Level-Up Your Security Career With a CISM Certification
CISM
Four Information Security Qualifications and How They Apply in the Job Market
Although demand for cyber security professionals is exceeding supply, when it comes to finding employment there are plenty of additional qualifications that...
Java Bytecode Reverse Engineering
Abstract
This article is especially designed to show how to crack a Java executable by disassembling the corresponding bytes code. Disassembling of Java bytecode...
ISACA Changes CISM Exam for 2012
According to ISACA, the CISM certification is changing to reflect the new CISM job practice analysis. (Source: ISACA’s CISM Review Manual 2012 p. iii)
ISACA...
CISM Domain – Incident Management and Recovery
CISM Chapter 5 – Incident Management and Response
Incident Management and Response (IM&R) accounts for 14 percent of the CISM exam or about 28 questions. ...
CISM Domain – Information Security Program Management
CISM Chapter 4 – Information Security Program Management (ISPM)
In Chapter 3 we talked about Information Security Program Development, in Chapter 4 we’re...
CISM Domain – Information Security Program Development
CISM Chapter 3 – Information Security Program Development (ISPD)
ISPD accounts for 17 percent of the CISM exam or about 34 questions. In 2010, ISACA reorganized...
CISM Domain – Information Risk Management
CISM Chapter 2 – Information Risk Management (IRM)
IRM accounts for 22 percent of the CISM exam or about 44 questions. In 2010, ISACA reorganized the CISM...
CISM Domain – Information Security Governance
There are eight (8) task statements for ISG and twenty (20) knowledge statements. The eight task statements are covered in this post by Ken....
The CISM Domains – An Overview
ISACA's 2011 CISM fits into DoD 8570.01-M as satisfying IAM Level II
The exam consists of 5 domains as follows:
Domain 1: Information Security Governance...