CISM: Certified Information Security Manager

Best Seller 386 Lectures 14h 30m 44s
Prepare for your Isaca examination with our training course. The CISM course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Isaca certification exam. Pass the Isaca CISM test with flying colors.
$14.99$24.99
Curriculum For This Course

  • 1. Lesson 1: Information Security Governance Overview 53s
  • 2. Information Security Governance Overview Part1 1m 12s
  • 3. Information Security Governance Overview Part2 2m
  • 4. Information Security Governance Overview Part3 1m 22s
  • 5. Information Security Governance Overview Part4 1m 32s
  • 6. Information Security Governance Overview Part5 30s
  • 7. Importance of Information Security Governance Part1 6m 21s
  • 8. Importance of Information Security Governance Part2 1m 19s
  • 9. Outcomes of Information Security Governance Part1 33s
  • 10. Outcomes of Information Security Governance Part2 1m 26s
  • 11. Outcomes of Information Security Governance Part3 2m 45s
  • 12. Outcomes of Information Security Governance Part4 1m 27s
  • 13. Outcomes of Information Security Governance Part5 1m 54s
  • 14. Outcomes of Information Security Governance Part6 1m 28s
  • 15. Lesson 2: Effective Information Security Governance 31s
  • 16. Business Goals and Objectives Part1 1m 31s
  • 17. Business Goals and Objectives Part2 2m
  • 18. Roles and Responsibilities of Senior Management Part1 1m 2s
  • 19. Roles and Responsibilities of Senior Management Part2 43s
  • 20. Domain Tasks Part1 1m 21s
  • 21. Domain Tasks Part2 3m 16s
  • 22. Business Model for Information Security Part1 45s
  • 23. Business Model for Information Security Part2 1m 9s
  • 24. Business Model for Information Security Part3 3m 16s
  • 25. Business Model for Information Security Part4 1m 37s
  • 26. Dynamic Interconnections Part1 34s
  • 27. Dynamic Interconnections Part2 2m 55s
  • 28. Dynamic Interconnections Part3 1m 55s
  • 29. Dynamic Interconnections Part4 51s
  • 30. Lesson 3: Information Security Concepts and Technologies 3m 27s
  • 31. Information Security Concepts and Technologies Part1 2m 58s
  • 32. Information Security Concepts and Technologies Part2 3m 25s
  • 33. Information Security Concepts and Technologies Part3 1m 50s
  • 34. Technologies Part1 1m 41s
  • 35. Technologies Part2 6m 12s
  • 36. Lesson 4: Information Security Manager 33s
  • 37. Responsibilities 1m 48s
  • 38. Senior Management Commitment Part1 48s
  • 39. Senior Management Commitment Part2 2m 27s
  • 40. Obtaining Senior Management Commitment Part1 24s
  • 41. Obtaining Senior Management Commitment Part2 53s
  • 42. Establishing Reporting and Communication Channels Part1 1m 13s
  • 43. Establishing Reporting and Communication Channels Part2 1m 7s
  • 44. Lesson 5: Scope and Charter of Information Security Governance 1m 55s
  • 45. Assurance Process Integration and Convergence 2m 24s
  • 46. Convergence 2m 32s
  • 47. Governance and Third-Party Relationships 2m 38s
  • 48. Lesson 6: Information Security Governance Metrics 56s
  • 49. Metrics 1m 39s
  • 50. Effective Security Metrics Part1 1m 46s
  • 51. Effective Security Metrics Part2 1m 1s
  • 52. Effective Security Metrics Part3 1m 51s
  • 53. Effective Security Metrics Part4 39s
  • 54. Security Implementation Metrics 1m 17s
  • 55. Strategic Alignment Part1 2m 56s
  • 56. Strategic Alignment Part2 1m 11s
  • 57. Risk Management 1m 14s
  • 58. Value Delivery 1m 2s
  • 59. Resource Management Part1 47s
  • 60. Resource Management Part2 41s
  • 61. Performance Measurement 3m 6s
  • 62. Assurance Process Integration/Convergence 2m 54s
  • 63. Lesson 7: Information Security Strategy Overview 53s
  • 64. Another View of Strategy 41s
  • 65. Lesson 8: Creating Information Security Strategy 16s
  • 66. Information Security Strategy 1m 22s
  • 67. Common Pitfalls Part1 4m 38s
  • 68. Common Pitfalls Part2 2m 19s
  • 69. Objectives of the Information Security Strategy 1m 33s
  • 70. What is the Goal? 1m 40s
  • 71. Defining Objectives 1m 23s
  • 72. Business Linkages 1m 48s
  • 73. Business Case Development Part1 1m 44s
  • 74. Business Case Development Part2 2m 36s
  • 75. Business Case Development Part3 45s
  • 76. Business Case Objectives 57s
  • 77. The Desired State 1m 48s
  • 78. COBIT 1m 8s
  • 79. COBIT Controls 1m 9s
  • 80. COBIT Framework 48s
  • 81. Capability Maturity Model 1m 38s
  • 82. Balanced Scorecard 1m 22s
  • 83. Architectural Approaches 1m 3s
  • 84. ISO/IEC 27001 and 27002 1m
  • 85. Risk Objectives Part1 1m 39s
  • 86. Risk Objectives Part2 3m 11s
  • 87. Lesson 9: Determining Current State Of Security 45s
  • 88. Current Risk Part1 2m 37s
  • 89. Current Risk Part2 1m 11s
  • 90. BIA 1m 11s
  • 91. Lesson 10: Information Security Strategy Development 1m 52s
  • 92. The Roadmap 1m 1s
  • 93. Elements of a Strategy 3m 27s
  • 94. Strategy Resources and Constraints 2m 46s
  • 95. Lesson 11: Strategy Resources 32s
  • 96. Policies and Standards 1m 1s
  • 97. Definitions 5m 48s
  • 98. Enterprise Information Security Architectures 1m 30s
  • 99. Controls 3m
  • 100. Countermeasures 55s
  • 101. Technologies 1m 50s
  • 102. Personnel 1m 54s
  • 103. Organizational Structure 3m 47s
  • 104. Employee Roles and Responsibilities 28s
  • 105. Skills 1m 17s
  • 106. Audits 1m 41s
  • 107. Compliance Enforcement 2m 24s
  • 108. Threat Assessment 1m 41s
  • 109. Vulnerability Assessment 2m 21s
  • 110. Risk Assessment 2m 19s
  • 111. Insurance 2m 4s
  • 112. Business Impact Assessment 2m 32s
  • 113. Outsourced Security Providers 2m 57s
  • 114. Lesson 12: Strategy Constraints 23s
  • 115. Legal and Regulatory Requirements 1m 43s
  • 116. Physical Constraints 2m 56s
  • 117. The Security Strategy 1m 36s
  • 118. Lesson 13: Action Plan to Implement Strategy 1m 13s
  • 119. Gap Analysis Part1 1m 35s
  • 120. Gap Analysis Part2 52s
  • 121. Gap Analysis Part3 3m 1s
  • 122. Policy Development Part1 1m 42s
  • 123. Policy Development Part2 1m
  • 124. Standards Development 2m 45s
  • 125. Training and Awareness 35s
  • 126. Action Plan Metrics 1m 23s
  • 127. General Metric Considerations Part1 23s
  • 128. General Metric Considerations Part2 35s
  • 129. General Metric Considerations Part3 43s
  • 130. General Metric Considerations Part4 23s
  • 131. CMM4 Statements 2m
  • 132. Objectives for CMM4 47s
  • 133. Domain 01 Review 44s
  • 1. Lesson 1: Risk Management Overview 59s
  • 2. Risk Management Overview 1m 51s
  • 3. Types of Risk Analysis 7m 8s
  • 4. The Importance of Risk Management 2m 14s
  • 5. Risk Management Outcomes 1m 35s
  • 6. Risk Management Strategy 1m 49s
  • 7. Lesson 2: Good Information Security Risk Management 4m 14s
  • 8. Context and Purpose 3m 8s
  • 9. Scope and Charter 39s
  • 10. Assets 2m 31s
  • 11. Other Risk Management Goals 2m 2s
  • 12. Roles and Responsibilities 2m 52s
  • 13. Lesson 3: Information Security Risk Management Concepts 6m 6s
  • 14. Technologies 6m 39s
  • 15. Lesson 4: Implementing Risk Management 2m 8s
  • 16. The Risk Management Framework 2m
  • 17. The External Environment 1m 48s
  • 18. The Internal Environment 2m 7s
  • 19. The Risk Management Context 47s
  • 20. Gap Analysis 2m 21s
  • 21. Other Organizational Support 4m 9s
  • 22. Risk Analysis 1m 22s
  • 23. Lesson 5: Risk Assessment 1m 19s
  • 24. NIST Risk Assessment Methodology 3m 49s
  • 25. Aggregated or Cascading Risk 2m 54s
  • 26. Other Risk Assessment Approaches 1m 18s
  • 27. Identification of Risks 1m 49s
  • 28. Threats 1m 8s
  • 29. Vulnerabilities Part1 2m 11s
  • 30. Vulnerabilities Part2 4m 10s
  • 31. Risks 1m 36s
  • 32. Analysis of Relevant Risks 1m 48s
  • 33. Semi -Quantitative Analysis 1m 52s
  • 34. Quantitative Analysis Example 4m 14s
  • 35. Evaluation of Risks 46s
  • 36. Risk Treatment Options 4m 39s
  • 37. Impact 2m 59s
  • 38. Lesson 6: Controls Countermeasures 25s
  • 39. Controls 4m 43s
  • 40. Residual Risk 3m 38s
  • 41. Information Resource Valuation 1m 33s
  • 42. Methods of Valuing Assets 1m 36s
  • 43. Information Asset Classification 3m 32s
  • 44. Determining Classification 2m 5s
  • 45. Impact Part1 3m 53s
  • 46. Impact Part2 1m 3s
  • 47. Lesson 7: Recovery Time Objectives 49s
  • 48. Recovery Point Objectives 4m 18s
  • 49. Service Delivery Objectives 1m 58s
  • 50. Third-Party Service Providers 1m 44s
  • 51. Working with Lifecycle Processes 2m 8s
  • 52. IT System Development 2m 12s
  • 53. Project Management Part1 47s
  • 54. Project Management Part2 2m 10s
  • 55. Lesson 8: Risk Monitoring and Communication 1m 17s
  • 56. Risk Monitoring and Communication 38s
  • 57. Other Communications 1m 25s
  • 58. Domain 02 Review 1m 1s
  • 1. Introduction 31s
  • 2. Lesson 1: Development of Information Security Program 2m 50s
  • 3. Importance of the Program 52s
  • 4. Outcomes of Security Program Development 1m 47s
  • 5. Effective Information Security Program Development 4m 59s
  • 6. Lesson 2: Information Security Program Objectives 10s
  • 7. Cross Organizational Responsibilities 1m 55s
  • 8. Program Objectives Part1 2m 23s
  • 9. Program Objectives Part2 1m 18s
  • 10. Defining Objectives Part1 2m 11s
  • 11. Defining Objectives Part2 1m 8s
  • 12. Lesson 3: Information Security Program Development Concepts Part1 4m 2s
  • 13. Information Security Program Development Concepts Part2 5m 39s
  • 14. Technology Resources 2m 44s
  • 15. Information Security Manager 1m 25s
  • 16. Lesson 4: Scope and Charter of Information Security Program Development 30s
  • 17. Assurance Function Integration 1m 35s
  • 18. Challenges in Developing Information Security Program 1m 54s
  • 19. Pitfalls 2m 48s
  • 20. Objectives of the Security Program 2m 6s
  • 21. Program Goals 2m 52s
  • 22. The Steps of the Security Program 1m 46s
  • 23. Defining the Roadmap Part1 1m 38s
  • 24. Defining the Roadmap Part2 58s
  • 25. Elements of the Roadmap Part1 1m 18s
  • 26. Elements of the Roadmap Part2 34s
  • 27. Elements of the Roadmap Part3 1m 57s
  • 28. Elements of the Roadmap Part4 1m 17s
  • 29. Elements of the Roadmap Part5 18s
  • 30. Gap Analysis 44s
  • 31. Lesson 5: Information Security Management Framework 15s
  • 32. Security Management Framework 4m 55s
  • 33. COBIT 5 5m 59s
  • 34. ISO/IEC 27001 4m 30s
  • 35. Lesson 6: Information Security Framework Components 13s
  • 36. Operational Components Part1 1m 56s
  • 37. Operational Components Part2 3m 11s
  • 38. Management Components 1m 31s
  • 39. Administrative Components 3m 30s
  • 40. Educational and Informational Components 1m 26s
  • 41. Lesson 7: Information Security Program Resources 1m 32s
  • 42. Resources 3m 27s
  • 43. Documentation 54s
  • 44. Enterprise Architecture Part1 4m 29s
  • 45. Enterprise Architecture Part2 1m 54s
  • 46. Enterprise Architecture Part3 1m 11s
  • 47. Controls as Strategy Implementation Resources Part1 3m 42s
  • 48. Controls as Strategy Implementation Resources Part2 2m 20s
  • 49. Controls as Strategy Implementation Resources Part3 4m 35s
  • 50. Controls as Strategy Implementation Resources Part4 2m 19s
  • 51. Common Control Practices 1m 41s
  • 52. Countermeasures 37s
  • 53. Technologies Part1 1m 13s
  • 54. Technologies Part2 1m 52s
  • 55. Technologies Part3 1m 39s
  • 56. Technologies Part4 5m 38s
  • 57. Personnel Part1 2m
  • 58. Personnel Part2 2m 56s
  • 59. Security Awareness 1m 28s
  • 60. Awareness Topics 5m 18s
  • 61. Formal Audits 1m 16s
  • 62. Compliance Enforcement 1m 3s
  • 63. Project Risk Analysis 3m 9s
  • 64. Other Actions 2m 58s
  • 65. Other Organizational Support 1m 21s
  • 66. Program Budgeting Part1 1m 3s
  • 67. Program Budgeting Part2 2m 19s
  • 68. Lesson 8: Implementing an Information Security Program 13s
  • 69. Policy Compliance 2m 38s
  • 70. Standards Compliance 2m 44s
  • 71. Training and Education 1m 43s
  • 72. ISACA Control Objectives 3m 52s
  • 73. Third-party Service Providers Part1 1m 8s
  • 74. Third-party Service Providers Part2 4m 22s
  • 75. Integration into Lifecycle Processes 2m 14s
  • 76. Monitoring and Communication 3m 33s
  • 77. The Plan of Action Part1 1m 17s
  • 78. The Plan of Action Part2 1m 36s
  • 79. Lesson 9: Information Infrastructure and Architecture 53s
  • 80. Managing Complexity Part1 4m 42s
  • 81. Managing Complexity Part2 1m 45s
  • 82. Objectives of Information Security Architectures Part1 1m 30s
  • 83. Objectives of Information Security Architectures Part2 1m 15s
  • 84. Physical and Environmental Controls 3m 32s
  • 85. Lesson 10: Information Security Program 3m 3s
  • 86. Information Security Program Deployment Metrics 2m 27s
  • 87. Metrics 2m 2s
  • 88. Strategic Alignment 53s
  • 89. Risk Management 1m 41s
  • 90. Value Delivery 35s
  • 91. Resource Management 1m 23s
  • 92. Assurance Process Integration 27s
  • 93. Performance Measurement 41s
  • 94. Security Baselines 38s
  • 95. Lesson 11: Security Program Services and Operational Activities 48s
  • 96. IS Liaison Responsibilities Part1 10m 17s
  • 97. IS Liaison Responsibilities Part2 2m 28s
  • 98. Cross-Organizational Responsibilities 1m 34s
  • 99. Security Reviews and Audits Part1 3m 27s
  • 100. Security Reviews and Audits Part2 1m 38s
  • 101. Management of Security Technology 1m 25s
  • 102. Due Diligence Part1 4m 10s
  • 103. Due Diligence Part2 1m 36s
  • 104. Compliance Monitoring and Enforcement Part1 2m 2s
  • 105. Compliance Monitoring and Enforcement Part2 1m 46s
  • 106. Assessment of Risk and Impact Part1 2m 17s
  • 107. Assessment of Risk and Impact Part2 1m 28s
  • 108. Outsourcing and Service Providers 2m 33s
  • 109. Cloud Computing Part1 1m 37s
  • 110. Cloud Computing Part2 1m 54s
  • 111. Cloud Computing Part3 2m 23s
  • 112. Integration with IT Processes 42s
  • 113. Domain 03 Review 1m 13s
  • 1. Lesson 1: Incident Management Overview Part1 47s
  • 2. Incident Management Overview Part2 3m 8s
  • 3. Incident Management Overview Part3 3m 45s
  • 4. Types of Events Part1 2m 44s
  • 5. Types of Events Part2 3m 20s
  • 6. Goals of Incident Management Part1 4m 45s
  • 7. Goals of Incident Management Part2 6m 31s
  • 8. Goals of Incident Management Part3 3m 26s
  • 9. Lesson 2: Incident Response Procedures Part1 23s
  • 10. Incident Response Procedures Part2 3m 40s
  • 11. Importance of Incident Management 8m 1s
  • 12. Outcomes of Incident Management 3m 50s
  • 13. Incident Management 1m 35s
  • 14. Concepts Part1 3m 44s
  • 15. Concepts Part2 1m 35s
  • 16. Concepts Part3 1m 34s
  • 17. Incident Management Systems Part1 4m 2s
  • 18. Incident Management Systems Part2 53s
  • 19. Lesson 3: Incident Management Organization 2m 31s
  • 20. Responsibilities Part1 3m 44s
  • 21. Responsibilities Part2 2m 58s
  • 22. Responsibilities Part3 5m 10s
  • 23. Senior Management Commitment 1m 2s
  • 24. Lesson 4: Incident Management Resources 25s
  • 25. Policies and Standards 36s
  • 26. Incident Response Technology Concepts 11m 12s
  • 27. Personnel 3m 11s
  • 28. Roles and Responsibilities (eNotes) 8m 24s
  • 29. Skills 8m 9s
  • 30. Awareness and Education 1m 20s
  • 31. Audits 2m 49s
  • 32. Lesson 5: Incident Management Objectives 17s
  • 33. Defining Objectives 48s
  • 34. The Desired State 3m 29s
  • 35. Strategic Alignment 6m 42s
  • 36. Other Concerns 2m 33s
  • 37. Lesson 6: Incident Management Metrics and Indicators 5m 14s
  • 38. Implementation of the Security Program Management 3m 1s
  • 39. Management Metrics and Monitoring Part1 1m 35s
  • 40. Management Metrics and Monitoring Part2 2m 48s
  • 41. Other Security Monitoring Efforts 4m 24s
  • 42. Lesson 7: Current State of Incident Response Capability 11s
  • 43. Threats 4m 39s
  • 44. Vulnerabilities 6m 15s
  • 45. Lesson 8: Developing an Incident Response Plan 44s
  • 46. Elements of an Incident Response Plan 8m 19s
  • 47. Gap Analysis 3m 5s
  • 48. BIA Part1 5m 5s
  • 49. BIA Part2 2m 48s
  • 50. Escalation Process for Effective IM 2m 45s
  • 51. Help Desk Processes for Identifying Security Incidents 1m 27s
  • 52. Incident Management and Response Teams 2m 10s
  • 53. Organizing, Training, and Equipping the Response Staff 1m 55s
  • 54. Incident Notification Process 55s
  • 55. Challenges in making an Incident Management Plan 2m 18s
  • 56. Lesson 9: BCP/DRP 7m 49s
  • 57. Goals of Recovery Operations Part1 2m 2s
  • 58. Goals of Recovery Operations Part2 1m 57s
  • 59. Choosing a Site Selection Part1 5m 37s
  • 60. Choosing a Site Selection Part2 1m 18s
  • 61. Implementing the Strategy 3m 58s
  • 62. Incident Management Response Teams 2m 10s
  • 63. Network Service High-availability 4m 17s
  • 64. Storage High-availability 4m 1s
  • 65. Risk Transference 1m 27s
  • 66. Other Response Recovery Plan Options 1m 29s
  • 67. Lesson 10: Testing Response and Recovery Plans 2m 17s
  • 68. Periodic Testing 1m 17s
  • 69. Analyzing Test Results Part1 2m 6s
  • 70. Analyzing Test Results Part2 3m 39s
  • 71. Measuring the Test Results 58s
  • 72. Lesson 11: Executing the Plan 1m 56s
  • 73. Updating the Plan 1m 15s
  • 74. Intrusion Detection Policies 1m 38s
  • 75. Who to Notify about an Incident 1m 52s
  • 76. Recovery Operations 1m 53s
  • 77. Other Recovery Operations 1m 57s
  • 78. Forensic Investigation 3m 5s
  • 79. Hacker / Penetration Methodology 11m 50s
  • 80. Domain 04 Review 1m 15s
  • 81. Course Closure 34s

Hot Exams

How to Open Test Engine .dumpsqueen Files

Use FREE DumpsQueen Test Engine player to open .dumpsqueen files

DumpsQueen Test Engine

Windows

 safe checkout

Your purchase with DumpsQueen.com is safe and fast.

The DumpsQueen.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.

Need Help Assistance?