Cism Certification: Domain 3 & 4 | Platinum Video Series

Posted By: ELK1nG

Cism Certification: Domain 3 & 4 | Platinum Video Series
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.62 GB | Duration: 5h 28m

Develop strategic expertise in cybersecurity governance and risk management with CISM Domains 3 & 4.

What you'll learn

Prepare for the CISM certification exam by mastering Domain 3 & 4

Develop and manage an information security program aligned with business objectives.

Establish policies, procedures, and resource planning for effective security governance.

Integrate security into business processes and evaluate program performance.

Establish and maintain an effective incident response capability.

Detect, analyze, and respond to information security incidents promptly.

Conduct post-incident reviews to strengthen response and reduce future risk.

Requirements

A basic understanding of Information Systems, including IT infrastructure and cybersecurity principles, is desirable. This foundation helps grasp the strategic and managerial aspects of the CISM training.

Description

Welcome!This course is carefully designed to guide you through Domain 3: Information Security Program and Domain 4: Incident Management of the CISM Certification. These two foundational domains provide the strategic guidance and risk-driven approach necessary for developing and managing an effective information security program and responding swiftly to security incidents in today’s complex cybersecurity environment.In domain3, we cover :Learn to design, implement, and align an information security program with organizational goals.Understand the key components, roles, and responsibilities within a security program.Develop policies, procedures, and strategies to manage assets, identity, and access.Master the application of continuous improvement cycles (Plan-Do-Check-Act) for security programs.Build and monitor performance metrics to evaluate and refine the program’s effectivenessIn domain4, we cover:A comprehensive understanding of security incidents and the principles of incident management.Learn to develop and implement effective Incident Response Plans (IRP) and assemble Incident Response Teams.Master key concepts like forensic investigations, and post-incident lessons learned.Understand disaster recovery, business continuity, and service recovery strategies, including RTO/RPO.Develop skills in vulnerability management, patching, and change management as preventive measures.Learn the importance of crisis communication, coordination with authorities during incidents.Enroll now and move closer to becoming a certified security leader!

Overview

Section 1: CISM - Domain 3 - Information Security Program

Lecture 1 SECURITY PROGRAM FUNDAMENTALS

Lecture 2 ALIGNMENT WITH STRATEGIC OBJECTIVES

Lecture 3 KEY COMPONENTS OF A SECURITY PROGRAM

Lecture 4 ROLES AND RESPONSIBILITIES

Lecture 5 ASSET MANAGEMENT

Lecture 6 SECURITY STRATEGY AND ARCHITECTURE

Lecture 7 SECURITY POLICIES AND PROCEDURES

Lecture 8 DEVELOPING A SECURITY TRAINING PLAN

Lecture 9 PERFORMANCE MEASUREMENT

Lecture 10 SECURITY CONTROLS INTEGRATION

Lecture 11 PROGRAM CYCLE: PLAN-DO-CHECK-ACT

Lecture 12 PROGRAM CYCLE: ACT AND EVOLUTION

Lecture 13 INITIATING A SECURITY PROGRAM

Lecture 14 IMPLEMENTATION ROADMAP

Lecture 15 PROJECT SELECTION AND PRIORITIZATION

Lecture 16 HUMAN RESOURCES AND SKILLS

Lecture 17 COLLABORATION WITH INTERNAL AUDIT

Lecture 18 HUMAN FACTOR: AWARENESS INITIATIVES

Lecture 19 COMPLIANCE MANAGEMENT

Lecture 20 BUDGET MONITORING AND ROI

Lecture 21 PROGRAM MATURITY

Lecture 22 INTEGRATION INTO THE INFORMATION SYSTEM

Lecture 23 COORDINATING CROSS-FUNCTIONAL PROJECTS

Lecture 24 SECURITY MONITORING TOOLS

Lecture 25 THIRD-PARTY AND SUPPLIER SECURITY

Lecture 26 EXTERNAL COMMUNICATION & AWARENESS STRATEGY

Lecture 27 CLOUD MIGRATION: SECURITY CHALLENGES

Lecture 28 AGILITY AND DEVSECOPS

Lecture 29 BACKUP AND RESTORE PLANNING

Lecture 30 EXTERNAL AUDITS & CERTIFICATIONS

Lecture 31 BUSINESS CONTINUITY (BCP) & DISASTER RECOVERY (DRP)

Lecture 32 SECURITY PROGRAM GOVERNANCE

Lecture 33 CRITICAL SUCCESS FACTORS

Lecture 34 COMMON CHALLENGES AND OBSTACLES

Lecture 35 SUCCESS ENABLERS TO OVERCOME CHALLENGES

Lecture 36 RISK ASSESSMENT METHODS

Lecture 37 BOARD-LEVEL REPORTING

Lecture 38 PROJECT RISK MANAGEMENT

Lecture 39 ROLE OF STANDARDS & FRAMEWORKS

Lecture 40 CONTINUOUS IMPROVEMENT PROCESS

Lecture 41 PROGRAM DEVELOPMENT & UPDATES

Lecture 42 SECURITY PORTFOLIO MANAGEMENT

Lecture 43 EXAMPLES OF TOOLS AND PLATFORMS

Lecture 44 SAMPLE 12-MONTH ROADMAP

Section 2: CISM - Domain 4 - Incident Management

Lecture 45 UNDERSTANDING SECURITY INCIDENTS

Lecture 46 INCIDENT RESPONSE MANAGEMENT

Lecture 47 INCIDENT MANAGEMENT PRINCIPLES

Lecture 48 INCIDENT RESPONSE TEAM

Lecture 49 INCIDENT RESPONSE PLAN

Lecture 50 INCIDENT RESPONSE PHASES

Lecture 51 FORENSIC INVESTIGATIONS

Lecture 52 POST-INCIDENT: LESSONS LEARNED

Lecture 53 SERVICE RECOVERY & RESUMPTION STRATEGIES

Lecture 54 RTO AND RPO CONCEPTS

Lecture 55 DISASTER RECOVERY PLAN (DRP)

Lecture 56 RECOVERY SITES (HOT, WARM, COLD)

Lecture 57 BACKUP AND DATA PROTECTION

Lecture 58 BACKUP TYPES: FULL, DIFFERENTIAL, INCREMENTAL

Lecture 59 PATCH MANAGEMENT & VULNERABILITY HANDLING

Lecture 60 VULNERABILITY SCANNING

Lecture 61 CONFIGURATION MANAGEMENT

Lecture 62 CHANGE MANAGEMENT AS PREVENTIVE CONTROL

Lecture 63 INCIDENT VS. DISASTER

Lecture 64 BUSINESS CONTINUITY PLAN (BCP)

Lecture 65 DISASTER RECOVERY PLAN (DRP)

Lecture 66 BUSINESS IMPACT ANALYSIS (BIA)

Lecture 67 DRP/BCP TESTING & VALIDATION

Lecture 68 COMPLIANCE MANAGEMENT DURING CRISIS

Lecture 69 HUMAN FACTOR IMPACT

Lecture 70 INCIDENT RESPONSE PLAN TESTING

Lecture 71 OUTSOURCING & CRISIS PREPAREDNESS

Lecture 72 COORDINATION WITH AUTHORITIES

Lecture 73 MAJOR INCIDENTS & CRISIS MANAGEMENT

Lecture 74 CRISIS COMMUNICATION

Lecture 75 ROLES & RESPONSIBILITIES DIVERSIFICATION

Lecture 76 TRAINING & AWARENESS

Lecture 77 PERFORMANCE MEASUREMENT: KPI & KRI

Lecture 78 SIEM INTEGRATION

Lecture 79 TOOLS & TECHNIQUES

Lecture 80 EXAMPLE INCIDENT SCENARIOS

Lecture 81 INCIDENT GOVERNANCE

Lecture 82 TRANSITION: INCIDENT / PROBLEM / CHANGE

Lecture 83 SECURITY ROI IMPACT

Lecture 84 INTERDEPARTMENTAL COLLABORATION

Lecture 85 INTERNATIONAL & MULTISITE CONTEXT

Lecture 86 INCIDENT RISK MONITORING & MANAGEMENT

Lecture 87 ORGANIZATIONAL RESILIENCE

Lecture 88 CONTAINMENT & ERADICATION PHASE

Lecture 89 RECOVERY & RETURN TO NORMAL OPERATIONS

Lecture 90 POST-INCIDENT STRUCTURAL IMPROVEMENTS

Lecture 91 MEDIA & PUBLIC ENGAGEMENT

Lecture 92 MATURITY IMPROVEMENT PLAN

Information Security Managers,Aspiring Information Security Managers,IT Security Consultants,Security Auditors,Risk Management Professionals,IT Managers / Project Managers,Chief Information Security Officers (CISOs),Compliance Officers,IT Governance Professionals,Business Continuity and Disaster Recovery Professionnals