CISM: Certified Information Security Manager
Best Seller
386 Lectures
14h 30m 44s
Prepare for your Isaca examination with our training course. The CISM course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Isaca certification exam. Pass the Isaca CISM test with flying colors.
$14.99$24.99
Curriculum For This Course
- 1. Course Introduction 1m 2s
- 1. Lesson 1: Information Security Governance Overview 53s
- 2. Information Security Governance Overview Part1 1m 12s
- 3. Information Security Governance Overview Part2 2m
- 4. Information Security Governance Overview Part3 1m 22s
- 5. Information Security Governance Overview Part4 1m 32s
- 6. Information Security Governance Overview Part5 30s
- 7. Importance of Information Security Governance Part1 6m 21s
- 8. Importance of Information Security Governance Part2 1m 19s
- 9. Outcomes of Information Security Governance Part1 33s
- 10. Outcomes of Information Security Governance Part2 1m 26s
- 11. Outcomes of Information Security Governance Part3 2m 45s
- 12. Outcomes of Information Security Governance Part4 1m 27s
- 13. Outcomes of Information Security Governance Part5 1m 54s
- 14. Outcomes of Information Security Governance Part6 1m 28s
- 15. Lesson 2: Effective Information Security Governance 31s
- 16. Business Goals and Objectives Part1 1m 31s
- 17. Business Goals and Objectives Part2 2m
- 18. Roles and Responsibilities of Senior Management Part1 1m 2s
- 19. Roles and Responsibilities of Senior Management Part2 43s
- 20. Domain Tasks Part1 1m 21s
- 21. Domain Tasks Part2 3m 16s
- 22. Business Model for Information Security Part1 45s
- 23. Business Model for Information Security Part2 1m 9s
- 24. Business Model for Information Security Part3 3m 16s
- 25. Business Model for Information Security Part4 1m 37s
- 26. Dynamic Interconnections Part1 34s
- 27. Dynamic Interconnections Part2 2m 55s
- 28. Dynamic Interconnections Part3 1m 55s
- 29. Dynamic Interconnections Part4 51s
- 30. Lesson 3: Information Security Concepts and Technologies 3m 27s
- 31. Information Security Concepts and Technologies Part1 2m 58s
- 32. Information Security Concepts and Technologies Part2 3m 25s
- 33. Information Security Concepts and Technologies Part3 1m 50s
- 34. Technologies Part1 1m 41s
- 35. Technologies Part2 6m 12s
- 36. Lesson 4: Information Security Manager 33s
- 37. Responsibilities 1m 48s
- 38. Senior Management Commitment Part1 48s
- 39. Senior Management Commitment Part2 2m 27s
- 40. Obtaining Senior Management Commitment Part1 24s
- 41. Obtaining Senior Management Commitment Part2 53s
- 42. Establishing Reporting and Communication Channels Part1 1m 13s
- 43. Establishing Reporting and Communication Channels Part2 1m 7s
- 44. Lesson 5: Scope and Charter of Information Security Governance 1m 55s
- 45. Assurance Process Integration and Convergence 2m 24s
- 46. Convergence 2m 32s
- 47. Governance and Third-Party Relationships 2m 38s
- 48. Lesson 6: Information Security Governance Metrics 56s
- 49. Metrics 1m 39s
- 50. Effective Security Metrics Part1 1m 46s
- 51. Effective Security Metrics Part2 1m 1s
- 52. Effective Security Metrics Part3 1m 51s
- 53. Effective Security Metrics Part4 39s
- 54. Security Implementation Metrics 1m 17s
- 55. Strategic Alignment Part1 2m 56s
- 56. Strategic Alignment Part2 1m 11s
- 57. Risk Management 1m 14s
- 58. Value Delivery 1m 2s
- 59. Resource Management Part1 47s
- 60. Resource Management Part2 41s
- 61. Performance Measurement 3m 6s
- 62. Assurance Process Integration/Convergence 2m 54s
- 63. Lesson 7: Information Security Strategy Overview 53s
- 64. Another View of Strategy 41s
- 65. Lesson 8: Creating Information Security Strategy 16s
- 66. Information Security Strategy 1m 22s
- 67. Common Pitfalls Part1 4m 38s
- 68. Common Pitfalls Part2 2m 19s
- 69. Objectives of the Information Security Strategy 1m 33s
- 70. What is the Goal? 1m 40s
- 71. Defining Objectives 1m 23s
- 72. Business Linkages 1m 48s
- 73. Business Case Development Part1 1m 44s
- 74. Business Case Development Part2 2m 36s
- 75. Business Case Development Part3 45s
- 76. Business Case Objectives 57s
- 77. The Desired State 1m 48s
- 78. COBIT 1m 8s
- 79. COBIT Controls 1m 9s
- 80. COBIT Framework 48s
- 81. Capability Maturity Model 1m 38s
- 82. Balanced Scorecard 1m 22s
- 83. Architectural Approaches 1m 3s
- 84. ISO/IEC 27001 and 27002 1m
- 85. Risk Objectives Part1 1m 39s
- 86. Risk Objectives Part2 3m 11s
- 87. Lesson 9: Determining Current State Of Security 45s
- 88. Current Risk Part1 2m 37s
- 89. Current Risk Part2 1m 11s
- 90. BIA 1m 11s
- 91. Lesson 10: Information Security Strategy Development 1m 52s
- 92. The Roadmap 1m 1s
- 93. Elements of a Strategy 3m 27s
- 94. Strategy Resources and Constraints 2m 46s
- 95. Lesson 11: Strategy Resources 32s
- 96. Policies and Standards 1m 1s
- 97. Definitions 5m 48s
- 98. Enterprise Information Security Architectures 1m 30s
- 99. Controls 3m
- 100. Countermeasures 55s
- 101. Technologies 1m 50s
- 102. Personnel 1m 54s
- 103. Organizational Structure 3m 47s
- 104. Employee Roles and Responsibilities 28s
- 105. Skills 1m 17s
- 106. Audits 1m 41s
- 107. Compliance Enforcement 2m 24s
- 108. Threat Assessment 1m 41s
- 109. Vulnerability Assessment 2m 21s
- 110. Risk Assessment 2m 19s
- 111. Insurance 2m 4s
- 112. Business Impact Assessment 2m 32s
- 113. Outsourced Security Providers 2m 57s
- 114. Lesson 12: Strategy Constraints 23s
- 115. Legal and Regulatory Requirements 1m 43s
- 116. Physical Constraints 2m 56s
- 117. The Security Strategy 1m 36s
- 118. Lesson 13: Action Plan to Implement Strategy 1m 13s
- 119. Gap Analysis Part1 1m 35s
- 120. Gap Analysis Part2 52s
- 121. Gap Analysis Part3 3m 1s
- 122. Policy Development Part1 1m 42s
- 123. Policy Development Part2 1m
- 124. Standards Development 2m 45s
- 125. Training and Awareness 35s
- 126. Action Plan Metrics 1m 23s
- 127. General Metric Considerations Part1 23s
- 128. General Metric Considerations Part2 35s
- 129. General Metric Considerations Part3 43s
- 130. General Metric Considerations Part4 23s
- 131. CMM4 Statements 2m
- 132. Objectives for CMM4 47s
- 133. Domain 01 Review 44s
- 1. Lesson 1: Risk Management Overview 59s
- 2. Risk Management Overview 1m 51s
- 3. Types of Risk Analysis 7m 8s
- 4. The Importance of Risk Management 2m 14s
- 5. Risk Management Outcomes 1m 35s
- 6. Risk Management Strategy 1m 49s
- 7. Lesson 2: Good Information Security Risk Management 4m 14s
- 8. Context and Purpose 3m 8s
- 9. Scope and Charter 39s
- 10. Assets 2m 31s
- 11. Other Risk Management Goals 2m 2s
- 12. Roles and Responsibilities 2m 52s
- 13. Lesson 3: Information Security Risk Management Concepts 6m 6s
- 14. Technologies 6m 39s
- 15. Lesson 4: Implementing Risk Management 2m 8s
- 16. The Risk Management Framework 2m
- 17. The External Environment 1m 48s
- 18. The Internal Environment 2m 7s
- 19. The Risk Management Context 47s
- 20. Gap Analysis 2m 21s
- 21. Other Organizational Support 4m 9s
- 22. Risk Analysis 1m 22s
- 23. Lesson 5: Risk Assessment 1m 19s
- 24. NIST Risk Assessment Methodology 3m 49s
- 25. Aggregated or Cascading Risk 2m 54s
- 26. Other Risk Assessment Approaches 1m 18s
- 27. Identification of Risks 1m 49s
- 28. Threats 1m 8s
- 29. Vulnerabilities Part1 2m 11s
- 30. Vulnerabilities Part2 4m 10s
- 31. Risks 1m 36s
- 32. Analysis of Relevant Risks 1m 48s
- 33. Semi -Quantitative Analysis 1m 52s
- 34. Quantitative Analysis Example 4m 14s
- 35. Evaluation of Risks 46s
- 36. Risk Treatment Options 4m 39s
- 37. Impact 2m 59s
- 38. Lesson 6: Controls Countermeasures 25s
- 39. Controls 4m 43s
- 40. Residual Risk 3m 38s
- 41. Information Resource Valuation 1m 33s
- 42. Methods of Valuing Assets 1m 36s
- 43. Information Asset Classification 3m 32s
- 44. Determining Classification 2m 5s
- 45. Impact Part1 3m 53s
- 46. Impact Part2 1m 3s
- 47. Lesson 7: Recovery Time Objectives 49s
- 48. Recovery Point Objectives 4m 18s
- 49. Service Delivery Objectives 1m 58s
- 50. Third-Party Service Providers 1m 44s
- 51. Working with Lifecycle Processes 2m 8s
- 52. IT System Development 2m 12s
- 53. Project Management Part1 47s
- 54. Project Management Part2 2m 10s
- 55. Lesson 8: Risk Monitoring and Communication 1m 17s
- 56. Risk Monitoring and Communication 38s
- 57. Other Communications 1m 25s
- 58. Domain 02 Review 1m 1s
- 1. Introduction 31s
- 2. Lesson 1: Development of Information Security Program 2m 50s
- 3. Importance of the Program 52s
- 4. Outcomes of Security Program Development 1m 47s
- 5. Effective Information Security Program Development 4m 59s
- 6. Lesson 2: Information Security Program Objectives 10s
- 7. Cross Organizational Responsibilities 1m 55s
- 8. Program Objectives Part1 2m 23s
- 9. Program Objectives Part2 1m 18s
- 10. Defining Objectives Part1 2m 11s
- 11. Defining Objectives Part2 1m 8s
- 12. Lesson 3: Information Security Program Development Concepts Part1 4m 2s
- 13. Information Security Program Development Concepts Part2 5m 39s
- 14. Technology Resources 2m 44s
- 15. Information Security Manager 1m 25s
- 16. Lesson 4: Scope and Charter of Information Security Program Development 30s
- 17. Assurance Function Integration 1m 35s
- 18. Challenges in Developing Information Security Program 1m 54s
- 19. Pitfalls 2m 48s
- 20. Objectives of the Security Program 2m 6s
- 21. Program Goals 2m 52s
- 22. The Steps of the Security Program 1m 46s
- 23. Defining the Roadmap Part1 1m 38s
- 24. Defining the Roadmap Part2 58s
- 25. Elements of the Roadmap Part1 1m 18s
- 26. Elements of the Roadmap Part2 34s
- 27. Elements of the Roadmap Part3 1m 57s
- 28. Elements of the Roadmap Part4 1m 17s
- 29. Elements of the Roadmap Part5 18s
- 30. Gap Analysis 44s
- 31. Lesson 5: Information Security Management Framework 15s
- 32. Security Management Framework 4m 55s
- 33. COBIT 5 5m 59s
- 34. ISO/IEC 27001 4m 30s
- 35. Lesson 6: Information Security Framework Components 13s
- 36. Operational Components Part1 1m 56s
- 37. Operational Components Part2 3m 11s
- 38. Management Components 1m 31s
- 39. Administrative Components 3m 30s
- 40. Educational and Informational Components 1m 26s
- 41. Lesson 7: Information Security Program Resources 1m 32s
- 42. Resources 3m 27s
- 43. Documentation 54s
- 44. Enterprise Architecture Part1 4m 29s
- 45. Enterprise Architecture Part2 1m 54s
- 46. Enterprise Architecture Part3 1m 11s
- 47. Controls as Strategy Implementation Resources Part1 3m 42s
- 48. Controls as Strategy Implementation Resources Part2 2m 20s
- 49. Controls as Strategy Implementation Resources Part3 4m 35s
- 50. Controls as Strategy Implementation Resources Part4 2m 19s
- 51. Common Control Practices 1m 41s
- 52. Countermeasures 37s
- 53. Technologies Part1 1m 13s
- 54. Technologies Part2 1m 52s
- 55. Technologies Part3 1m 39s
- 56. Technologies Part4 5m 38s
- 57. Personnel Part1 2m
- 58. Personnel Part2 2m 56s
- 59. Security Awareness 1m 28s
- 60. Awareness Topics 5m 18s
- 61. Formal Audits 1m 16s
- 62. Compliance Enforcement 1m 3s
- 63. Project Risk Analysis 3m 9s
- 64. Other Actions 2m 58s
- 65. Other Organizational Support 1m 21s
- 66. Program Budgeting Part1 1m 3s
- 67. Program Budgeting Part2 2m 19s
- 68. Lesson 8: Implementing an Information Security Program 13s
- 69. Policy Compliance 2m 38s
- 70. Standards Compliance 2m 44s
- 71. Training and Education 1m 43s
- 72. ISACA Control Objectives 3m 52s
- 73. Third-party Service Providers Part1 1m 8s
- 74. Third-party Service Providers Part2 4m 22s
- 75. Integration into Lifecycle Processes 2m 14s
- 76. Monitoring and Communication 3m 33s
- 77. The Plan of Action Part1 1m 17s
- 78. The Plan of Action Part2 1m 36s
- 79. Lesson 9: Information Infrastructure and Architecture 53s
- 80. Managing Complexity Part1 4m 42s
- 81. Managing Complexity Part2 1m 45s
- 82. Objectives of Information Security Architectures Part1 1m 30s
- 83. Objectives of Information Security Architectures Part2 1m 15s
- 84. Physical and Environmental Controls 3m 32s
- 85. Lesson 10: Information Security Program 3m 3s
- 86. Information Security Program Deployment Metrics 2m 27s
- 87. Metrics 2m 2s
- 88. Strategic Alignment 53s
- 89. Risk Management 1m 41s
- 90. Value Delivery 35s
- 91. Resource Management 1m 23s
- 92. Assurance Process Integration 27s
- 93. Performance Measurement 41s
- 94. Security Baselines 38s
- 95. Lesson 11: Security Program Services and Operational Activities 48s
- 96. IS Liaison Responsibilities Part1 10m 17s
- 97. IS Liaison Responsibilities Part2 2m 28s
- 98. Cross-Organizational Responsibilities 1m 34s
- 99. Security Reviews and Audits Part1 3m 27s
- 100. Security Reviews and Audits Part2 1m 38s
- 101. Management of Security Technology 1m 25s
- 102. Due Diligence Part1 4m 10s
- 103. Due Diligence Part2 1m 36s
- 104. Compliance Monitoring and Enforcement Part1 2m 2s
- 105. Compliance Monitoring and Enforcement Part2 1m 46s
- 106. Assessment of Risk and Impact Part1 2m 17s
- 107. Assessment of Risk and Impact Part2 1m 28s
- 108. Outsourcing and Service Providers 2m 33s
- 109. Cloud Computing Part1 1m 37s
- 110. Cloud Computing Part2 1m 54s
- 111. Cloud Computing Part3 2m 23s
- 112. Integration with IT Processes 42s
- 113. Domain 03 Review 1m 13s
- 1. Lesson 1: Incident Management Overview Part1 47s
- 2. Incident Management Overview Part2 3m 8s
- 3. Incident Management Overview Part3 3m 45s
- 4. Types of Events Part1 2m 44s
- 5. Types of Events Part2 3m 20s
- 6. Goals of Incident Management Part1 4m 45s
- 7. Goals of Incident Management Part2 6m 31s
- 8. Goals of Incident Management Part3 3m 26s
- 9. Lesson 2: Incident Response Procedures Part1 23s
- 10. Incident Response Procedures Part2 3m 40s
- 11. Importance of Incident Management 8m 1s
- 12. Outcomes of Incident Management 3m 50s
- 13. Incident Management 1m 35s
- 14. Concepts Part1 3m 44s
- 15. Concepts Part2 1m 35s
- 16. Concepts Part3 1m 34s
- 17. Incident Management Systems Part1 4m 2s
- 18. Incident Management Systems Part2 53s
- 19. Lesson 3: Incident Management Organization 2m 31s
- 20. Responsibilities Part1 3m 44s
- 21. Responsibilities Part2 2m 58s
- 22. Responsibilities Part3 5m 10s
- 23. Senior Management Commitment 1m 2s
- 24. Lesson 4: Incident Management Resources 25s
- 25. Policies and Standards 36s
- 26. Incident Response Technology Concepts 11m 12s
- 27. Personnel 3m 11s
- 28. Roles and Responsibilities (eNotes) 8m 24s
- 29. Skills 8m 9s
- 30. Awareness and Education 1m 20s
- 31. Audits 2m 49s
- 32. Lesson 5: Incident Management Objectives 17s
- 33. Defining Objectives 48s
- 34. The Desired State 3m 29s
- 35. Strategic Alignment 6m 42s
- 36. Other Concerns 2m 33s
- 37. Lesson 6: Incident Management Metrics and Indicators 5m 14s
- 38. Implementation of the Security Program Management 3m 1s
- 39. Management Metrics and Monitoring Part1 1m 35s
- 40. Management Metrics and Monitoring Part2 2m 48s
- 41. Other Security Monitoring Efforts 4m 24s
- 42. Lesson 7: Current State of Incident Response Capability 11s
- 43. Threats 4m 39s
- 44. Vulnerabilities 6m 15s
- 45. Lesson 8: Developing an Incident Response Plan 44s
- 46. Elements of an Incident Response Plan 8m 19s
- 47. Gap Analysis 3m 5s
- 48. BIA Part1 5m 5s
- 49. BIA Part2 2m 48s
- 50. Escalation Process for Effective IM 2m 45s
- 51. Help Desk Processes for Identifying Security Incidents 1m 27s
- 52. Incident Management and Response Teams 2m 10s
- 53. Organizing, Training, and Equipping the Response Staff 1m 55s
- 54. Incident Notification Process 55s
- 55. Challenges in making an Incident Management Plan 2m 18s
- 56. Lesson 9: BCP/DRP 7m 49s
- 57. Goals of Recovery Operations Part1 2m 2s
- 58. Goals of Recovery Operations Part2 1m 57s
- 59. Choosing a Site Selection Part1 5m 37s
- 60. Choosing a Site Selection Part2 1m 18s
- 61. Implementing the Strategy 3m 58s
- 62. Incident Management Response Teams 2m 10s
- 63. Network Service High-availability 4m 17s
- 64. Storage High-availability 4m 1s
- 65. Risk Transference 1m 27s
- 66. Other Response Recovery Plan Options 1m 29s
- 67. Lesson 10: Testing Response and Recovery Plans 2m 17s
- 68. Periodic Testing 1m 17s
- 69. Analyzing Test Results Part1 2m 6s
- 70. Analyzing Test Results Part2 3m 39s
- 71. Measuring the Test Results 58s
- 72. Lesson 11: Executing the Plan 1m 56s
- 73. Updating the Plan 1m 15s
- 74. Intrusion Detection Policies 1m 38s
- 75. Who to Notify about an Incident 1m 52s
- 76. Recovery Operations 1m 53s
- 77. Other Recovery Operations 1m 57s
- 78. Forensic Investigation 3m 5s
- 79. Hacker / Penetration Methodology 11m 50s
- 80. Domain 04 Review 1m 15s
- 81. Course Closure 34s
Hot Exams
Microsoft AZ-104 Exam Dumps
Microsoft AI-102 Exam Dumps
Amazon Web Services SCS-C02 Exam Dumps
Nutanix NCA-6.5 Exam Dumps
Alibaba Cloud ACA-Database Exam Dumps
Amazon AWS SAP-C02 Exam Dumps
CompTIA 220-1102 Exam Dumps
CompTIA 220-1101 Exam Dumps
Databricks Databricks-Certified-Professional-Data-Engineer Exam Dumps
Microsoft AZ-801 Exam Dumps
ACFE CFE-Financial-Transactions-and-Fraud-Schemes Exam Dumps
Microsoft SC-200 Exam Dumps
Test Prep ASVAB-Test Exam Dumps
IAPP CIPM Exam Dumps
Cima P2 Exam Dumps
Microsoft DP-300 Exam Dumps
Cisco 350-501 Exam Dumps
Autodesk ACP-01101 Exam Dumps
ITIL ITILFND-V4 Exam Dumps
AFP CTP Exam Dumps
CompTIA SY0-701 Exam Dumps
CompTIA 220-1101 Exam Dumps
PMI PMP Exam Dumps
Amazon Web Services SCS-C02 Exam Dumps
IIA IIA-CIA-Part2 Exam Dumps
ISC2 CISSP Exam Dumps
ITIL ITILFND-V4 Exam Dumps
Okta Okta-Certified-Professional Exam Dumps
Amazon Web Services CLF-C02 Exam Dumps
Cisco 300-410 Exam Dumps
Cisco 200-301 Exam Dumps
Cisco 350-501 Exam Dumps
Microsoft AZ-104 Exam Dumps
ServiceNow CIS-SM Exam Dumps
Microsoft AI-102 Exam Dumps
Amazon AWS SAA-C03 Exam Dumps
CompTIA 220-1102 Exam Dumps
Amazon AWS SAP-C02 Exam Dumps
PEOPLECERT ITIL-4-DITS Exam Dumps
SAP C_CPE_16 Exam Dumps
How to Open Test Engine .dumpsarena Files
Use FREE DumpsArena Test Engine player to open .dumpsarena files
Refund Policy
DumpsArena.com has a remarkable success record. We're confident of our products and provide a no hassle refund policy.
Your purchase with DumpsArena.com is safe and fast.
The DumpsArena.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.