Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Certified Information Security Manager (Cism - Isaca)

    Posted By: ELK1nG
    Certified Information Security Manager (Cism - Isaca)

    Certified Information Security Manager (Cism - Isaca)
    Last updated 10/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.24 GB | Duration: 11h 41m

    CISM by Hemang Doshi

    What you'll learn
    Certified Information Security Manager ( ISACA - CISM) Lectures
    This course contains all the 4 domains of CISM Review Manual
    Candidate will able to understand practical aspects of Information Security requirements of the organizations
    Candidate will able to confidently attempt and pass the CISM exam
    Requirements
    No prior knowledge or experience is required. We will teach you everything from basics to pass the CISM Exam.
    Description
    This course is designed on the basis of official resources of ISACA. It covers all the 4 domains of CISM Review Manual. Topics are arranged segment wise and aligned with latest CISM Review Manual.Course is designed specifically for candidates from non-technical background. Video contents are designed after considering three major aspects:(1) Whether content has capability to engage the audience throughout?(2) Whether content is able to convey the meaning of CISM Review Manual (CRM) in a effective manner.(3) Whether video has capability to make audience understand and retain the key aspects for a longer duration.Features of this course are as follow:This course is designed on the basis of official resources of ISACA.Course is designed specifically for candidates from non-technical background.Topics are arranged segment wise and aligned with latest CISM Review Manual. Exam oriented practice questions and practical example for CISM aspirants.Flashcards based learning mode.Use of smartarts for easy learningMore than 700 plus practice questions Please use this course as a supplement to ISACA's resources. This course will help you to decipher the technicities used in official resources. This course is specfically designed for the candidates from non IT background. We have used simple and plain English for the  benefits of the candidates from non - English speaking countries.

    Overview

    Section 1: Domain 1 - Information Security Governance

    Lecture 1 1.1A - Information Security Governance

    Lecture 2 1.1B - Governance Framework

    Lecture 3 1.1C - QAE 1 - Information Security Governance

    Lecture 4 1.4 - Retention of Business Records

    Lecture 5 1.5 - Organization structure

    Lecture 6 1.5A - Centralized and Decentralized Functions

    Lecture 7 1.6A - Information security roles and responsibilities

    Lecture 8 1.6B - Key Aspects - Information security roles and responsibilities

    Lecture 9 1.6C - QAE 1 - Information security roles and responsibilities

    Lecture 10 1.7 - Maturity model

    Lecture 11 1.8A - Information security governance metrics

    Lecture 12 1.8B -QAE - Information security governance metrics

    Lecture 13 1.9A - Information security strategy and plan

    Lecture 14 1.9B - Key Aspects - Information security strategy and plan

    Lecture 15 1.9C - QAE - Information security strategy and plan

    Lecture 16 1.13 - Enterprise information security architecture

    Lecture 17 1.14 - Awareness and education

    Lecture 18 1.15 - Governance, Risk and Compliance

    Lecture 19 1.16A - Senior management commitment

    Lecture 20 1.16B - Key Aspects - Senior management commitment

    Lecture 21 1.16C - QAE 1 - Senior management commitment

    Lecture 22 1.17A - Business Case and Feasibility Analysis

    Lecture 23 1.17B - Key Aspects - Business Case and Feasibility Analysis

    Lecture 24 1.17C - QAE 1 - Business Case and Feasibility Analysis

    Lecture 25 1.18A - Governance of third-party relationships

    Lecture 26 1.18B - Key Aspects - Governance of third-party relationships

    Lecture 27 1.18C - QAE 1 - Governance of third-party relationships

    Section 2: Domain 2 - Information Risk Management

    Lecture 28 2.1A - ISACA's Thinking Hat

    Lecture 29 2.1B - Risk Management Overview

    Lecture 30 2.2A - Risk Management Strategy

    Lecture 31 2.2B - Risk Capacity, Appetite and Tolerance

    Lecture 32 2.4A - Risk Assessment

    Lecture 33 2.4B - Risk Analysis Methodologies

    Lecture 34 2.4C - QAE 1 - Risk Assessment

    Lecture 35 2.5 - Information asset classification

    Lecture 36 2.6A - Asset Valuation

    Lecture 37 2.6B -QAE - Asset Valuation

    Lecture 38 2.7A - RTO & RPO

    Lecture 39 2.7B - SDO MTO AIW

    Lecture 40 2.8 - Outsourcing and Third Party Service Provider

    Lecture 41 2.10A - Change Management

    Lecture 42 2.10B - QAE - Change Management

    Lecture 43 2.11A - Patch Management

    Lecture 44 2.11B - QAE - Patch Management

    Lecture 45 2.12A - Security Baseline Control

    Lecture 46 2.12B - QAE - Security Baseline Control

    Lecture 47 Flashcards - Understanding the Risk

    Section 3: Domain 3 - Information Security Program

    Lecture 48 Chapter 3.1A - Defense in Depth

    Lecture 49 Chapter 3.1B - Information Security Program Development Management

    Lecture 50 3.2 - Information Security Program Objective

    Lecture 51 3.3A - Information Security Framework Components

    Lecture 52 3.3B - QAE - Information Security Framework Components

    Lecture 53 3.4A - Key Aspects - Information Security Program Road Map

    Lecture 54 Chapter 3.4B - QAE - Information Security Program Road Map - Copy

    Lecture 55 3.5A - Information Security Policy, Standard and Procedures

    Lecture 56 3.5B - QAE - Information Security Policy, Standard and Procedures

    Lecture 57 3.6 - Security Budget

    Lecture 58 3.7A - Key Aspects - Security Program Management and Administrative Activities

    Lecture 59 3.7B - QAE 1 - Security Program Management and Administrative Activities

    Lecture 60 3.8 - Privacy Laws

    Lecture 61 3.9 - Information Security Architecture

    Lecture 62 3.10A - Architecture Implementation

    Lecture 63 3.10B - QAE - Architecture Implementation

    Lecture 64 3.11A - Identity & Access Control

    Lecture 65 3.11B - Key Aspects - Identity & Access Control

    Lecture 66 3.11C - QAE - Identity & Access Control

    Lecture 67 3.12 - Biometrics

    Lecture 68 3.13 - Factor of Authentication

    Lecture 69 3.14 - Wireless Networks

    Lecture 70 3.15 - Different Attack Methods

    Lecture 71 3.16 - Cloud computing

    Lecture 72 3.17A - Fail 'Open' Fail 'Close'

    Lecture 73 3.17B - Key Aspects - Controls and Countermeasures

    Lecture 74 3.17C - QAE 1 - Controls and Countermeasures

    Lecture 75 3.18 - Vulnerability Assessment & Penetration Testing

    Lecture 76 3.19A - Key Aspects - Security Program Metrics and Monitoring

    Lecture 77 3.19B - QAE 1 - Security Program Metrics and Monitoring

    Lecture 78 CISM Flashcards - Domain 3

    Section 4: Domain 4 - Incident Management

    Lecture 79 4.1A - Firewall Types

    Lecture 80 4.1B - Firewall Implementation

    Lecture 81 4.1C - Proxy / Demilitarized Zone

    Lecture 82 4.2A - Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)

    Lecture 83 4.2B - Key Aspects - IDS and IPS

    Lecture 84 4.3 - Digital Signature

    Lecture 85 4.4 - Elements of PKI

    Lecture 86 4.5 - Asymmetric Encryption

    Lecture 87 4.6A - Phases of Incident Management Life Cycle

    Lecture 88 4.6B - SDO-MTO-AIW

    Lecture 89 4.6C - Key Aspects - Incident Management Overview

    Lecture 90 4.6D - QAE 1 - Incident Management Overview

    Lecture 91 4.7A - Incident Response Procedure

    Lecture 92 4.7B - QAE - Incident Response Procedure

    Lecture 93 4.8A -Key Aspects - Developing Incident Response Plan

    Lecture 94 4.8B -QAE - Developing Incident Response Plan

    Lecture 95 4.9A - Business Continuity Plan

    Lecture 96 4.9B- Disaster Recovery Plan

    Lecture 97 4.9C - Business Impact Analysis

    Lecture 98 4.10A - Testing Incident Response Plan, BCP and DRP

    Lecture 99 4.10B - Key Aspects - Testing Incident Response Plan, BCP and DRP

    Lecture 100 4.10C - QAE - Testing Incident Response Plan, BCP and DRP

    Lecture 101 4.11 - Executing Response and Recovery Plan

    Lecture 102 4.12A Evidence Collection & Forensics

    Lecture 103 4.12B - Key Aspects - Post Incident Activities and Investigation

    Lecture 104 4.12C - QAE 1 - Post Incident Activities and Investigation

    Lecture 105 CISM Flashcards - Domain 4

    Information Security Professionals,IT Auditors,Risk Manager