Isaca CISM Training
6.72 GB
Please be advised that the CISM Exam Content Outline will be updated effective 1 June 2022. Starting on that date the CISM Exam will reflect the new Exam Content Outline. Updated preparation material for the new Exam Content Outline will be available for purchase in March 2022. Purchase of this material will not grant you access to the newer version of the material at a later date.
Prepare to obtain the Certified Information Security Manager® (CISM) certification and be recognized among the world’s most-qualified information security management professionals. The CISM Online Review Course provides online, on-demand instruction and is ideal for preparing you for the CISM certification exam.
The course covers all four of the CISM domains, and each section corresponds directly to the CISM job practice. It uses proven instructional design techniques, incorporating video, interactive eLearning modules, downloadable, interactive workbooks, downloadable job aids, case study activities and pre- and post-course assessments.
Learners will have access to the course for one year from date of purchase and will earn 21 CPE upon completion. This course has a seat time of approximately 17 hours and is accessed via the Learning Access tab of your MyISACA dashboard.
Course Description
The CISM Online Review Course is an online preparation course that prepares learners to pass the CISM certification exam using proven instructional design techniques and interactive activities. The course covers all four of the CISM domains, and each section corresponds directly to the CISM job practice.
The course incorporates video, narrated interactive eLearning modules, downloadable, interactive workbooks, downloadable job aids, case study activities, and pre-and post-course assessments. Learners will be able to navigate the course at their own pace, following a recommended structure, or target preferred job practice areas. Learners may also start and stop the course based on their study schedule, picking up exactly where they left off the next time they access the course.
Learning Objectives:
At the completion of this course you will be able to:
- Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives.
- Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives.
- Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture.
- Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.
https://web.archive.org/web/20220430201210/https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004Ko9uEAC
Filelist:
–CISM – Domain 1 Information Security Governance
1-C I S M Introduction.mp4
10-Personnel Security.mp4
11-Facilty Security.mp4
12-Security Complianceand Standards.mp4
13-Information Security Strategy.mp4
14-Inputs And Outputs Of The Informtion… Strategy.mp4
15-Processes In An Information Security Strategy.mp4
16-People In An Information Security Strategy.mp4
17-Technologies In An Information Security Strategy.mp4
18-Logical And Physical Information Sec…itectures.mp4
19-Information Security And Business Functions.mp4
2-Information Security.mp4
20-Information Security Policies And En…bjectives.mp4
21-International Standards For The Secu…anagement.mp4
22-I S O- I E C27000 Standards.mp4
23-International Info Government Standards.mp4
24-Information Security Government Stan…ed States.mp4
25-Methods Of Coordinating Information …ctivities.mp4
26-How To Develop An Information Security Strategy.mp4
27-Information Security Governance.mp4
28-Role Of The Security In Governance.mp4
29-Scope Of Information Security Governance.mp4
3-Business Goals Objectives And Functions.mp4
30-Charter Of Information Security Governance.mp4
31-Information Security Governance And …overnance.mp4
32-How To Align Information Security St…overnance.mp4
33-Regulatory Requirements And Information Security.mp4
34-Business Impact Of Regulatory Requirements.mp4
35-Liability Management.mp4
36-Liability Management Strategies.mp4
37-How To Identify Legal And Regulatory…uirements.mp4
38-Business Case Development.mp4
39-Budgetary Reporting Methods.mp4
4-Business Goals And Information Security.mp4
40-Budgetary Planning Strategy.mp4
41-How To Justify Investment In InfOSecurity.mp4
42-Organizational Drivers.mp4
43-Impact Of Drivers On InfOSecurity.mp4
44-Third Party Relationships.mp4
45-How To Identify Drivers Affecting Th…anization.mp4
46-Purpose Of Obtaining Commitment To InfOSecurity.mp4
47-Methods For Obtaining Commitment.mp4
48-I S S G.mp4
49-I S S G Roles And Responsibilities.mp4
5-Information Security Threats.mp4
50-I S S G Operation.mp4
51-How To Obtain Senior Managements Com…OSecurity.mp4
52-InfOSecurity Management Roles And Re…ibilities.mp4
53-How To Define Roles And Responsibili…OSecurity.mp4
54-The Need For Reporting And Communicating.mp4
55-Methods For Reporting In An Organization.mp4
56-Methods Of Communication In An Organization.mp4
57-How To Establish Reporting And Commu… Channels.mp4
6-Information Security Management.mp4
7-Identity Management.mp4
8-Data Protection.mp4
9-Network Security.mp4
–CISM – Domain 2 Risk Management
1-Risk.mp4
10-Factors Used In Risk Assessment And Analysis.mp4
11-Risk Assessment Methodologies.mp4
12-Quantitative Risk Assessment- Part1.mp4
13-Quantitative Risk Assessment- Part2.mp4
14-Qualitative Risk Assessment.mp4
15-Hybrid Risk Assessment.mp4
16-Best Practices For InfOSecurity Management.mp4
17-Gap Analysis.mp4
18-How To Implement An Info Risk Assessment Process.mp4
19-Info Classification Schemas.mp4
2-Risk Assessment.mp4
20-Components Of Info Classification Schemas.mp4
21-Info Ownership Schemas.mp4
22-Components Of Info Ownership Schemas.mp4
23-Info Resource Valuation.mp4
24-Valuation Methodologies.mp4
25-How To Determine Info Asset Classifi…Ownership.mp4
26-Baseline Modeling.mp4
27-Control Requirements.mp4
28-Baseline Modeling And Risk Based Ass…uirements.mp4
29-How To Conduct Ongoing Threat And Vu…aluations.mp4
3-Info Threat Types.mp4
30-B I As.mp4
31-B I A Methods.mp4
32-Factors For Determining Info Resourc…ritically.mp4
33-Impact Of Adverse Events.mp4
34-How To Conduct Periodic B I As.mp4
35-Methods For Measuring Effectiveness …rmeasures.mp4
36-Risk Mitigation.mp4
37-Risk Mitigation Strategies.mp4
38-Effect Of Implementing Risk Mitigati…trategies.mp4
39-Acceptable Levels Of Risk.mp4
4-Info Vulnerabilities.mp4
40-Cost Benefit Analysis.mp4
41-How To Identify And Evaluate Risk Mi…trategies.mp4
42-Life Cycle Processes.mp4
43-Life Cycle- Based Risk Management.mp4
44-Risk Management Life Cycle.mp4
45-Business Life Cycle Processes Affect…anagement.mp4
46-Life Cycled- Based Risk Management P…Practices.mp4
47-How To Integrate Risk Management Int…Processes.mp4
48-Significant Changes.mp4
49-Risk Management Process.mp4
5-Common Points Of Exposure.mp4
50-Risk Reporting Methods.mp4
51-Components Of Risk Reports.mp4
52-How To Report Changes In Info Risk.mp4
6-InfOSecurity Controls.mp4
7-Types Of InfOSecurity Controls.mp4
8-Common InfOSecurity Countermeasures.mp4
9-Overview Of The Risk Assessment Process.mp4
–CISM – Domain 3 Information Security Program
1-InfOSecurity Strategies.mp4
10-Program Documentation.mp4
11-How To Develop Plans To Implement An… Strategy.mp4
12-Security Technologies And Controls.mp4
13-Cryptographic Techniques.mp4
14-Symmetric Cryptography.mp4
15-Public Key Cryptography.mp4
16-Hashes.mp4
17-Access Control.mp4
18-Access Control Categories.mp4
19-Physical Access Controls.mp4
2-Common InfOSecurity Strategies.mp4
20-Technical Access Controls.mp4
21-Administrative Access Controls.mp4
22-Monitoring Tools.mp4
23-I D Ss.mp4
24-Anti- Virus Systems.mp4
25-Policy- Compliance Systems.mp4
26-Common Activities Required In InfOSe… Programs.mp4
27-Prerequisites For Implementing The Program.mp4
29-Types Of Security Controls.mp4
3-InfOSecurity Implementation Plans.mp4
30-Implementation Plan Management.mp4
30-InfOSecurity Controls Development.mp4
31-How TOSpecify InfOSecurity Program Activities.mp4
32-Business Assurance Function.mp4
33-Common Business Assurance Functions.mp4
34-Methods For Aligning InfOSecurity Pr…Functions.mp4
35-How To Coordinate InfOSecurity Progr…Functions.mp4
36-S L As.mp4
37-Internal Resources.mp4
38-External Resources.mp4
4-Conversation Of Strategies Into Imple…ion Plans.mp4
40-Services Provided By External Resources- Part1.mp4
40-Services Provided By External Resources- Part2.mp4
41-Skills Commonly Required For InfOSec…mentation.mp4
42-Identification Of Resources And Skil…mentation.mp4
43-Resource Acquisition Methods.mp4
44-Skills Acquisition Methods.mp4
46-InfOSecurity Architectures.mp4
47-The S A B S A Model For Security Architecture.mp4
48-Deployment Considerations.mp4
49-Deployment Of InfOSecurity Architectures.mp4
5-InfOSecurity Programs.mp4
50-How To Develop InfOSecurity Architectures.mp4
51-InfOSecurity Policies.mp4
52-Components Of InfOSecurity Policies.mp4
53-InfOSecurity Policies And The InfOSe… Strategy.mp4
54-InfOSecurity Policies And Enterprise…bjectives.mp4
55-InfOSecurity Policy Development Factors.mp4
56-Methods For Communicating InfOSecurity Policies.mp4
57-InfOSecurity Policy Maintenance.mp4
58-How To Develop InfOSecurity Policies.mp4
59-InfOSecurity Awareness Program Train… Programs.mp4
6-InfOSecurity Program Maintenance.mp4
60-Security Awareness Training And Educ… Analysis.mp4
61-Methods For Closing The Security Awa…tion Gaps.mp4
62-Security- Based Cultures And Behaviors.mp4
63-Methods For Establishing And Maintai…nterprise.mp4
64-How To Develop InfOSecurity Awarenes… Programs.mp4
65-Supporting Documentation For InfOSec… Policies.mp4
66-Standards Procedures Guidelines And Baselines.mp4
67-Codes Of Conduct.mp4
68-N D As.mp4
69-Methods For Developing Supporting Documentation.mp4
7-Methods For Maintaining An InfOSecurity Program.mp4
70-Methods For Implementing Supporting …mentation.mp4
71-Methods For Maintaining Supporting Documentation.mp4
74-C And A.mp4
74-How To Develop Supporting Documentat… Policies.mp4
8-Succession Planning.mp4
9-Allocation Of Jobs.mp4
–CISM – Domain 4 Information Security Pr…mplementation
1-Enterprise Business Objectives.mp4
10-How To Integrate InfOSecurity Requir…Processes.mp4
11-Types Of Contracts Affected By InfOS… Programs.mp4
12-Joint Ventures.mp4
14-Business Partners And InfOSecurity.mp4
15-Customers And InfOSecurity.mp4
16-Third Party And InfOSecurity.mp4
17-Risk Management.mp4
18-Risk Management Methods And Techniqu…d Parties.mp4
19-S L As And InfOSecurity.mp4
2-Integrating Enterprise Business Objec… Policies.mp4
20-Contracts And InfOSecurity.mp4
21-Due Diligence And InfOSecurity.mp4
22-Suppliers And InfOSecurity.mp4
23-Subcontractors And InfOSecurity.mp4
24-How To Integrate InfOSecurity Contro…Contracts.mp4
25-InfOSecurity Metrics.mp4
26-Types Of Metrics Commonly Used For InfOSecurity.mp4
27-Metric Design Development And Implementation.mp4
28-Goals Of Evaluating InfOSecurity Controls.mp4
29-Methods Of Evaluating InfOSecurity Controls.mp4
3-Organizational Processes.mp4
30-Vulnerability Testing.mp4
31-Types Of Vulnerability Testing.mp4
32-Effects Of Vulnerability Assessment And Testing.mp4
33-Vulnerability Correction.mp4
34-Commercial Assessment Tools.mp4
35-Goals Of Tracking InfOSecurity Aware… Programs.mp4
36-Methods For Tracking InfOSecurity Aw… Programs.mp4
38-How To Create InfOSecurity Program E…n Metrics.mp4
4-Change Control.mp4
5-Merges And Acquisitions.mp4
6-Organizational Processes And InfOSecu… Policies.mp4
7-Methods For Integrating InfOSecurity …Processes.mp4
9-Types Of Life Cycle Methodologies.mp4
–CISM – Domain 5 Information Security Program Management
1-Management Metrics.mp4
10-The Role Of Assurance Providers.mp4
11-Comparing Internal And External Assu…Providers.mp4
12-Line Management Technique.mp4
13-Budgeting.mp4
14-Staff Management.mp4
15-Facilities.mp4
16-How To Manage InfOSecurity Program Resources.mp4
17-Security Policies.mp4
18-Security Policy Components.mp4
19-Implementation Of InfOSecurity Policies.mp4
2-Types Of Management Metrics.mp4
20-Administrative Processes And Procedures.mp4
21-Access Control Types.mp4
22-A C M.mp4
23-Access Security Policy Principles.mp4
24-Identity Management And Compliance.mp4
25-Authentication Factors.mp4
26-Remote Access.mp4
27-User Registration.mp4
28-Procurement.mp4
29-How To Enforce Policy And Standards Compliance.mp4
3-Data Collection.mp4
30-Types Of Third Party Relationships.mp4
31-Methods For Managing InfOSecurity Re…d Parties.mp4
32-Security Service Providers.mp4
33-Third Party Contract Provisions.mp4
34-Methods To Define Security Requireme…rovisions.mp4
35-How To Enforce Contractual InfOSecurity Controls.mp4
36-S D L C.mp4
37-Code Development.mp4
38-Common Techniques For Security Enforcement.mp4
39-How To Enforce InfOSecurity During S…velopment.mp4
4-Periodic Reviews.mp4
40-Maintenance.mp4
41-Methods Of Monitoring Security Activities.mp4
42-Impact Of Change And Configuration M…ctivities.mp4
43-How To Maintain InfOSecurity Within …anization.mp4
44-Due Diligence Activities.mp4
45-Types Of Due Diligence Activities.mp4
46-Reviews Of Info Access.mp4
47-Standards Of Managing And Controllin…fo Access.mp4
48-How To Provide InfOSecurity Advice And Guidance.mp4
49-InfOSecurity Awareness.mp4
5-Monitoring Approaches.mp4
50-Types Of InfOSecurity Stakeholders.mp4
51-Methods Of Stakeholder Education.mp4
52-Security Stakeholder Education Process.mp4
53-How To Provide InfOSecurity Awarenes… Training.mp4
54-Methods Of Testing The Effectiveness…y Control.mp4
55-The Penetration Testing Process.mp4
56-Types Of Penetration Testing.mp4
57-Password Cracking.mp4
58-Social Engineering Attacks.mp4
59-Social Engineering Types.mp4
6- [K P Is] K P Is.mp4
60-External Vulnerability Reporting Sources.mp4
61-Regulatory Reporting Requirements.mp4
62-Internal Reporting Requirements.mp4
63-How To Analyze The Effectiveness Of … Controls.mp4
64-Noncompliance Issues.mp4
65-Security Baselines.mp4
66-Events Affecting The Security Baseline.mp4
67-InfOSecurity Problem Management Process.mp4
68-How To Resolve Noncompliance Issues.mp4
7-Types Of Measurements.mp4
8-Other Measurements.mp4
9-InfOSecurity Reviews.mp4
DS_Store
–CISM – Domain 6 Incident Management and Response
1-Incident Response Capability.mp4
10-M T D.mp4
11-R P O.mp4
12-R T O.mp4
13-Data Backup Strategies.mp4
14-Data Backup Types.mp4
15-Data Restoration Strategies.mp4
16-Info Incident Management Practices.mp4
17-I R P.mp4
18-Trigger Events And Types Of Trigger Events.mp4
19-Methods Of Containing Damage.mp4
2-Components Of Incident Response.mp4
20-How To Develop An I R P.mp4
21-Escalation Process.mp4
22-Notification Process.mp4
23-I R T.mp4
24-Crisis Communication.mp4
25-How To Establish An Escalation Process.mp4
27-External Reporting Requirements.mp4
28-Communication Process.mp4
29-How To Develop A Communication Process.mp4
3-B C P.mp4
30-I R P And D R P.mp4
31-I R P And B C P.mp4
32-Methods Of Identifying Business Reso… Recovery.mp4
33-How To Integrate An I R P.mp4
34-Role Of Primary I R T Members And Ro…T Members.mp4
35-Response Team Tools And Equipment.mp4
36-How To Develop I R Ts.mp4
37-B C P Testing.mp4
38-Disaster Recovery Testing.mp4
39-Schedule Disaster Recovery Testing.mp4
4-B I A Phase.mp4
40-Refine I R P.mp4
41-How To Test An I R P.mp4
42-Damage Assessment.mp4
43-Business Impacts Caused By Security Incidents.mp4
44-How To Manage Responses To InfOSecur…Incidents.mp4
45-Computer And Digital Forensics.mp4
46-Forensic Requirements For Responding…Incidents.mp4
47-Evidence Life Cycle.mp4
48-Evidence Collection.mp4
49-Evidence Types.mp4
5-Coop.mp4
50-Five Common Rules Of Evidence.mp4
51-Chain Of Custody.mp4
52-How To Investigate An InfOSecurity Incident.mp4
53-P I R Methods.mp4
54-Security Incident Review Process.mp4
55-Investigate Cause Of A Security Incident.mp4
56-Identify Corrective Actions.mp4
57-Reassess Security Risks After A Secu… Incident.mp4
58-How To Conduct A Post- Incident Review.mp4
59-Pre Test- Test Strategy.mp4
6-D R P.mp4
60-Post Test.mp4
7-Alternate Sites.mp4
8-Develop A B C P.mp4
9-Develop A D R P.mp4
Reviews
There are no reviews yet.