Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Certified Information Security Manager - Cism - Domain 1

    Posted By: ELK1nG
    Certified Information Security Manager - Cism - Domain 1

    Certified Information Security Manager - Cism - Domain 1
    Published 11/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.38 GB | Duration: 3h 58m

    Domain 1 | Information Security Governance

    What you'll learn

    Information Security Management

    Enterprise Governance and its related to Information Security

    Governance Tools

    Understand Security Controls

    Requirements

    Nothing, everything will be explained across the course

    Description

    DescriptionCISM certification is a certification by ISACA for experienced Information security management professionals with work experience in developing and managing information security programs. The CISM course covers the four domains of the CISM certification exam. The course is an ideal preparatory course for the students seeking to gain CISM certification as well as the IT security and information security professionals looking to build on their practical experience.The Certified Information Security Manager (CISM) course helps the candidates to achieve the CISM certification. The certification is offered by the Information Systems Audit and Control Association (ISACA) to validate the expertise and knowledge of the candidates regarding the relationship between an information security program and the broader business targets. The certification also validates that the candidate has the hands-on knowledge of developing, managing and implementing an information security program for an organization.RequirementsAs the case with the CISM certification exam, the candidates are required to have a minimum of five years of experience in information security management.Experience in the fields of information security governance, risk management, compliance, and incident management is also preferable.The CISM knowledge domains include the following topicsInformation Security GovernanceInformation Risk ManagementSecurity Program Management and DevelopmentIncident Management and ResponseThis course is about the first domain, Security GovernanceWho this course is for:The ideal candidates for the course must be:Experienced information security managers and officersIT consultants and managersIT auditorsIT security policy makersPrivacy officersNetwork administratorsNetwork security engineersCandidates seeking CISM certification

    Overview

    Section 1: CISM Domain 1 | Information Security Governance

    Lecture 1 Class Introduction - What is CISM Certification and Domains

    Lecture 2 What is Information Security Function

    Lecture 3 Information Security and GRC

    Lecture 4 Criterias of Effective Information Security Program

    Lecture 5 Governance vs Management

    Lecture 6 Outcomes of Proper Security Governace

    Lecture 7 Who is responsible for Security Governance

    Lecture 8 Typical Organizational Structure

    Lecture 9 CRO, CISO, CIO and their roles and responsibilities

    Lecture 10 Goal and Objectives and Understanding RACI Matrix

    Lecture 11 Strategy Constraints Overview

    Lecture 12 Legal Regulations and Standards

    Lecture 13 Retention of Business Records and Secure Disposal

    Lecture 14 SOC 1 vs SOC 2 vs SOC 3

    Lecture 15 Other Strategy Constraints and PDCA Model

    Lecture 16 Security Governance Framework

    Lecture 17 Capability Maturity Model Tool

    Lecture 18 SABSA & TOGAF FRAMEWORKS

    Lecture 19 IT BSC & BMIS

    Lecture 20 Senior Management Support

    Lecture 21 Business Case

    Lecture 22 Policies as Governance Tools

    Lecture 23 Standards Procedures and Guidelines

    Lecture 24 Security Controls

    Lecture 25 Control Objective and Targeted & Compensating Controls

    Anyone interested in cyber security at a management level.,IT Subject matter experts and Auditors,Students preparing for the certification exam,Cyber Security professionals