Get the detailed information you need to tackle the Information Security Program domain on the Certified Information Security Manager (CISM) exam.
Overview
Syllabus
Introduction
- Information security program
- What you need to know
- Study resources
- Scope and charter
- Alignment of security and business objectives
- Building a security team
- Conducting a gap analysis
- Improving personnel security
- Security in the hiring process
- Employee termination process
- Employee privacy
- Social networking
- What is the cloud?
- Cloud computing roles
- Drivers for cloud computing
- Virtualization
- Cloud activities and the Cloud Reference Architecture
- Cloud deployment models
- Cloud service categories
- Security and privacy concerns in the cloud
- Operating system security
- Malware prevention
- Application management
- Host-based network security controls
- File integrity monitoring
- Data loss prevention
- Data encryption
- Hardware and firmware security
- Mobile device security
- Mobile device management
- Mobile device tracking
- Mobile application security
- Mobile security enforcement
- Bring your own device (BYOD)
- Mobile deployment models
- Understanding encryption
- Symmetric and asymmetric cryptography
- Goals of cryptography
- Choosing encryption algorithms
- The cryptographic lifecycle
- Key exchange
- Diffie-Hellman
- Key escrow
- Key stretching
- Trust models
- PKI and digital certificates
- Hash functions
- Digital signatures
- TLS and SSL
- IPsec
- Securing common protocols
- Site and facility design
- Data center environmental controls
- Physical access control
- Visitor management
- Physical security personnel
- Routers, switches, and bridges
- Firewalls
- VPNs and VPN concentrators
- Network intrusion detection and prevention
- Unified threat management
- VLANs and network segmentation
- Network access control
- Remote network access
- Identification, authentication, and authorization
- Usernames and access cards
- Authentication factors
- Biometrics
- Multi-factor authentication
- Something you have
- Understanding account and privilege management
- Account types
- Account policies
- Account monitoring
- Privileged access management
- Provisioning and deprovisioning
- Change management
- Configuration management
- Physical asset management
- Personnel safety
- Emergency management
- Software platforms
- Development methodologies
- Maturity models
- Operation, maintenance, and change management
- Code review
- Software testing
- Code security tests
- Third-party code
- Continuing your studies
Taught by
Mike Chapple