CISM Certified Information Security Manager CISM 2020 E-Learning
Certified Information Security Manager CISM 2020 E-Learning
€359,00
CISM

Certified Information Security Manager CISM 2020 E-Learning

EUR 359,00 Excl. tax
  • Buy 2 for €351,82 each and save 2%
  • Buy 3 for €348,23 each and save 3%
  • Buy 4 for €344,64 each and save 4%
  • Buy 5 for €341,05 each and save 5%
  • Buy 10 for €323,10 each and save 10%
  • Buy 25 for €305,15 each and save 15%
  • Buy 50 for €287,20 each and save 20%

Training Certified Information Security Manager CISM 2020 - Online E-Learning Course. Order and start immediately for the best price.

  • E-Learning - Online toegang: 365 dagen
  • Taal: Engels (US)
  • Certificaat van deelname
In stock
Order before 4:00 PM and start today.
Quantity
- +
  • Ordered before 23:00, delivered tomorrow
  • Certificaat van deelname
  • Bedrijven bestellen op factuur
  • Betaal in 3x geen extra kosten 0% rente en zonder BKR met in3
  • More information? Contact us about this product
Product description

Certified Information Security Manager CISM 2020 E-Learning

Order this great E-Learning Training Certified Information Security Manager CISM 2020 online course  1 year 24/7 access to rich interactive videos, voice, practice assignments, progress monitoring through reports and tests per subject to test the knowledge directly. After the course you will receive a certificate of participation..

Course content

CISM 2020: Information Security & Business Process Alignment

Course: 1 Hour, 14 Minutes

Course Overview
Information Security Management
Business Processes and IT Security
Security Controls and Control Objectives
ISO/IEC 27001 and IT Security
FedRAMP and IT Security
HIPAA and IT Security
GDPR and IT Security
PCI DSS and IT Security
PIPEDA and IT Security
COBIT and IT Security
Cloud Shared Responsibility
Cloud Provider Security Accreditations
Course Summary

CISM 2020: Managing IT Risk

Course: 1 Hour, 21 Minutes

Course Overview
IT Risk Management
Risk Treatments
Risk Register
Asset Inventory
Data Roles
Data Classification
Classifying Data with Amazon Macie
Classifying Data with Microsoft FSRM
Tagging Cloud Resources
Cloud Risk Assessments
IT Security Return on Investment
Establishing a Security Awareness Program
Course Summary

CISM 2020: Cryptography & PKI

Course: 1 Hour, 17 Minutes

Course Overview
Cryptography and IT Security
Generating File System Hashes
Protecting Files Using Microsoft EFS
Protecting Files Using AxCrypt
Wiping Data from Disks
Protecting Disk Volumes Using Microsoft BitLocker
Generating Key Pairs Using PuTTYgen
Public Key Infrastructure
Deploying a Microsoft ADCS Certificate Authority
Requesting a Microsoft ADCS Certificate
Deploying an AWS Private Certificate Authority
Requesting an AWS Certificate
Course Summary

CISM 2020: TCP/IP Configuration

Course: 1 Hour, 15 Minutes

Course Overview
IPv4 Concepts in a Network Environment
IPv6 Concepts in a Network Environment
The OSI Model and TCP/IP
Domain Name System (DNS) and Network Name Resolution
Configuring DNS in the Microsoft Azure Cloud
Configuring DNS in the AWS Cloud
Configuring DNS Using GoDaddy
Configuring TCP/IP Manually
Configuring TCP/IP through DHCP
Network Infrastructure Equipment
Capturing Network Traffic Using Wireshark
Course Summary

CISM 2020: Network Infrastructure Security

Course: 1 Hour, 12 Minutes

Course Overview
IPsec and Network Traffic
Deploying IPsec for Windows
Choosing a Firewall
Configuring Windows Defender Firewall
Configuring a Linux Firewall
Configuring AWS Network ACLs
Configuring Microsoft Azure Firewall
Wi-Fi Security
Securing a Wi-Fi Router
Forging Network Packets
Course Summary

CISM 2020: Identity & Access Management

Course: 1 Hour, 19 Minutes

Course Overview
IAM and IT Security Governance
Authentication and Authorization
Creating Microsoft AD DS Users and Groups
Setting NTFS File System Permissions
Creating Linux Users and Groups
Setting Linux File System Permissions
Creating AWS Users and Groups
Assigning AWS Permissions Using Policies
Identity Federation
Multifactor Authentication
Enabling MFA for AWS Users
Course Summary

CISM 2020: Server Roles

Course: 41 Minutes

Course Overview
Managing Server Roles Securely
Deploying a Windows Cloud-based Server
Managing a Windows Cloud-based Server Remotely
Deploying a Linux Cloud-based Server
Managing a Linux Cloud-based Server Remotely
Enabling Virtual Machine Encryption
Course Summary

CISM 2020: IT Security Policies

Course: 1 Hour, 23 Minutes

Course Overview
IT Security Policy Types
Change Management for Secure Configurations
Patch Management for Secure Updates
Hardening Techniques for Networks and Hosts
Securing a Windows Server
Securing a Linux Server
Securing a Network Printer
Implementing Password Policies in Windows
Deploying Security Settings Using Microsoft Group Policy
Social Engineering Methods
Detecting Phishing Scams
Common Malware Types
Course Summary

CISM 2020: Detecting Security Anomalies

Course: 57 Minutes

Course Overview
Security Baselines
Intrusion Detection and Prevention
Configuring the Snort IDS
Honeypots and Honeynets
Analyzing Windows Logs
Enabling Linux Log Forwarding
Viewing Non-compliance Reports
SIEM and SOAR
Course Summary

CISM 2020: Security Testing

Course: 31 Minutes

Course Overview
Physical Security in IT Governance
Network Reconnaissance in IT Attacks
The Benefits of Vulnerability Assessments
Conducting a Vulnerability Assessment Using Nessus
The Benefits of Penetration Testing
Course Summary

CISM 2020: Digital Forensics

Course: 1 Hour, 8 Minutes

Course Overview
Order of Volatility
Chain of Custody
Data Immutability
Digital Forensic Hardware
Digital Forensic Software
Using Steganography
Acquiring a Hard Disk Image in Linux
Browsing Data Using Autopsy in Kali Linux
The OWASP Top 10 Web App Attacks
Secure Coding and the Software Development Life Cycle (SDLC)
Course Summary

CISM 2020: Business Continuity

Course: 1 Hour, 17 Minutes

Course Overview
IT Governance and Personnel in the Enterprise
The Characteristics of High-availability Solutions
Configuring RAID 1 Mirroring
Enabling Cloud Storage Replication
Deploying an Application Load Balancer
Data Backup Strategies for Given Situations
Backing Up Data to the Cloud
Business Impact Analysis vs. Risk Assessments
Creating Disaster Recovery Plans
Implementing Incident Response Plans (IRPs)
Carrying Out Post-incident Reviews
Course Summary

Specifications
Availabilty 13:35 hours
Language English
Certificate of participation Yes
Online access 90 days
Progress monitoring Yes
Award Winning E-learning Yes
Suitable for mobile Yes
What our customers say

average of 0 review(s)

No reviews found
Read or write a review
My account
You are not logged in. Log in to make use of all the benefits. Or create an account now.
Language
Cart
Your cart is empty
Menu
Search
Search suggestions
No courses or trainings found...
Please accept cookies to help us improve this website Is this OK? Yes No More on cookies »