Certified Information Security Manager (Cism - Isaca)

Posted By: ELK1nG

Certified Information Security Manager (Cism - Isaca)
Last updated 10/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.24 GB | Duration: 11h 41m

CISM by Hemang Doshi

What you'll learn
Certified Information Security Manager ( ISACA - CISM) Lectures
This course contains all the 4 domains of CISM Review Manual
Candidate will able to understand practical aspects of Information Security requirements of the organizations
Candidate will able to confidently attempt and pass the CISM exam
Requirements
No prior knowledge or experience is required. We will teach you everything from basics to pass the CISM Exam.
Description
This course is designed on the basis of official resources of ISACA. It covers all the 4 domains of CISM Review Manual. Topics are arranged segment wise and aligned with latest CISM Review Manual.Course is designed specifically for candidates from non-technical background. Video contents are designed after considering three major aspects:(1) Whether content has capability to engage the audience throughout?(2) Whether content is able to convey the meaning of CISM Review Manual (CRM) in a effective manner.(3) Whether video has capability to make audience understand and retain the key aspects for a longer duration.Features of this course are as follow:This course is designed on the basis of official resources of ISACA.Course is designed specifically for candidates from non-technical background.Topics are arranged segment wise and aligned with latest CISM Review Manual. Exam oriented practice questions and practical example for CISM aspirants.Flashcards based learning mode.Use of smartarts for easy learningMore than 700 plus practice questions Please use this course as a supplement to ISACA's resources. This course will help you to decipher the technicities used in official resources. This course is specfically designed for the candidates from non IT background. We have used simple and plain English for the  benefits of the candidates from non - English speaking countries.

Overview

Section 1: Domain 1 - Information Security Governance

Lecture 1 1.1A - Information Security Governance

Lecture 2 1.1B - Governance Framework

Lecture 3 1.1C - QAE 1 - Information Security Governance

Lecture 4 1.4 - Retention of Business Records

Lecture 5 1.5 - Organization structure

Lecture 6 1.5A - Centralized and Decentralized Functions

Lecture 7 1.6A - Information security roles and responsibilities

Lecture 8 1.6B - Key Aspects - Information security roles and responsibilities

Lecture 9 1.6C - QAE 1 - Information security roles and responsibilities

Lecture 10 1.7 - Maturity model

Lecture 11 1.8A - Information security governance metrics

Lecture 12 1.8B -QAE - Information security governance metrics

Lecture 13 1.9A - Information security strategy and plan

Lecture 14 1.9B - Key Aspects - Information security strategy and plan

Lecture 15 1.9C - QAE - Information security strategy and plan

Lecture 16 1.13 - Enterprise information security architecture

Lecture 17 1.14 - Awareness and education

Lecture 18 1.15 - Governance, Risk and Compliance

Lecture 19 1.16A - Senior management commitment

Lecture 20 1.16B - Key Aspects - Senior management commitment

Lecture 21 1.16C - QAE 1 - Senior management commitment

Lecture 22 1.17A - Business Case and Feasibility Analysis

Lecture 23 1.17B - Key Aspects - Business Case and Feasibility Analysis

Lecture 24 1.17C - QAE 1 - Business Case and Feasibility Analysis

Lecture 25 1.18A - Governance of third-party relationships

Lecture 26 1.18B - Key Aspects - Governance of third-party relationships

Lecture 27 1.18C - QAE 1 - Governance of third-party relationships

Section 2: Domain 2 - Information Risk Management

Lecture 28 2.1A - ISACA's Thinking Hat

Lecture 29 2.1B - Risk Management Overview

Lecture 30 2.2A - Risk Management Strategy

Lecture 31 2.2B - Risk Capacity, Appetite and Tolerance

Lecture 32 2.4A - Risk Assessment

Lecture 33 2.4B - Risk Analysis Methodologies

Lecture 34 2.4C - QAE 1 - Risk Assessment

Lecture 35 2.5 - Information asset classification

Lecture 36 2.6A - Asset Valuation

Lecture 37 2.6B -QAE - Asset Valuation

Lecture 38 2.7A - RTO & RPO

Lecture 39 2.7B - SDO MTO AIW

Lecture 40 2.8 - Outsourcing and Third Party Service Provider

Lecture 41 2.10A - Change Management

Lecture 42 2.10B - QAE - Change Management

Lecture 43 2.11A - Patch Management

Lecture 44 2.11B - QAE - Patch Management

Lecture 45 2.12A - Security Baseline Control

Lecture 46 2.12B - QAE - Security Baseline Control

Lecture 47 Flashcards - Understanding the Risk

Section 3: Domain 3 - Information Security Program

Lecture 48 Chapter 3.1A - Defense in Depth

Lecture 49 Chapter 3.1B - Information Security Program Development Management

Lecture 50 3.2 - Information Security Program Objective

Lecture 51 3.3A - Information Security Framework Components

Lecture 52 3.3B - QAE - Information Security Framework Components

Lecture 53 3.4A - Key Aspects - Information Security Program Road Map

Lecture 54 Chapter 3.4B - QAE - Information Security Program Road Map - Copy

Lecture 55 3.5A - Information Security Policy, Standard and Procedures

Lecture 56 3.5B - QAE - Information Security Policy, Standard and Procedures

Lecture 57 3.6 - Security Budget

Lecture 58 3.7A - Key Aspects - Security Program Management and Administrative Activities

Lecture 59 3.7B - QAE 1 - Security Program Management and Administrative Activities

Lecture 60 3.8 - Privacy Laws

Lecture 61 3.9 - Information Security Architecture

Lecture 62 3.10A - Architecture Implementation

Lecture 63 3.10B - QAE - Architecture Implementation

Lecture 64 3.11A - Identity & Access Control

Lecture 65 3.11B - Key Aspects - Identity & Access Control

Lecture 66 3.11C - QAE - Identity & Access Control

Lecture 67 3.12 - Biometrics

Lecture 68 3.13 - Factor of Authentication

Lecture 69 3.14 - Wireless Networks

Lecture 70 3.15 - Different Attack Methods

Lecture 71 3.16 - Cloud computing

Lecture 72 3.17A - Fail 'Open' Fail 'Close'

Lecture 73 3.17B - Key Aspects - Controls and Countermeasures

Lecture 74 3.17C - QAE 1 - Controls and Countermeasures

Lecture 75 3.18 - Vulnerability Assessment & Penetration Testing

Lecture 76 3.19A - Key Aspects - Security Program Metrics and Monitoring

Lecture 77 3.19B - QAE 1 - Security Program Metrics and Monitoring

Lecture 78 CISM Flashcards - Domain 3

Section 4: Domain 4 - Incident Management

Lecture 79 4.1A - Firewall Types

Lecture 80 4.1B - Firewall Implementation

Lecture 81 4.1C - Proxy / Demilitarized Zone

Lecture 82 4.2A - Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)

Lecture 83 4.2B - Key Aspects - IDS and IPS

Lecture 84 4.3 - Digital Signature

Lecture 85 4.4 - Elements of PKI

Lecture 86 4.5 - Asymmetric Encryption

Lecture 87 4.6A - Phases of Incident Management Life Cycle

Lecture 88 4.6B - SDO-MTO-AIW

Lecture 89 4.6C - Key Aspects - Incident Management Overview

Lecture 90 4.6D - QAE 1 - Incident Management Overview

Lecture 91 4.7A - Incident Response Procedure

Lecture 92 4.7B - QAE - Incident Response Procedure

Lecture 93 4.8A -Key Aspects - Developing Incident Response Plan

Lecture 94 4.8B -QAE - Developing Incident Response Plan

Lecture 95 4.9A - Business Continuity Plan

Lecture 96 4.9B- Disaster Recovery Plan

Lecture 97 4.9C - Business Impact Analysis

Lecture 98 4.10A - Testing Incident Response Plan, BCP and DRP

Lecture 99 4.10B - Key Aspects - Testing Incident Response Plan, BCP and DRP

Lecture 100 4.10C - QAE - Testing Incident Response Plan, BCP and DRP

Lecture 101 4.11 - Executing Response and Recovery Plan

Lecture 102 4.12A Evidence Collection & Forensics

Lecture 103 4.12B - Key Aspects - Post Incident Activities and Investigation

Lecture 104 4.12C - QAE 1 - Post Incident Activities and Investigation

Lecture 105 CISM Flashcards - Domain 4

Information Security Professionals,IT Auditors,Risk Manager