Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Certified Information Security Manager (CISM) Cert Prep: 2 Information Security Risk Management

via LinkedIn Learning

Overview

Prepare to pass the Certified Information Security Manager (CISM) exam. Explore the detailed information you need to prepare for the Information Risk Management exam domain.

Syllabus

Introduction
  • Information security risk management
  • What you need to know
  • Study resources
1. Risk Assessment
  • Risk assessment
  • Quantitative risk assessment
  • Information classification
2. Risk Management
  • Risk treatment options
  • Security control selection and implementation
  • Ongoing risk management
  • Risk management frameworks
  • Risk visibility and reporting
3. Malware
  • Comparing viruses, worms, and Trojans
  • Malware payloads
  • Understanding backdoors and logic bombs
  • Botnets
  • Advanced persistent threats
4. Understanding Attackers
  • Cybersecurity adversaries
  • Preventing insider threats
  • Threat intelligence
5. Attack Types
  • Denial of service attacks
  • Eavesdropping attacks
  • DNS attacks
  • Layer 2 attacks
  • Network address spoofing
  • Password attacks
  • Password spraying and credential stuffing
  • Watering hole attacks
6. Social Engineering Attacks
  • Social engineering
  • Impersonation attacks
  • Physical social engineering
7. Vulnerability Scanning and Penetration Testing
  • What is vulnerability management?
  • Identify scan targets
  • Scan configuration
  • Scan perspective
  • Security Content Automation Protocol (SCAP)
  • Common Vulnerability Scoring System (CVSS)
  • Analyzing scan reports
  • Correlating scan results
8. Awareness and Training
  • Security awareness training
  • Compliance training
  • User habits
  • Measuring compliance and security posture
  • Awareness program reviews
9. Business Continuity
  • Business continuity planning
  • Business continuity controls
  • High availability and fault tolerance
10. Disaster Recovery
  • Disaster recovery planning
  • Backups
  • Restoring backups
  • Disaster recovery sites
  • Testing BC/DR plans
11. Supply Chain Risk
  • Managing vendor relationships
  • Vendor agreements
  • Vendor information management
  • Audits and assessments
  • Cloud audits
12. Compliance
  • Legal and compliance risks
  • Privacy compliance
  • Data breaches
  • Intellectual property
Conclusion
  • Continuing your studies

Taught by

Mike Chapple

Reviews

4.9 rating at LinkedIn Learning based on 14 ratings

Start your review of Certified Information Security Manager (CISM) Cert Prep: 2 Information Security Risk Management

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.