Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Cissm - Certified Information System Security Manager

    Posted By: ELK1nG
    Cissm - Certified Information System Security Manager

    Cissm - Certified Information System Security Manager
    Last updated 3/2019
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.86 GB | Duration: 7h 21m

    Prepare for the Mile2® Certified Digital Forensics Examiner (CDFE) with this course.

    What you'll learn
    Audit and Risk management creation of policies
    IS security strategy and frameworks
    Deployment and maintenance
    DR and BCP development
    Security programs and CISO roles
    Risk & incident management
    Skills and knowledge to assess threat analysis and risks
    Compliance and awareness
    Requirements
    A minimum of 1 year in Information Systems
    Description
    This course is provided directly by Mile2®. This official Mile2® video includes an authorized exam prep and exam simulator, available upon request.Today, when it comes to identifying critical issues and providing effective IS management solutions, companies are leaning on IS managers to create solutions for tomorrow’s problems. The knowledge and course content provided in the Certified Information Systems Security Manager - C)ISSM will not only cover ISACA®’s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance.

    Overview

    Section 1: Module 1 - Introduction

    Lecture 1 Introduction

    Section 2: Module 2 - Information Security Governance

    Lecture 2 part a

    Lecture 3 part b

    Lecture 4 part c

    Lecture 5 part d

    Section 3: Module 3 - Information Risk Management and Compliance

    Lecture 6 part a

    Lecture 7 part b

    Lecture 8 part c

    Section 4: Module 4 - Information Security Program Development and Management

    Lecture 9 part a

    Lecture 10 part b

    Lecture 11 part c

    Lecture 12 part d

    Lecture 13 part e

    Section 5: Module 5 - Information Security Incident Management

    Lecture 14 part a

    Lecture 15 part b

    Lecture 16 part c

    Lecture 17 part d

    Information Security,risk management and governance,Information assurance