Cism Certification: Domain 1 & 2 | Platinum Video Series

Posted By: ELK1nG

Cism Certification: Domain 1 & 2 | Platinum Video Series
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.26 GB | Duration: 4h 53m

Develop strategic expertise in cybersecurity governance and risk management with CISM Domains 1 & 2.

What you'll learn

Prepare for the CISM certification exam by mastering Domain 1 & 2

Define and establish information security strategies in alignment with business objectives.

Develop and maintain a security governance framework and supporting processes.

Ensure that information security roles and responsibilities are clearly defined and communicated.

Integrate governance into the enterprise architecture and culture to ensure consistent enforcement.

Identify and evaluate information security risks based on business impact.

Establish and maintain a risk management program that supports business continuity and compliance.

Implement risk mitigation strategies and monitor their effectiveness over time.

Requirements

A basic understanding of Information Systems, including IT infrastructure and cybersecurity principles, is desirable. This foundation helps grasp the strategic and managerial aspects of the CISM training.

Description

Welcome!This course is carefully designed to guide you through Domain 1: Information Security Governance and Domain 2: Information Security Risk Management of the CISM Certification [ Certified Information Security Manager ]. These two foundational domains provide the strategic insight and risk-focused mindset essential for leading in today’s complex cybersecurity landscape.What You Will LearnHow to establish and align security governance with business objectivesKey frameworks, policies, and roles in information security governanceBuilding and maintaining a risk management programIn this course, we’ll explore the foundations of Domain 1 - Information Security Governance and how it aligns with organizational goals. In Domain 1 we cover:Key governance concepts, frameworks, and strategic alignmentThe role of executive leadership, steering committees, and security stakeholdersHow to build and manage a security strategy and governance structureIntegration of GRC (Governance, Risk, Compliance) into security programsThe responsibilities of security roles and effective reporting practicesHow to create a culture of security and ensure leadership oversightIn Domain 2, we focus on building a deep understanding of Information Security Risk Management and its role in protecting organizational assets. In Domain 2 we cover:Core risk management concepts, including threats, vulnerabilities, and controlsHow to identify, assess, evaluate, and treat information security risksThe risk management lifecycle and integration with enterprise risk frameworksRisk analysis techniques (qualitative and quantitative) and key metricsSecurity strategies such as defense in depth, zero trust, and ROSIRoles of stakeholders, governance structures, and senior leadership involvementManaging compliance, audits, incident response, and business continuityKey human, organizational, and cloud-related risk considerationsEnroll now and move closer to becoming a certified security leader!

Overview

Section 1: CISM - Domain 1 - Information Security Governance

Lecture 1 GOVERNANCE CONCEPT

Lecture 2 PURPOSE OF GOVERNANCE

Lecture 3 CORE GOVERNANCE PRACTICES

Lecture 4 GOVERNANCE FRAMEWORK

Lecture 5 BOARD OF DIRECTORS’ ROLE

Lecture 6 LEADERSHIP AND STRUCTURE

Lecture 7 STRATEGIC OBJECTIVES AND ALIGNMENT

Lecture 8 ALIGNMENT EXAMPLES

Lecture 9 BENEFITS OF EFFECTIVE GOVERNANCE

Lecture 10 IMPACT OF POOR GOVERNANCE

Lecture 11 GOVERNANCE COMMITTEES: ROLE AND VALUE

Lecture 12 IT STRATEGY COMMITTEE

Lecture 13 IT STEERING COMMITTEE

Lecture 14 PROJECT STEERING COMMITTEE

Lecture 15 SECURITY STEERING COMMITTEE

Lecture 16 COMMITTEE SUMMARY

Lecture 17 ORGANIZATIONAL STRUCTURE AND GOVERNANCE

Lecture 18 REPORTING BEST PRACTICES

Lecture 19 INFORMATION SECURITY GOVERNANCE

Lecture 20 ALIGNING SECURITY WITH BUSINESS STRATEGY

Lecture 21 CRITICAL ROLE OF SENIOR MANAGEMENT

Lecture 22 INFORMATION SECURITY VS. CYBERSECURITY

Lecture 23 CORE SECURITY RESPONSIBILITIES

Lecture 24 SECURITY INTEGRATION INTO PROJECTS

Lecture 25 BUILDING A SECURITY STRATEGY

Lecture 26 SECURITY ARCHITECTURE

Lecture 27 GRC (GOVERNANCE, RISK, COMPLIANCE)

Lecture 28 INFORMATION SECURITY’S ROLE IN GRC

Lecture 29 KEY GRC ACTIVITIES

Lecture 30 MAJOR SECURITY ROLES

Lecture 31 ROLE SEPARATION AND CONFLICT OF INTEREST

Lecture 32 SECURITY MANAGER: ROLES AND RESPONSIBILITIES

Lecture 33 SECURITY ORGANIZATIONAL STRUCTURES

Lecture 34 STEERING COMMITTEES AND DECISION-MAKING PROCESS

Lecture 35 RACI MATRIX

Lecture 36 RACI BENEFITS

Lecture 37 SECURITY PROGRAM OBJECTIVES

Lecture 38 BUILDING A SECURITY PROGRAM

Lecture 39 SENIOR MANAGEMENT: APPROVAL & OVERSIGHT

Lecture 40 ROLE OF BUSINESS FUNCTIONS

Lecture 41 GAP ANALYSIS

Lecture 42 GAP ANALYSIS PROCESS

Lecture 43 COMMON GAPS IDENTIFIED

Lecture 44 STRATEGY CONSIDERATIONS

Lecture 45 GOVERNANCE RISKS AND SECURITY CULTURE

Section 2: CISM - Domain 2 - Information Security Risk Management

Lecture 46 FUNDAMENTAL CONCEPTS RECAP

Lecture 47 VULNERABILITIES: DEFINITION AND TYPES

Lecture 48 CIA TRIAD: IMPORTANCE AND THREATS

Lecture 49 VULNERABILITY MANAGEMENT

Lecture 50 COMMON ATTACK EXAMPLES

Lecture 51 DENIAL OF SERVICE (DDoS)

Lecture 52 MALWARE

Lecture 53 ADVANCED MALWARE AND INFECTION TECHNIQUES

Lecture 54 ANTI-MALWARE PROTECTION MEASURES

Lecture 55 GLOBAL SECURITY BEST PRACTICES

Lecture 56 WEB APPLICATION SECURITY: OWASP FOCUS

Lecture 57 ENTERPRISE RISK MANAGEMENT

Lecture 58 RISK MANAGEMENT CYCLE

Lecture 59 RISK TYPES

Lecture 60 RISK CAPACITY, TOLERANCE, AND APPETITE

Lecture 61 RISK IDENTIFICATION TECHNIQUES

Lecture 62 ROLES OF DATA OWNERS AND RISK OWNERS

Lecture 63 RISK ANALYSIS: KEY STEPS

Lecture 64 RISK METRICS AND INDICATORS

Lecture 65 RISK ANALYSIS: TOOLS AND TECHNIQUES

Lecture 66 RISK EVALUATION

Lecture 67 RISK TREATMENT STRATEGIES

Lecture 68 RISK REPORTING AND MONITORING

Lecture 69 REFERENCE FRAMEWORKS: NIST, ISO ..

Lecture 70 RETURN ON SECURITY INVESTMENT (ROSI)

Lecture 71 DEFENSE IN DEPTH

Lecture 72 ZERO TRUST STRATEGY

Lecture 73 INCIDENT CASE STUDIES (LESSONS LEARNED)

Lecture 74 INCIDENT RESPONSE PLAN

Lecture 75 BUSINESS CONTINUITY AND CRISIS MANAGEMENT

Lecture 76 IT GENERAL CONTROLS

Lecture 77 SENIOR MANAGEMENT INVOLVEMENT

Lecture 78 SECURITY KPI & KRI

Lecture 79 SECURITY AUDITS AND REVIEWS

Lecture 80 BUSINESS ALIGNMENT

Lecture 81 HUMAN FACTORS

Lecture 82 TRAINING RETURN ON INVESTMENT

Lecture 83 LEADERSHIP BY EXAMPLE

Lecture 84 EXTERNAL AUDIT REQUIREMENTS

Lecture 85 IMPROVEMENT PLANS

Information Security Managers,Aspiring Information Security Managers,IT Security Consultants,Security Auditors,Risk Management Professionals,IT Managers / Project Managers,Chief Information Security Officers (CISOs),Compliance Officers,IT Governance Professionals,Business Continuity and Disaster Recovery Professionnals