Embark on an unparalleled journey into the heart of digital protection with our premier Information Security Manager Training Series. This meticulously crafted program stands as a beacon for IT professionals poised to ascend into the echelons of management within the vibrant realm of information security. Tailored for those already versed in IT security disciplines, this series is the cornerstone for transforming seasoned professionals into master architects of cybersecurity strategy and governance.
With a curriculum that intertwines theory with real-world application, our series is not just a course—it’s a transformative experience that will elevate your understanding of information security management to new heights. It’s designed for the ambitious, the forward-thinking, and the determined—those who not only seek to protect but to pioneer robust security infrastructures in an ever-evolving digital landscape. For the aspirant ready to take the reins and lead the charge against cyber threats, this advanced training series is your critical next step on the prestigious infosec career path.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Closed Captions
Certificate of Completion
Module 1: Preparing for and Taking the Exam
Preparing to Take the Exam and Instructor Introduction
Getting Certified to take the Examination
Examination Characteristics
Test Taking Tips and Techniques
Question Formats
Post Certification Requirements
Module 2: Process Domain
Process Domain and Framework defined
Predictive, Iterative, Incremental and Adaptive Project Life Cycles
Framework Definitions
Project Manager Skills
Framework Key Points to Remember
Framework Example Questions Review
Project Integration Management Knowledge Area Defined
Knowledge Area Process Mapping and Definitions
Develop Project Charter and Develop Project Management Plan
Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
Perform Integrated Change Control
Close Project or Phase
Integration Key Points to Remember
Integration Example Questions Review
Project Scope Management Knowledge Area Defined
Plan Scope Management and Collect Requirements
Nominal Group Technique (Delphi-Opinion Technique)
Define Scope and Create WBS
Breakdown Structures used in WBS Dictionary
Validate Scope and Control Scope
Defining Requirements in Agile
Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
Scope Key Points to Remember
Scope Example Questions Review
Project Schedule Management Knowledge Area Defined
Plan Schedule Management, Define Activities, and Sequence Activities
Dependencies, Predecessors, Leads, and Lags
Estimate Activity Durations
Develop Schedule
Critical Path Method
Schedule Compression
Resource Leveling, Schedule Format, and Control Schedule
Agile Estimating
Agile Schedule Planning and Reporting
Schedule Key Points to Remember and Example Question review
Project Cost Management Knowledge Area Defined
Plan Cost Management and Estimate Cost
Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
Life Cycle Costing, Status Reporting, and Determine Budget
Control Costs, and Earned Value Management
Earned Schedule, and Agile Cost Control
Cost Key Points to Remember
Cost Example Questions Review
Project Quality Management Knowledge Area Defined
Plan Quality Management
Manage Quality
Control Quality
Continuous Improvement in Agile-Adaptive Life Cycles - Kaizen and Process Analysis
Continuous Improvement in Agile-Adaptive Life Cycles - Retrospectives
Quality Key Points to Remember
Quality Example Questions Review
Project Risk Management Knowledge Area Defined
Risk Management Plan and Identify Risks
Risk Register and Issues Vs Risk
Perform Qualitative and Quantitative Risk Analysis
Plan Risk Responses
Implement Risk Responses and Monitor Risks
Agile Risk Tools and Risk Key Points to Remember
Risk Example Questions Review
Project Procurement Management Knowledge Area Defined
Plan Procurement Management and Conduct Procurements
Contracts
Share and Point of Total Assumption
Procurement Documents
Non-Competitive Awards and Control Procurements
Agile Contracts
Procurement Key Points to Remember and Example Questions Review
Module 3: People Domain
People Domain and Project Communications Management Knowledge Area Defined
Plan Communications Management
Manage and Monitor Communications
Agile Communications
Communications Key Points to Remember
Communications Example Question Review
Project Stakeholder Management Knowledge Area Defined
Stakeholder Position Descriptions
Identify Stakeholders
Plan Stakeholder Engagement and Manage Stakeholder Engagement
Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
Stakeholder Management Key Points to Remember
Stakeholder Management Example Question Review
Resource Management Knowledge Area Defined
Plan Resource Management and Estimate Activity Resources
Acquire Resources and Develop Team
Manage Team
Control Resources and Agile Teaming Concepts
Other Agile Teaming Concepts
Agile Team Roles and Troubleshooting Agile team issues
Resources Key Points to Remember
Resources Example Question Review
Module 4: Business Environment Domain
Business Environment Domain Defined
Project Selection Tools
PMO, Organizational Structure, and Reports
Agile in the Business Environment
Business Environment Key Points to Remember and Example Question Review
Course Closing
Module 1: Risk Management Fundamentals
Instructor Intro
Course Intro
Risk Management Fundamentals Pt 1
Risk Management Fundamentals Pt 2
Module 2: Test Requirements
Test Requirements
Module 3: Test Domains
Test Domains Pt 1
Test Domains Pt 2
Module 4: Risk Strategy and Planning
Risk Strategy and Planning Pt 1
Risk Strategy and Planning Pt 2
Module 5: Stakeholder Engagement
Stakeholder Engagement Pt 1
Stakeholder Engagement Pt 2
Stakeholder Engagement Pt 3
Stakeholder Engagement Pt 4
Module 6: Risk Process Facilitation
Risk Process Facilitation Pt1
Risk Process Facilitation Pt2
Risk Process Facilitation Pt3
Module 7: Risk Monitoring and Reporting
Risk Monitoring and Reporting Pt 1
Risk Monitoring and Reporting Pt 2
Risk Monitoring and Reporting Pt 3
Module 8: Specialized Risk Analyses
Specialized Risk Analyses Pt 1
Specialized Risk Analyses Pt 2
Specialized Risk Analyses Pt 3
Module 9: RMP Recap
RMP Recap
Module 10: RMP Review Questions
RMP Review Questions Pt 1
RMP Review Questions Pt 2
RMP Review Questions Pt 3
RMP Review Questions Pt 4
RMP Review Questions Pt 5
Module 1: Introduction
Instructor Introduction
Course Introduction
Exam Overview
Module 2: Information Security Governance
Module Overview
InfoSec Strategic Context Part 1
InfoSec Strategic Context Part 2
GRC Strategy and Assurance
Roles and Responsibilities
GMA Tasks Knowledge and Metrics
IS Strategy Overview
Strategy Implemenation
Strategy Development Support
Architecture and Controls
Considerations and Action Plan
InfoSec Prog Objectives and Wrap-Up
Module 3: Information Security Risk Management
Module Overview
Risk Identification Task and Knowledge
Risk Management Strategy
Additional Considerations
Risk Analysis and Treatment Tasks & Knowledge
Leveraging Frameworks
Assessment Tools and Analysis
Risk Scenario Development
Additional Risk Factors
Asset Classification and Risk Management
Risk Monitoring and Communication
Information Risk Management Summary
Module 4: InfoSec Prog Development and Management
Module Overview
Alignment and Resource Management - Task and Knowledge
Key Relationships
Standards Awareness and Training - Tasks and Knowledge
Awareness and Training
Building Security into Process and Practices - Tasks and Knowledge
Additional Technology Infrastructure Concerns
Security monitoring and reporting Overview Tasks and Knowledge
Metrics and Monitoring
Summary
Module 5: Information Security Incident Management
Module Overview
Planning and Integration Overview Task and Knowledge
Incident Response Concepts and Process
Forensics and Recovery
Readiness and Assessment - Overview Tasks and Knowledge
Identification and Response Overview Tasks and Knowledge
Incident Processes
Module 6: Exam Prep
Case Study - Security On a Shoestring Budget
Case Study - APT In Action
Summary
Exam Prep
Module 1 - The Audit Process
Introduction
Audit Process
Auditing Standards
Auditing Guidelines
Cobit Model
Audit Management
Internal Control Classifications
Planning
Program
Evidence
Audit Control Evaluation
CSA Control Self-Assessment
Module 2 - Audit Governance and Compliance
IT Governance
Governance & Security Policies
Outsourcing & Governance
Outsourcing & Globalization
Organizational Compliance
IT Strategy
IT Performance
Module 3 - System Infrastructure, Project Management, and Testing
System & Infrastructure
Requirements
Project Management Tools - Part 1
Project Management Tools - Part 2
Applications
Agile Development
Monitoring & Controlling
Acquisition Process
Testing Process
Information Systems Maintenance Practices
Data Conversion Tools
Module 4 - Media Disposal, Reviews, and System Maintenance
Media Disposal Process
Post Implementation Review
Periodic Review
System Maintenance
Module 5 - IT Service Level Management
IT Service Delivery and Support
How to Evalutate Service Level Management Practices
Operations Management
Databases
Structured Query Language (SQL)
Monitoring Performance
Source Code and Perfomance Monitoring
Patch Management
Incident Management
Hardware Component Types
Network Component Types
Module 6 - Auditor Technical Overview
IS Auditor Technical Overview
Security Design
Monitoring Systems
Types of Attacks
Cryptography
Encryption
Asymmetric Encryption
Digital Certificate
Different Kinds of Attacks
Access Controls
Identification and Authenication
Physical Access Exposure
Environmental Security
Network Security Devices and Network Components
Network Address Translation
Virtual Private Networks (VPNs)
Voice System Risks
Intrusion Detection
Firewalls
Firewall Implementation
Network Access Protection
HoneyPot
Risks to Portable and Wireless Devices
Bluetooth
OSI Networking
Managing Data
Module 7 - Business Continuity and Disaster Recovery
Business Continuity and Disaster Recovery
Fault Tolerance
Business Continuity and Disaster Recovery Regulations
Module 1: Security and Risk Management
Introduction
CIA Triad Security Governance - Part 1
CIA Triad Security Governance - Part 2
Compliance Legal And Regulatory Issues - Part 1
Compliance Legal And Regulatory Issues - Part 2
Understanding Professional Ethics - Part 1
Understanding Professional Ethics - Part 2
Risk Management - Part 1
Risk Management - Part 2
Threat Modeling Acquisition Strategy And Practice Security Awareness And Training - Part 1
Threat Modeling Acquisition Strategy And Practice Security Awareness And Training - Part 2
Module 2: Asset Security
Asset Security - Part 1
Asset Security - Part 2
Module 3: Security Engineering
Engineering And Management Of Security - Part 1
Engineering And Management Of Security - Part 2
Engineering And Management Of Security - Part 3
Engineering And Management Of Security - Part 4
Engineering And Management Of Security - Part 5
Engineering And Management Of Security - Part 6
Module 4: Communication and Network Security
Apply Secure Design Principles To Networks - Part 1
Apply Secure Design Principles To Networks - Part 2
Apply Secure Design Principles To Networks - Part 3
Apply Secure Design Principles To Networks - Part 4
Apply Secure Design Principles To Networks - Part 5
Apply Secure Design Principles To Networks - Part 6
Securing Network Components - Part 1
Securing Network Components - Part 2
Design And Establish Secure Communication Channels - Part 1
Design And Establish Secure Communication Channels - Part 2
Design And Establish Secure Communication Channels - Part 3
Module 5: Identity and Access Management
Controlling Access And Managing Identity - Part 1
Controlling Access And Managing Identity - Part 2
Controlling Access And Managing Identity - Part 3
Controlling Access And Managing Identity - Part 4
Module 6: Security Assessment Testing
Designing Performing And Analyzing Security Testing
Module 7: Security Operations
Foundational Concepts And Investigations - Part 1
Foundational Concepts And Investigations - Part 2
Incident Management And Preventative Measures - Part 1
Incident Management And Preventative Measures - Part 2
Disaster Recovery Process - Part 1
Disaster Recovery Process - Part 2
Module 8: Software Development Security
Understanding Applying And Enforcing Software Security - Part 1
Understanding Applying And Enforcing Software Security - Part 2
Conclusion
Cloud Concepts, Architecture and Design
Course Intro
Cloud Concepts, Architecture and Design - Part 1
Cloud Concepts, Architecture and Design - Part 2
Cloud Concepts, Architecture and Design - Part 3
Cloud Concepts, Architecture and Design - Part 4
Cloud Concepts, Architecture and Design - Part 5
Cloud Concepts, Architecture and Design - Part 6
Cloud Concepts, Architecture and Design - Part 7
Cloud Concepts, Architecture and Design - Part 8
Cloud Concepts, Architecture and Design - Part 9
Legal, Risk and Compliance
Legal, Risk and Compliance Part 1
Legal, Risk and Compliance Part 2
Legal, Risk and Compliance Part 3
Legal, Risk and Compliance Part 4
Legal, Risk and Compliance Part 5
Legal, Risk and Compliance Part 6
Legal, Risk and Compliance Part 7
Cloud Data Security
Cloud Data Security - Part 1
Cloud Data Security - Part 2
Cloud Data Security - Part 3
Cloud Data Security - Part 4
Cloud Data Security - Part 5
Cloud Data Security - Part 6
Cloud Data Security - Part 7
Cloud Platform and Infrastructure Security
Cloud Platform and Infrastructure Security - Part 1
Cloud Platform and Infrastructure Security - Part 2
Cloud Platform and Infrastructure Security - Part 3
Cloud Platform and Infrastructure Security - Part 4
Cloud Platform and Infrastructure Security - Part 5
Cloud Platform and Infrastructure Security - Part 6
Cloud Platform and Infrastructure Security - Part 7
Cloud Platform and Infrastructure Security - Part 8
Cloud Application Security
Cloud Application Security - Part 1
Cloud Application Security - Part 2
Cloud Application Security - Part 3
Cloud Application Security - Part 4
Cloud Application Security - Part 5
Cloud Application Security - Part 6
Cloud Application Security - Part 7
Cloud Application Security - Part 8
Cloud Application Security - Part 9
Cloud Security Operations
Cloud Security Operations - Part 1
Cloud Security Operations - Part 2
Cloud Security Operations - Part 3
Cloud Security Operations - Part 4
Cloud Security Operations - Part 5
Cloud Security Operations - Part 6
Cloud Security Operations - Part 7
Cloud Security Operations - Part 8
Cloud Security Operations - Part 9
Cloud Security Operations - Part 10
Cloud Security Operations - Part 11
Course Outro
Embark on a tailored learning path designed to propel you to the forefront of information security management. Our Information Security Manager Training Series is the ultimate blueprint for those seeking to carve out a successful career in information security. Here’s how you can navigate your journey:
By completing this diverse and comprehensive training series, you’ll be well-equipped to assume the role of an Information Security Manager. You will gain the expertise needed to craft effective security strategies, assess and mitigate risks, and ensure compliance within any organization. Whether you are just starting on your information security career path or looking to solidify your standing as a seasoned professional, this training series is your strategic roadmap to becoming a resilient and resourceful Information Security Manager.
Our training caters to a variety of professionals at different stages of their information security career path, from seasoned IT managers to cybersecurity enthusiasts. If you’re pondering, “Would I make a good Information Security Manager?” or are seeking information security manager resources for beginners, this series is your gateway to mastering the domain.
Whether you’re stepping into the realm of information security or advancing in your current role, our program offers the expertise needed to thrive as a security leader, ensuring that you’re well-versed in the latest security practices and compliance mandates.
Here’s a list of individuals who would benefit from this training series, considering the prior experience needed for success:
While prior experience is beneficial for success in this training series, the courses are designed to cater to a range of skill levels, with foundational courses like PMP and PMI-RMP providing the necessary groundwork. However, individuals with some prior exposure to information security or related domains will likely find the content more accessible and relevant.
An Information Security Manager is responsible for protecting an organization’s data, systems, and networks from security threats and breaches. They develop and implement security policies, manage risk, conduct audits, and ensure compliance with security standards and regulations.
Qualifications often include a bachelor’s or master’s degree in a relevant field, such as computer science or cybersecurity. Common certifications for Information Security Managers include Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA).
Information Security Managers face challenges such as keeping up with evolving cyber threats, balancing security with usability, securing cloud environments, managing limited resources, and ensuring that employees and stakeholders adhere to security policies and practices.
Information Security Managers play a crucial role in an organization’s success by protecting sensitive data, reducing security risks, ensuring compliance with regulations, and maintaining the trust of customers and stakeholders. Their efforts help prevent costly data breaches and downtime.
Effective Information Security Managers should possess strong leadership, communication, and problem-solving skills. They should have a deep understanding of security technologies, risk management, and compliance. Additionally, adaptability, attention to detail, and the ability to stay current with cybersecurity trends are vital qualities for success in this role.
Start for only $1. Unlock endless learning opportunities with over 2,600 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.
good
Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.