Curriculum
- 24 Sections
- 142 Lessons
- 12 Weeks
Expand all sectionsCollapse all sections
- Week 1Introduction to Information Security Governance8
- 1.1Understanding Information Security Governance60 Minutes
- 1.2The Role of a CISO in Governance60 Minutes
- 1.3Aligning Security with Business Objectives60 Minutes
- 1.4The CIA Triad: Confidentiality, Integrity, and Availability
- 1.5Security Frameworks (ISO 27001, NIST, CIS Controls)
- 1.6Building an Information Security Governance Program
- 1.7Compliance and Legal Considerations
- 1.8Security Policies and Standards
- Week 2Regulatory and Legal Compliance8
- 2.1Understanding Global Compliance Standards60 Minutes
- 2.2GDPR, HIPAA, PCI-DSS, SOX, FISMA, CCPA Overview60 Minutes
- 2.3Industry-Specific Compliance (Banking, Healthcare, Government)60 Minutes
- 2.4Cybersecurity Laws and Regulations
- 2.5Data Protection Laws and Privacy Regulations
- 2.6Role of Compliance Audits
- 2.7Developing a Compliance Strategy
- 2.8Managing Regulatory Reporting Requirements
- Week 3Risk Management in Governance8
- 3.1Introduction to Risk Management60 Minutes
- 3.2Risk Assessment Methodologies60 Minutes
- 3.3Risk Treatment Strategies (Mitigation, Acceptance, Transfer, Avoidance)60 Minutes
- 3.4Third-Party and Vendor Risk Management60 Minutes
- 3.5Business Impact Analysis (BIA)
- 3.6Enterprise Risk Management (ERM)
- 3.7Risk-Based Decision Making
- 3.8Continuous Monitoring and Risk Re-Evaluation
- week 4Security Policies and Implementation8
- 4.1Writing and Implementing Security Policies
- 4.2Security Awareness Training Programs
- 4.3Developing Security Standards and Procedures
- 4.4Security Governance Frameworks (COBIT, ITIL, TOGAF)
- 4.5Security Policy Enforcement and Monitoring
- 4.6Measuring Policy Effectiveness
- 4.7Creating an Information Security Committee
- 4.8Security Metrics and Reporting
- week 5Legal and Ethical Considerations8
- 5.1Ethical Hacking vs. Malicious Hacking
- 5.2Intellectual Property Rights and Digital Forensics
- 5.3Incident Disclosure and Legal Liabilities
- 5.4Contractual Security Obligations
- 5.5Cybercrime Laws and Digital Rights Management
- 5.6Legal Considerations in Cloud Security
- 5.7Privacy vs. Security: Balancing Compliance
- 5.8Case Studies in Legal Security Breaches
- week 6Security Control Frameworks8
- 6.1Security Control Types (Preventive, Detective, Corrective)
- 6.2Control Assurance Frameworks (NIST, ISO, CIS Controls)
- 6.3Control Maturity Models and Assessments
- 6.4Implementing Security Controls in IT Infrastructure
- 6.5Continuous Monitoring of Security Controls
- 6.6Measuring Security Control Effectiveness
- 6.7Role of Security Governance in Control Implementation
- 6.8Case Studies of Failed Security Controls
- week 7Security Control Design and Implementation8
- 7.1Identifying Security Control Objectives
- 7.2Designing Security Controls for Different Environments
- 7.3Implementing Technical Security Controls (IDS, Firewalls, Encryption)
- 7.4Physical and Administrative Security Controls
- 7.5Security Control Monitoring and Auditing
- 7.6Cloud Security Control Implementation
- 7.7Secure Access Controls and Identity Management
- 7.8Security Control Best Practices
- week 8Security Auditing and Compliance Management8
- week 9Security Metrics and Reporting8
- 9.1Key Performance Indicators (KPIs) for Security
- 9.2Security Dashboard and Metrics Reporting
- 9.3Aligning Security Metrics with Business Objectives
- 9.4Measuring the Effectiveness of Security Controls
- 9.5Security Budget Planning Based on Metrics
- 9.6Continuous Security Improvement Based on Metrics
- 9.7Benchmarking Security Performance
- 9.8Security Reporting Best Practices
- week 10Incident Handling and Auditing8
- 10.1Incident Response Frameworks (NIST, ISO 27035)
- 10.2Digital Forensics and Incident Investigation
- 10.3Reporting Security Incidents and Compliance Violations
- 10.4Audit Logging and Log Analysis for Incident Detection
- 10.5Fraud Detection and Insider Threat Monitoring
- 10.6Role of Artificial Intelligence in Incident Detection
- 10.7Cyber Threat Intelligence Integration
- 10.8Lessons Learned from Major Security Incidents
- week 11Security Program Management Fundamentals8
- 11.1Role of a CISO in Security Program Management
- 11.2Establishing a Security Program Roadmap
- 11.3Integrating Security with Business Operations
- 11.4Key Security Management Frameworks
- 11.5Building and Managing a Security Team
- 11.6Managing Security Budgets and Resources
- 11.7Security Operations Center (SOC) Management
- 11.8Developing a Security Strategy
- week 12Information Security Projects and Integration8
- 12.1Security Project Management Principles
- 12.2Change Management in Security Projects
- 12.3Security Integration into DevOps and Agile Environments
- 12.4Security Testing in Software Development Lifecycle (SDLC)
- 12.5Managing Security in IT and Business Projects
- 12.6Secure Configuration Management
- 12.7Security Control Automation
- 12.8Security Documentation and Reporting
- week 13Security Operations and Threat Management8
- 13.1Threat Intelligence and Cyber Threat Hunting
- 13.2Vulnerability Management and Patch Management
- 13.3Intrusion Detection and Prevention Systems (IDS/IPS)
- 13.4Endpoint Detection and Response (EDR)
- 13.5Security Incident Monitoring and Management
- 13.6Advanced Persistent Threats (APT) Detection
- 13.7Security Operations Best Practices
- 13.8Case Studies in Security Operations
- week 14Business Continuity and Disaster Recovery8
- 14.1Disaster Recovery Planning (DRP)
- 14.2Business Continuity Planning (BCP)
- 14.3Crisis Management in Cybersecurity
- 14.4Recovery Strategies and Backup Management
- 14.5Disaster Recovery Testing and Exercises
- 14.6Cloud-Based Disaster Recovery Solutions
- 14.7Incident Communication Plans
- 14.8Lessons Learned from Major Cybersecurity Incidents
- week 15Security Program Performance and Metrics6
- week 16Security Strategic Planning4
- week 17Financial Planning for Security Programs3
- week 18Security Vendor Management3
- week 19Security Compliance Audits and Governance3
- week 20Security Leadership and Board Communication3
- week 21Advanced Security Strategy and Risk Management2
- week 22Security Case Studies and Lessons Learned2
- week 23Certification and Exam Preparation2
- week 24Career Development and Final Assessment2
Interview Preparation
Prev