Leadership Mastery: The Executive Information Security Manager
Embark on an unparalleled journey into the heart of digital protection with our premier Information Security Manager Training Series. This meticulously crafted program stands as a beacon for IT professionals poised to ascend into the echelons of management within the vibrant realm of information security. Tailored for those already versed in IT security disciplines, this series is the cornerstone for transforming seasoned professionals into master architects of cybersecurity strategy and governance.
With a curriculum that intertwines theory with real-world application, our series is not just a course—it's a transformative experience that will elevate your understanding of information security management to new heights. It's designed for the ambitious, the forward-thinking, and the determined—those who not only seek to protect but to pioneer robust security infrastructures in an ever-evolving digital landscape. For the aspirant ready to take the reins and lead the charge against cyber threats, this advanced training series is your critical next step on the prestigious infosec career path.
Key Responsibilities of an Information Security Manager:
- Developing Security Strategies: As an Information Security Manager, you’ll craft and enforce robust policies, standards, and procedures, forming a protective shield around the company’s data and technology assets.
- Risk Assessment: Your expertise in identifying, evaluating, and strategizing against security risks will be indispensable. You’ll become adept at implementing cutting-edge risk management techniques to secure corporate environments.
- Security Training Initiatives: Crafting and delivering comprehensive security awareness training will be central to your role, ensuring that all employees are equipped with best practices in data security.
- Incident Management: In your information security manager career, you’ll be the first line of defense, developing incident response plans to counter security breaches and cyber threats effectively.
- Security Architecture Oversight: You will oversee the security architecture, ensuring the integrity of firewalls, intrusion detection systems, and encryption protocols.
- Compliance and Auditing: Your work will involve regular security audits and ensuring adherence to standards such as GDPR and HIPAA, reflecting your extensive information security manager resources.
- Access and Vendor Management: You’ll manage access control systems to prevent unauthorized data breaches and assess third-party vendors to ensure they align with your organization’s stringent security standards.
- Investigations and Communications: Your role will include investigating breaches, developing security awareness programs, and maintaining transparent communication during incidents.
- Budgeting and Governance: As a steward of the information security manager work environment, you’ll manage budgets and govern security policies in line with organizational goals.
Your Learning Path
Start Here
Project Management Professional (PMP) Course Content
21 Hours 28 Minutes 101 Videos 322 Prep Questions
This course provides a foundational understanding of project management principles, helping information security managers effectively plan and execute security projects. It contributes by ensuring participants have strong project management skills as a basis for their security management roles.
Module 1: Preparing for and Taking the Exam
Preparing to Take the Exam and Instructor Introduction
Getting Certified to take the Examination
Examination Characteristics
Test Taking Tips and Techniques
Question Formats
Post Certification Requirements
Module 2: Process Domain
Process Domain and Framework defined
Predictive, Iterative, Incremental and Adaptive Project Life Cycles
Framework Definitions
Project Manager Skills
Framework Key Points to Remember
Framework Example Questions Review
Project Integration Management Knowledge Area Defined
Knowledge Area Process Mapping and Definitions
Develop Project Charter and Develop Project Management Plan
Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
Perform Integrated Change Control
Close Project or Phase
Integration Key Points to Remember
Integration Example Questions Review
Project Scope Management Knowledge Area Defined
Plan Scope Management and Collect Requirements
Nominal Group Technique (Delphi-Opinion Technique)
Define Scope and Create WBS
Breakdown Structures used in WBS Dictionary
Validate Scope and Control Scope
Defining Requirements in Agile
Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
Scope Key Points to Remember
Scope Example Questions Review
Project Schedule Management Knowledge Area Defined
Plan Schedule Management, Define Activities, and Sequence Activities
Dependencies, Predecessors, Leads, and Lags
Estimate Activity Durations
Develop Schedule
Critical Path Method
Schedule Compression
Resource Leveling, Schedule Format, and Control Schedule
Agile Estimating
Agile Schedule Planning and Reporting
Schedule Key Points to Remember and Example Question review
Project Cost Management Knowledge Area Defined
Plan Cost Management and Estimate Cost
Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
Life Cycle Costing, Status Reporting, and Determine Budget
Control Costs, and Earned Value Management
Earned Schedule, and Agile Cost Control
Cost Key Points to Remember
Cost Example Questions Review
Project Quality Management Knowledge Area Defined
Plan Quality Management
Manage Quality
Control Quality
Continuous Improvement in Agile-Adaptive Life Cycles – Kaizen and Process Analysis
Continuous Improvement in Agile-Adaptive Life Cycles – Retrospectives
Quality Key Points to Remember
Quality Example Questions Review
Project Risk Management Knowledge Area Defined
Risk Management Plan and Identify Risks
Risk Register and Issues Vs Risk
Perform Qualitative and Quantitative Risk Analysis
Plan Risk Responses
Implement Risk Responses and Monitor Risks
Agile Risk Tools and Risk Key Points to Remember
Risk Example Questions Review
Project Procurement Management Knowledge Area Defined
Plan Procurement Management and Conduct Procurements
Contracts
Share and Point of Total Assumption
Procurement Documents
Non-Competitive Awards and Control Procurements
Agile Contracts
Procurement Key Points to Remember and Example Questions Review
Module 3: People Domain
People Domain and Project Communications Management Knowledge Area Defined
Plan Communications Management
Manage and Monitor Communications
Agile Communications
Communications Key Points to Remember
Communications Example Question Review
Project Stakeholder Management Knowledge Area Defined
Stakeholder Position Descriptions
Identify Stakeholders
Plan Stakeholder Engagement and Manage Stakeholder Engagement
Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
Stakeholder Management Key Points to Remember
Stakeholder Management Example Question Review
Resource Management Knowledge Area Defined
Plan Resource Management and Estimate Activity Resources
Acquire Resources and Develop Team
Manage Team
Control Resources and Agile Teaming Concepts
Other Agile Teaming Concepts
Agile Team Roles and Troubleshooting Agile team issues
Resources Key Points to Remember
Resources Example Question Review
Module 4: Business Environment Domain
Business Environment Domain Defined
Project Selection Tools
PMO, Organizational Structure, and Reports
Agile in the Business Environment
Business Environment Key Points to Remember and Example Question Review
Course Closing
PMI Risk Management Professional (PMI-RMP) Course Content
08 Hours 45 Minutes 28 Videos 100 Prep Questions
Focused on risk management, this course equips information security managers with the skills to identify, assess, and mitigate risks in their organizations. It contributes by enhancing participants’ ability to manage information security risk effectively.
Module 1: Risk Management Fundamentals
Instructor Intro
Course Intro
Risk Management Fundamentals Pt 1
Risk Management Fundamentals Pt 2
Module 2: Test Requirements
Test Requirements
Module 3: Test Domains
Test Domains Pt 1
Test Domains Pt 2
Module 4: Risk Strategy and Planning
Risk Strategy and Planning Pt 1
Risk Strategy and Planning Pt 2
Module 5: Stakeholder Engagement
Stakeholder Engagement Pt 1
Stakeholder Engagement Pt 2
Stakeholder Engagement Pt 3
Stakeholder Engagement Pt 4
Module 6: Risk Process Facilitation
Risk Process Facilitation Pt1
Risk Process Facilitation Pt2
Risk Process Facilitation Pt3
Module 7: Risk Monitoring and Reporting
Risk Monitoring and Reporting Pt 1
Risk Monitoring and Reporting Pt 2
Risk Monitoring and Reporting Pt 3
Module 8: Specialized Risk Analyses
Specialized Risk Analyses Pt 1
Specialized Risk Analyses Pt 2
Specialized Risk Analyses Pt 3
Module 9: RMP Recap
RMP Recap
Module 10: RMP Review Questions
RMP Review Questions Pt 1
RMP Review Questions Pt 2
RMP Review Questions Pt 3
RMP Review Questions Pt 4
RMP Review Questions Pt 5
Certified Information Security Manager (CISM) Course Content
17 Hours 18 Minutes 48 Videos 100 Prep Questions
The CISM certification course covers information security management, including the development and maintenance of Information Security Management Systems (ISMS). It’s a cornerstone of the series, providing comprehensive knowledge for security managers.
Module 1: Introduction
Instructor Introduction
Course Introduction
Exam Overview
Module 2: Information Security Governance
Module Overview
InfoSec Strategic Context Part 1
InfoSec Strategic Context Part 2
GRC Strategy and Assurance
Roles and Responsibilities
GMA Tasks Knowledge and Metrics
IS Strategy Overview
Strategy Implemenation
Strategy Development Support
Architecture and Controls
Considerations and Action Plan
InfoSec Prog Objectives and Wrap-Up
Module 3: Information Security Risk Management
Module Overview
Risk Identification Task and Knowledge
Risk Management Strategy
Additional Considerations
Risk Analysis and Treatment Tasks & Knowledge
Leveraging Frameworks
Assessment Tools and Analysis
Risk Scenario Development
Additional Risk Factors
Asset Classification and Risk Management
Risk Monitoring and Communication
Information Risk Management Summary
Module 4: InfoSec Prog Development and Management
Module Overview
Alignment and Resource Management – Task and Knowledge
Key Relationships
Standards Awareness and Training – Tasks and Knowledge
Awareness and Training
Building Security into Process and Practices – Tasks and Knowledge
Additional Technology Infrastructure Concerns
Security monitoring and reporting Overview Tasks and Knowledge
Metrics and Monitoring
Summary
Module 5: Information Security Incident Management
Module Overview
Planning and Integration Overview Task and Knowledge
Incident Response Concepts and Process
Forensics and Recovery
Readiness and Assessment – Overview Tasks and Knowledge
Identification and Response Overview Tasks and Knowledge
Incident Processes
Module 6: Exam Prep
Case Study – Security On a Shoestring Budget
Case Study – APT In Action
Summary
Exam Prep
Certified Information Systems Auditor (CISA) Course Content
12 Hours 37 Minutes 74 Videos 55 Prep Questions
This course focuses on auditing, control, and assurance skills, helping information security managers excel in auditing and compliance aspects of their roles. It contributes by strengthening participants’ auditing expertise.
Module 1 – The Audit Process
Introduction
Audit Process
Auditing Standards
Auditing Guidelines
Cobit Model
Audit Management
Internal Control Classifications
Planning
Program
Evidence
Audit Control Evaluation
CSA Control Self-Assessment
Module 2 – Audit Governance and Compliance
IT Governance
Governance & Security Policies
Outsourcing & Governance
Outsourcing & Globalization
Organizational Compliance
IT Strategy
IT Performance
Module 3 – System Infrastructure, Project Management, and Testing
System & Infrastructure
Requirements
Project Management Tools – Part 1
Project Management Tools – Part 2
Applications
Agile Development
Monitoring & Controlling
Acquisition Process
Testing Process
Information Systems Maintenance Practices
Data Conversion Tools
Module 4 – Media Disposal, Reviews, and System Maintenance
Media Disposal Process
Post Implementation Review
Periodic Review
System Maintenance
Module 5 – IT Service Level Management
IT Service Delivery and Support
How to Evalutate Service Level Management Practices
Operations Management
Databases
Structured Query Language (SQL)
Monitoring Performance
Source Code and Perfomance Monitoring
Patch Management
Incident Management
Hardware Component Types
Network Component Types
Module 6 – Auditor Technical Overview
IS Auditor Technical Overview
Security Design
Monitoring Systems
Types of Attacks
Cryptography
Encryption
Asymmetric Encryption
Digital Certificate
Different Kinds of Attacks
Access Controls
Identification and Authenication
Physical Access Exposure
Environmental Security
Network Security Devices and Network Components
Network Address Translation
Virtual Private Networks (VPNs)
Voice System Risks
Intrusion Detection
Firewalls
Firewall Implementation
Network Access Protection
HoneyPot
Risks to Portable and Wireless Devices
Bluetooth
OSI Networking
Managing Data
Module 7 – Business Continuity and Disaster Recovery
Business Continuity and Disaster Recovery
Fault Tolerance
Business Continuity and Disaster Recovery Regulations
Certified Information Systems Security Pro (CISSP) Course Content
19 Hours 34 Minutes 44 Videos 60 Prep Questions
CISSP offers a deep dive into various security domains, enhancing the technical and managerial skills of information security managers. It contributes by making participants well-versed in a broad range of security topics.
Module 1: Security and Risk Management
Introduction
CIA Triad Security Governance – Part 1
CIA Triad Security Governance – Part 2
Compliance Legal And Regulatory Issues – Part 1
Compliance Legal And Regulatory Issues – Part 2
Understanding Professional Ethics – Part 1
Understanding Professional Ethics – Part 2
Risk Management – Part 1
Risk Management – Part 2
Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 1
Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 2
Module 2: Asset Security
Asset Security – Part 1
Asset Security – Part 2
Module 3: Security Engineering
Engineering And Management Of Security – Part 1
Engineering And Management Of Security – Part 2
Engineering And Management Of Security – Part 3
Engineering And Management Of Security – Part 4
Engineering And Management Of Security – Part 5
Engineering And Management Of Security – Part 6
Module 4: Communication and Network Security
Apply Secure Design Principles To Networks – Part 1
Apply Secure Design Principles To Networks – Part 2
Apply Secure Design Principles To Networks – Part 3
Apply Secure Design Principles To Networks – Part 4
Apply Secure Design Principles To Networks – Part 5
Apply Secure Design Principles To Networks – Part 6
Securing Network Components – Part 1
Securing Network Components – Part 2
Design And Establish Secure Communication Channels – Part 1
Design And Establish Secure Communication Channels – Part 2
Design And Establish Secure Communication Channels – Part 3
Module 5: Identity and Access Management
Controlling Access And Managing Identity – Part 1
Controlling Access And Managing Identity – Part 2
Controlling Access And Managing Identity – Part 3
Controlling Access And Managing Identity – Part 4
Module 6: Security Assessment Testing
Designing Performing And Analyzing Security Testing
Module 7: Security Operations
Foundational Concepts And Investigations – Part 1
Foundational Concepts And Investigations – Part 2
Incident Management And Preventative Measures – Part 1
Incident Management And Preventative Measures – Part 2
Disaster Recovery Process – Part 1
Disaster Recovery Process – Part 2
Module 8: Software Development Security
Understanding Applying And Enforcing Software Security – Part 1
Understanding Applying And Enforcing Software Security – Part 2
Conclusion
Certified Cloud Security Professional – CCSP Course Content
15 Hours 51 Minutes 53 Videos 246 Prep Questions
Tailored for cloud security, this course is essential for security managers dealing with cloud technologies. It contributes by ensuring participants can secure cloud environments effectively.
Cloud Concepts, Architecture and Design
Course Intro
Cloud Concepts, Architecture and Design – Part 1
Cloud Concepts, Architecture and Design – Part 2
Cloud Concepts, Architecture and Design – Part 3
Cloud Concepts, Architecture and Design – Part 4
Cloud Concepts, Architecture and Design – Part 5
Cloud Concepts, Architecture and Design – Part 6
Cloud Concepts, Architecture and Design – Part 7
Cloud Concepts, Architecture and Design – Part 8
Cloud Concepts, Architecture and Design – Part 9
Legal, Risk and Compliance
Legal, Risk and Compliance Part 1
Legal, Risk and Compliance Part 2
Legal, Risk and Compliance Part 3
Legal, Risk and Compliance Part 4
Legal, Risk and Compliance Part 5
Legal, Risk and Compliance Part 6
Legal, Risk and Compliance Part 7
Cloud Data Security
Cloud Data Security – Part 1
Cloud Data Security – Part 2
Cloud Data Security – Part 3
Cloud Data Security – Part 4
Cloud Data Security – Part 5
Cloud Data Security – Part 6
Cloud Data Security – Part 7
Cloud Platform and Infrastructure Security
Cloud Platform and Infrastructure Security – Part 1
Cloud Platform and Infrastructure Security – Part 2
Cloud Platform and Infrastructure Security – Part 3
Cloud Platform and Infrastructure Security – Part 4
Cloud Platform and Infrastructure Security – Part 5
Cloud Platform and Infrastructure Security – Part 6
Cloud Platform and Infrastructure Security – Part 7
Cloud Platform and Infrastructure Security – Part 8
Cloud Application Security
Cloud Application Security – Part 1
Cloud Application Security – Part 2
Cloud Application Security – Part 3
Cloud Application Security – Part 4
Cloud Application Security – Part 5
Cloud Application Security – Part 6
Cloud Application Security – Part 7
Cloud Application Security – Part 8
Cloud Application Security – Part 9
Cloud Security Operations
Cloud Security Operations – Part 1
Cloud Security Operations – Part 2
Cloud Security Operations – Part 3
Cloud Security Operations – Part 4
Cloud Security Operations – Part 5
Cloud Security Operations – Part 6
Cloud Security Operations – Part 7
Cloud Security Operations – Part 8
Cloud Security Operations – Part 9
Cloud Security Operations – Part 10
Cloud Security Operations – Part 11
Course Outro
Crafting Your Information Security Manager Career Path: A Comprehensive Learning Journey
Embark on a tailored learning path designed to propel you to the forefront of information security management. Our Information Security Manager Training Series is the ultimate blueprint for those seeking to carve out a successful career in information security. Here’s how you can navigate your journey:
- Foundation Courses: Begin with fundamental courses that lay the groundwork for your information security career path. Dive into Project Management Professional (PMP) and PMI Risk Management Professional (PMI-RMP) certifications to establish a strong base in project management and risk assessment. These are crucial stepping stones for an aspiring Information Security Manager.
- Advanced Information Security Management: Progress to the Certified Information Security Manager (CISM) course, which delves into the development and maintenance of Information Security Management Systems (ISMS). This advanced training is pivotal for those on infosec career paths, ensuring you can design and enforce comprehensive security policies and protocols.
- Audit and Compliance Mastery: Enhance your career trajectory with the Certified Information Systems Auditor (CISA) course. This is vital for Information Security Managers focusing on security controls auditing and regulatory compliance, such as ISO 27001 and GDPR.
- Integrative Security Expertise: Further your expertise with the Certified Information Systems Security Professional (CISSP) course. This program will expand your proficiency across various security domains, blending technical know-how with managerial acumen—key competencies for an Information Security Manager.
- Specialization in Cloud Security: In response to the increasing reliance on cloud technologies, our Certified Cloud Security Professional (CCSP) course prepares Information Security Managers to address cloud-related security challenges effectively. This specialized knowledge is critical for managing the information security manager work environment in the modern digital landscape.
- Practical Experience and Resources: Supplement your learning with hands-on experience and access a wealth of information security manager resources. Engage with real-world scenarios to apply your skills in risk management, incident response, and strategic security governance.
- Beginner-Friendly Modules: For those new to the field, we provide information security manager resources for beginners, ensuring that you can start your journey with confidence, regardless of your previous experience.
By completing this diverse and comprehensive training series, you’ll be well-equipped to assume the role of an Information Security Manager. You will gain the expertise needed to craft effective security strategies, assess and mitigate risks, and ensure compliance within any organization. Whether you are just starting on your information security career path or looking to solidify your standing as a seasoned professional, this training series is your strategic roadmap to becoming a resilient and resourceful Information Security Manager.
Who Is This Training For?
Our training caters to a variety of professionals at different stages of their information security career path, from seasoned IT managers to cybersecurity enthusiasts. If you’re pondering, “Would I make a good Information Security Manager?” or are seeking information security manager resources for beginners, this series is your gateway to mastering the domain.
Whether you’re stepping into the realm of information security or advancing in your current role, our program offers the expertise needed to thrive as a security leader, ensuring that you’re well-versed in the latest security practices and compliance mandates.
Here’s a list of individuals who would benefit from this training series, considering the prior experience needed for success:
- Information Security Managers: Information security managers looking to enhance their knowledge and skills in various aspects of information security management, risk assessment, and compliance.
- IT Managers and Directors: IT professionals in leadership roles seeking to deepen their understanding of information security to better oversee security-related initiatives within their organizations.
- Security Analysts and Specialists: Security analysts and specialists aiming to advance their careers by gaining expertise in security management, risk assessment, and compliance.
- Auditors and Compliance Officers: Professionals responsible for auditing and ensuring compliance with security standards and regulations, such as ISO 27001, HIPAA, or GDPR.
- Risk Managers: Individuals involved in risk management who want to focus on information security risk assessment and mitigation strategies.
- Network and Systems Administrators: IT professionals responsible for maintaining the security of an organization’s network and systems, seeking a broader understanding of information security.
- Consultants and Security Advisors: Security consultants and advisors looking to expand their knowledge and credentials to better serve their clients.
- Cybersecurity Enthusiasts: Individuals passionate about cybersecurity and eager to transition into information security management roles, provided they have some foundational knowledge.
- IT Project Managers: Project managers handling IT or security-related projects who want to ensure successful project execution while adhering to security best practices.
- Security Compliance Analysts: Professionals involved in ensuring regulatory and compliance requirements are met within an organization.
- Cloud Security Professionals: Those responsible for securing cloud environments and services who need specialized knowledge in cloud security practices.
- Experienced IT Professionals: IT professionals with several years of experience in areas like system administration, network security, or application development, looking to pivot their careers towards information security management.
While prior experience is beneficial for success in this training series, the courses are designed to cater to a range of skill levels, with foundational courses like PMP and PMI-RMP providing the necessary groundwork. However, individuals with some prior exposure to information security or related domains will likely find the content more accessible and relevant.
Frequestly Asked Questions
What does an Information Security Manager do?
An Information Security Manager is responsible for protecting an organization’s data, systems, and networks from security threats and breaches. They develop and implement security policies, manage risk, conduct audits, and ensure compliance with security standards and regulations.
What qualifications and certifications are typically required for the role of an Information Security Manager?
Qualifications often include a bachelor’s or master’s degree in a relevant field, such as computer science or cybersecurity. Common certifications for Information Security Managers include Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA).
What are the main challenges faced by Information Security Managers in their role?
Information Security Managers face challenges such as keeping up with evolving cyber threats, balancing security with usability, securing cloud environments, managing limited resources, and ensuring that employees and stakeholders adhere to security policies and practices.
How does an Information Security Manager contribute to an organization’s overall success?
Information Security Managers play a crucial role in an organization’s success by protecting sensitive data, reducing security risks, ensuring compliance with regulations, and maintaining the trust of customers and stakeholders. Their efforts help prevent costly data breaches and downtime.
What skills and qualities are essential for someone aspiring to become an effective Information Security Manager?
Effective Information Security Managers should possess strong leadership, communication, and problem-solving skills. They should have a deep understanding of security technologies, risk management, and compliance. Additionally, adaptability, attention to detail, and the ability to stay current with cybersecurity trends are vital qualities for success in this role.
Module 1: Preparing for and Taking the Exam
- Preparing to Take the Exam and Instructor Introduction
- Getting Certified to take the Examination
- Examination Characteristics
- Test Taking Tips and Techniques
- Question Formats
- Post Certification Requirements
Module 2: Process Domain
- Process Domain and Framework defined
- Predictive, Iterative, Incremental and Adaptive Project Life Cycles
- Framework Definitions
- Project Manager Skills
- Framework Key Points to Remember
- Framework Example Questions Review
- Project Integration Management Knowledge Area Defined
- Knowledge Area Process Mapping and Definitions
- Develop Project Charter and Develop Project Management Plan
- Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
- Perform Integrated Change Control
- Close Project or Phase
- Integration Key Points to Remember
- Integration Example Questions Review
- Project Scope Management Knowledge Area Defined
- Plan Scope Management and Collect Requirements
- Nominal Group Technique (Delphi-Opinion Technique)
- Define Scope and Create WBS
- Breakdown Structures used in WBS Dictionary
- Validate Scope and Control Scope
- Defining Requirements in Agile
- Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
- Scope Key Points to Remember
- Scope Example Questions Review
- Project Schedule Management Knowledge Area Defined
- Plan Schedule Management, Define Activities, and Sequence Activities
- Dependencies, Predecessors, Leads, and Lags
- Estimate Activity Durations
- Develop Schedule
- Critical Path Method
- Schedule Compression
- Resource Leveling, Schedule Format, and Control Schedule
- Agile Estimating
- Agile Schedule Planning and Reporting
- Schedule Key Points to Remember and Example Question review
- Project Cost Management Knowledge Area Defined
- Plan Cost Management and Estimate Cost
- Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
- Life Cycle Costing, Status Reporting, and Determine Budget
- Control Costs, and Earned Value Management
- Earned Schedule, and Agile Cost Control
- Cost Key Points to Remember
- Cost Example Questions Review
- Project Quality Management Knowledge Area Defined
- Plan Quality Management
- Manage Quality
- Control Quality
- Continuous Improvement in Agile-Adaptive Life Cycles – Kaizen and Process Analysis
- Continuous Improvement in Agile-Adaptive Life Cycles – Retrospectives
- Quality Key Points to Remember
- Quality Example Questions Review
- Project Risk Management Knowledge Area Defined
- Risk Management Plan and Identify Risks
- Risk Register and Issues Vs Risk
- Perform Qualitative and Quantitative Risk Analysis
- Plan Risk Responses
- Implement Risk Responses and Monitor Risks
- Agile Risk Tools and Risk Key Points to Remember
- Risk Example Questions Review
- Project Procurement Management Knowledge Area Defined
- Plan Procurement Management and Conduct Procurements
- Contracts
- Share and Point of Total Assumption
- Procurement Documents
- Non-Competitive Awards and Control Procurements
- Agile Contracts
- Procurement Key Points to Remember and Example Questions Review
Module 3: People Domain
- People Domain and Project Communications Management Knowledge Area Defined
- Plan Communications Management
- Manage and Monitor Communications
- Agile Communications
- Communications Key Points to Remember
- Communications Example Question Review
- Project Stakeholder Management Knowledge Area Defined
- Stakeholder Position Descriptions
- Identify Stakeholders
- Plan Stakeholder Engagement and Manage Stakeholder Engagement
- Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
- Stakeholder Management Key Points to Remember
- Stakeholder Management Example Question Review
- Resource Management Knowledge Area Defined
- Plan Resource Management and Estimate Activity Resources
- Acquire Resources and Develop Team
- Manage Team
- Control Resources and Agile Teaming Concepts
- Other Agile Teaming Concepts
- Agile Team Roles and Troubleshooting Agile team issues
- Resources Key Points to Remember
- Resources Example Question Review
Module 4: Business Environment Domain
- Business Environment Domain Defined
- Project Selection Tools
- PMO, Organizational Structure, and Reports
- Agile in the Business Environment
- Business Environment Key Points to Remember and Example Question Review
- Course Closing
Module 1: Risk Management Fundamentals
- Instructor Intro
- Course Intro
- Risk Management Fundamentals Pt 1
- Risk Management Fundamentals Pt 2
Module 2: Test Requirements
- Test Requirements
Module 3: Test Domains
- Test Domains Pt 1
- Test Domains Pt 2
Module 4: Risk Strategy and Planning
- Risk Strategy and Planning Pt 1
- Risk Strategy and Planning Pt 2
Module 5: Stakeholder Engagement
- Stakeholder Engagement Pt 1
- Stakeholder Engagement Pt 2
- Stakeholder Engagement Pt 3
- Stakeholder Engagement Pt 4
Module 6: Risk Process Facilitation
- Risk Process Facilitation Pt1
- Risk Process Facilitation Pt2
- Risk Process Facilitation Pt3
Module 7: Risk Monitoring and Reporting
- Risk Monitoring and Reporting Pt 1
- Risk Monitoring and Reporting Pt 2
- Risk Monitoring and Reporting Pt 3
Module 8: Specialized Risk Analyses
- Specialized Risk Analyses Pt 1
- Specialized Risk Analyses Pt 2
- Specialized Risk Analyses Pt 3
Module 9: RMP Recap
- RMP Recap
Module 10: RMP Review Questions
- RMP Review Questions Pt 1
- RMP Review Questions Pt 2
- RMP Review Questions Pt 3
- RMP Review Questions Pt 4
- RMP Review Questions Pt 5
Module 1: Introduction
- Instructor Introduction
- Course Introduction
- Exam Overview
Module 2: Information Security Governance
- Module Overview
- InfoSec Strategic Context Part 1
- InfoSec Strategic Context Part 2
- GRC Strategy and Assurance
- Roles and Responsibilities
- GMA Tasks Knowledge and Metrics
- IS Strategy Overview
- Strategy Implemenation
- Strategy Development Support
- Architecture and Controls
- Considerations and Action Plan
- InfoSec Prog Objectives and Wrap-Up
Module 3: Information Security Risk Management
- Module Overview
- Risk Identification Task and Knowledge
- Risk Management Strategy
- Additional Considerations
- Risk Analysis and Treatment Tasks & Knowledge
- Leveraging Frameworks
- Assessment Tools and Analysis
- Risk Scenario Development
- Additional Risk Factors
- Asset Classification and Risk Management
- Risk Monitoring and Communication
- Information Risk Management Summary
Module 4: InfoSec Prog Development and Management
- Module Overview
- Alignment and Resource Management – Task and Knowledge
- Key Relationships
- Standards Awareness and Training – Tasks and Knowledge
- Awareness and Training
- Building Security into Process and Practices – Tasks and Knowledge
- Additional Technology Infrastructure Concerns
- Security monitoring and reporting Overview Tasks and Knowledge
- Metrics and Monitoring
- Summary
Module 5: Information Security Incident Management
- Module Overview
- Planning and Integration Overview Task and Knowledge
- Incident Response Concepts and Process
- Forensics and Recovery
- Readiness and Assessment – Overview Tasks and Knowledge
- Identification and Response Overview Tasks and Knowledge
- Incident Processes
Module 6: Exam Prep
- Case Study – Security On a Shoestring Budget
- Case Study – APT In Action
- Summary
- Exam Prep
Module 1 – The Audit Process
- Introduction
- Audit Process
- Auditing Standards
- Auditing Guidelines
- Cobit Model
- Audit Management
- Internal Control Classifications
- Planning
- Program
- Evidence
- Audit Control Evaluation
- CSA Control Self-Assessment
Module 2 – Audit Governance and Compliance
- IT Governance
- Governance & Security Policies
- Outsourcing & Governance
- Outsourcing & Globalization
- Organizational Compliance
- IT Strategy
- IT Performance
Module 3 – System Infrastructure, Project Management, and Testing
- System & Infrastructure
- Requirements
- Project Management Tools – Part 1
- Project Management Tools – Part 2
- Applications
- Agile Development
- Monitoring & Controlling
- Acquisition Process
- Testing Process
- Information Systems Maintenance Practices
- Data Conversion Tools
Module 4 – Media Disposal, Reviews, and System Maintenance
- Media Disposal Process
- Post Implementation Review
- Periodic Review
- System Maintenance
Module 5 – IT Service Level Management
- IT Service Delivery and Support
- How to Evalutate Service Level Management Practices
- Operations Management
- Databases
- Structured Query Language (SQL)
- Monitoring Performance
- Source Code and Perfomance Monitoring
- Patch Management
- Incident Management
- Hardware Component Types
- Network Component Types
Module 6 – Auditor Technical Overview
- IS Auditor Technical Overview
- Security Design
- Monitoring Systems
- Types of Attacks
- Cryptography
- Encryption
- Asymmetric Encryption
- Digital Certificate
- Different Kinds of Attacks
- Access Controls
- Identification and Authenication
- Physical Access Exposure
- Environmental Security
- Network Security Devices and Network Components
- Network Address Translation
- Virtual Private Networks (VPNs)
- Voice System Risks
- Intrusion Detection
- Firewalls
- Firewall Implementation
- Network Access Protection
- HoneyPot
- Risks to Portable and Wireless Devices
- Bluetooth
- OSI Networking
- Managing Data
Module 7 – Business Continuity and Disaster Recovery
- Business Continuity and Disaster Recovery
- Fault Tolerance
- Business Continuity and Disaster Recovery Regulations
Module 1: Security and Risk Management
- Introduction
- CIA Triad Security Governance – Part 1
- CIA Triad Security Governance – Part 2
- Compliance Legal And Regulatory Issues – Part 1
- Compliance Legal And Regulatory Issues – Part 2
- Understanding Professional Ethics – Part 1
- Understanding Professional Ethics – Part 2
- Risk Management – Part 1
- Risk Management – Part 2
- Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 1
- Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 2
Module 2: Asset Security
- Asset Security – Part 1
- Asset Security – Part 2
Module 3: Security Engineering
- Engineering And Management Of Security – Part 1
- Engineering And Management Of Security – Part 2
- Engineering And Management Of Security – Part 3
- Engineering And Management Of Security – Part 4
- Engineering And Management Of Security – Part 5
- Engineering And Management Of Security – Part 6
Module 4: Communication and Network Security
- Apply Secure Design Principles To Networks – Part 1
- Apply Secure Design Principles To Networks – Part 2
- Apply Secure Design Principles To Networks – Part 3
- Apply Secure Design Principles To Networks – Part 4
- Apply Secure Design Principles To Networks – Part 5
- Apply Secure Design Principles To Networks – Part 6
- Securing Network Components – Part 1
- Securing Network Components – Part 2
- Design And Establish Secure Communication Channels – Part 1
- Design And Establish Secure Communication Channels – Part 2
- Design And Establish Secure Communication Channels – Part 3
Module 5: Identity and Access Management
- Controlling Access And Managing Identity – Part 1
- Controlling Access And Managing Identity – Part 2
- Controlling Access And Managing Identity – Part 3
- Controlling Access And Managing Identity – Part 4
Module 6: Security Assessment Testing
- Designing Performing And Analyzing Security Testing
Module 7: Security Operations
- Foundational Concepts And Investigations – Part 1
- Foundational Concepts And Investigations – Part 2
- Incident Management And Preventative Measures – Part 1
- Incident Management And Preventative Measures – Part 2
- Disaster Recovery Process – Part 1
- Disaster Recovery Process – Part 2
Module 8: Software Development Security
- Understanding Applying And Enforcing Software Security – Part 1
- Understanding Applying And Enforcing Software Security – Part 2
- Conclusion
Cloud Concepts, Architecture and Design
- Course Intro
- Cloud Concepts, Architecture and Design – Part 1
- Cloud Concepts, Architecture and Design – Part 2
- Cloud Concepts, Architecture and Design – Part 3
- Cloud Concepts, Architecture and Design – Part 4
- Cloud Concepts, Architecture and Design – Part 5
- Cloud Concepts, Architecture and Design – Part 6
- Cloud Concepts, Architecture and Design – Part 7
- Cloud Concepts, Architecture and Design – Part 8
- Cloud Concepts, Architecture and Design – Part 9
Legal, Risk and Compliance
- Legal, Risk and Compliance Part 1
- Legal, Risk and Compliance Part 2
- Legal, Risk and Compliance Part 3
- Legal, Risk and Compliance Part 4
- Legal, Risk and Compliance Part 5
- Legal, Risk and Compliance Part 6
- Legal, Risk and Compliance Part 7
Cloud Data Security
- Cloud Data Security – Part 1
- Cloud Data Security – Part 2
- Cloud Data Security – Part 3
- Cloud Data Security – Part 4
- Cloud Data Security – Part 5
- Cloud Data Security – Part 6
- Cloud Data Security – Part 7
Cloud Platform and Infrastructure Security
- Cloud Platform and Infrastructure Security – Part 1
- Cloud Platform and Infrastructure Security – Part 2
- Cloud Platform and Infrastructure Security – Part 3
- Cloud Platform and Infrastructure Security – Part 4
- Cloud Platform and Infrastructure Security – Part 5
- Cloud Platform and Infrastructure Security – Part 6
- Cloud Platform and Infrastructure Security – Part 7
- Cloud Platform and Infrastructure Security – Part 8
Cloud Application Security
- Cloud Application Security – Part 1
- Cloud Application Security – Part 2
- Cloud Application Security – Part 3
- Cloud Application Security – Part 4
- Cloud Application Security – Part 5
- Cloud Application Security – Part 6
- Cloud Application Security – Part 7
- Cloud Application Security – Part 8
- Cloud Application Security – Part 9
Cloud Security Operations
- Cloud Security Operations – Part 1
- Cloud Security Operations – Part 2
- Cloud Security Operations – Part 3
- Cloud Security Operations – Part 4
- Cloud Security Operations – Part 5
- Cloud Security Operations – Part 6
- Cloud Security Operations – Part 7
- Cloud Security Operations – Part 8
- Cloud Security Operations – Part 9
- Cloud Security Operations – Part 10
- Cloud Security Operations – Part 11
- Course Outro
This course is included in all of our team and individual training plans. Choose the option that works best for you.
Enroll My Team.
Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.
Choose a Plan.
Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.