organize Cloud Resources
- Encrypting Cloud Storage
- Course Summary
CISM 2022: Assessing Risk
Course: 46 Minutes
- Course Overview
- Vulnerability Assessments
- Conducting a Network Vulnerability Assessment
- Scanning a Web Application For Vulnerabilities
- Perform a Gap Analysis
- Penetration Testing
- Viewing Cloud Resource Security Compliance
- Course Summary
CISM 2022: Managing Authentication
Course: 54 Minutes
- Course Overview
- Authentication
- Managing Amazon Web Services Users and Groups
- Managing Microsoft Azure Users and Groups
- Managing Linux Users and Groups
- Managing Windows Server Users and Groups
- Enabling Amazon Web Services IAM User MFA
- Managing Password Policies
- Identity Federation
- Course Summary
CISM 2022: Implementing Access Control
Course: 1 Hour, 2 Minutes
- Course Overview
- Authorization
- Access Control Models
- Configuring Windows Dynamic Access Control
- Administering ABAC through Azure Dynamic Groups
- Using Azure Permissions through RBAC
- Managing Windows File System Permissions
- Handling Linux File System Permissions
- Configuring Windows File System Auditing
- Using Active Directory Delegated Administration
- Course Summary
CISM 2022: Network Security
Course: 1 Hour, 11 Minutes
- Course Overview
- The OSI Model
- Network Switching and Network Access Control
- Creating a Virtualization Sandbox
- DHCP and DNS Security
- Implementing DHCP and DNS Security
- Wi-Fi Authentication Methods
- Honeypots and Honeynets
- Implementing a Honeypot
- Analyzing Captured Network Traffic
- Course Summary
CISM 2022: Network Attack Mitigation
Course: 1 Hour, 2 Minutes
- Course Overview
- Firewall Types
- Configuring Windows Defender Firewall
- Adjusting a Linux Firewall
- Manage Azure Network Security Groups (NSGs)
- Administering Microsoft Azure Firewall
- Proxy Servers
- Intrusion Detection and Prevention
- Configuring the Snort IDS Tool
- Course Summary
CISM 2022: IT Service & Data Availability
Course: 1 Hour, 17 Minutes
- Course Overview
- High Availability
- Load Balancing
- Configuring a Cloud-based Load Balancer
- Exploring Types of Data Backups
- Configuring Windows Server Backups
- Enabling Cloud Resource Backups
- Data Availability and RAID Levels
- Configure Software RAID on Windows
- Configure Software RAID on Linux
- Configuring Azure Storage Account Replication
- Enabling Azure Virtual Machine Replication
- Course Summary
CISM 2022: Common Network Security Threats
Course: 1 Hour, 15 Minutes
- Course Overview
- Threat Actor Types
- Viewing Common Vulnerabilities and Exposures (CVEs)
- Using the MITRE ATT&CK Knowledge Base
- OWASP Top 10 Web Application Attacks
- Working with Bug Bounties
- Common Wi-Fi Attacks
- SYN Flood Attacks
- Buffer Overflow Attacks
- Advanced Persistent Threat (APT)
- DDoS Attacks
- Using Internet User VPNs and the Tor Web Browser
- Course Summary
CISM 2022: Common Network Security Attacks
Course: 50 Minutes
- Course Overview
- Scanning Networks Using Nmap
- Compromising a Web Browser
- Executing a SQL Injection Attack
- Configuring a Reverse Shell
- Spoofing Network Traffic
- Executing a Distributed Denial-of-service (DDoS) Attack
- Brute Forcing Remote Desktop Protocol (RDP) Connections
- Course Summary
CISM 2022: Cloud Computing & Coding
Course: 50 Minutes
- Course Overview
- Cloud Computing Deployment Models
- Cloud Computing Service Model
- Cloud Computing and Security
- Deploying a Microsoft Azure Blueprint Environment
- The Software Development Life Cycle (SDLC)
- Secure Coding
- SecDevOps
- Course Summary
CISM 2022: Data Protection with Cryptography
Course: 1 Hour, 6 Minutes
- Course Overview
- The CIA Security Triad
- Cryptography
- Integrity
- Hardware Security Module (HSM)
- Trusted Platform Module (TPM)
- Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
- Virtual Private Networks (VPNs)
- IP Security (IPsec)
- Public Key Infrastructure (PKI)
- The PKI Certificate Lifecycle
- Course Summary
CISM 2022: Applied Cryptography
Course: 1 Hour, 16 Minutes
- Course Overview
- Generating File System Hashes Using Linux
- Generating File System Hashes Using PowerShell
- Enabling an HTTPS Binding
- Deploying a Private Certificate Authority (CA)
- Managing PKI Certificate Templates
- Acquiring PKI Certificates
- Client PKI Certificates
- Managing Windows Encrypting File System (EFS)
- Managing Microsoft BitLocker
- Managing Linux File System Encryption
- Configuring a Cloud-based User VPN
- Implementing IPsec with Windows
- Course Summary
CISM 2022: Secure Device & OS Management
Course: 1 Hour, 39 Minutes
- Course Overview
- Mobile Device Security
- Mobile Device Remote Wipe
- Centrally Managing Devices
- Securely Wiping Storage Media
- Hardening Windows Stations Using Group Policy
- Disabling SSL on Windows Servers
- Digital Forensics Hardware and Software
- Storage Area Network (SAN) Security
- Implementing a Jump Box Solution
- Configuring Microsoft Azure Managed Identities
- Device and Operating System (OS) Hardening
- Hardening a Wi-Fi Router
- Hardening a Network Printer
- Firmware and Software Patching
- Course Summary
CISM 2022: Social Engineering & Malware
Course: 43 Minutes
- Course Overview
- Social Engineering
- Malware Types
- Reviewing Phishing Attack Email Messages
- Executing a Social Engineering Attack
- Configuring Endpoint Malware Solutions
- Analyzing Infected Files
- Course Summary
CISM 2022: Security Monitoring
Course: 1 Hour, 24 Minutes
- Course Overview
- Reviewing Microsoft Defender For Cloud Recommendations
- Monitoring the Performance of Windows Hosts
- Managing Windows Event Viewer Logs
- Enabling Windows Log Forwarding
- Monitoring the Performance of Linux Hosts
- Managing Linux Logs
- Enabling Linux Log Forwarding
- Reviewing Web Server Access Logs
- Monitoring the Performance of Cloud Services
- Threat Positives and Negatives
- Security Information and Event Management (SIEM)
- Security Orchestration, Automation, and Response (SOAR)
- Using Microsoft Sentinel As a SIEM
- Course Summary
Taal | Engels |
---|---|
Kwalificaties van de Instructeur | Gecertificeerd |
Cursusformaat en Lengte | Lesvideo's met ondertiteling, interactieve elementen en opdrachten en testen |
Lesduur | 21 uur |
Voortgangsbewaking | Ja |
Toegang tot Materiaal | 365 dagen |
Technische Vereisten | Computer of mobiel apparaat, Stabiele internetverbindingen Webbrowserzoals Chrome, Firefox, Safari of Edge. |
Support of Ondersteuning | Helpdesk en online kennisbank 24/7 |
Certificering | Certificaat van deelname in PDF formaat |
Prijs en Kosten | Cursusprijs zonder extra kosten |
Annuleringsbeleid en Geld-Terug-Garantie | Wij beoordelen dit per situatie |
Award Winning E-learning | Ja |
Tip! | Zorg voor een rustige leeromgeving, tijd en motivatie, audioapparatuur zoals een koptelefoon of luidsprekers voor audio, accountinformatie zoals inloggegevens voor toegang tot het e-learning platform. |
Er zijn nog geen reviews geschreven over dit product.
OEM Office Elearning Menu Genomineerd voor 'Beste Opleider van Nederland'
OEM Office Elearning Menu is trots genomineerd te zijn voor de titel 'Beste Opleider van Nederland' door Springest, een onderdeel van Archipel. Deze erkenning bevestigt onze kwaliteit en toewijding. Hartelijk dank aan al onze cursisten.
Beoordelingen
Er zijn nog geen reviews geschreven over dit product.