kingers Posted January 14, 2023 Report Share Posted January 14, 2023 Udemy - ISACA Certified Information Security Manager CISMEnglish | Tutorial | Size: 2.24 GBCertified Information Security Manager (CISM)This course is designed on the basis of official resources of ISACA. It covers all the 4 domains of CISM Review Manual. Topics are arranged segment wise and aligned with latest CISM Review Manual.Course is designed specifically for candidates from non-technical background. Video contents are designed after considering three major aspects:(1) Whether content has capability to engage the audience throughout?(2) Whether content is able to convey the meaning of CISM Review Manual (CRM) in a effective manner.(3) Whether video has capability to make audience understand and retain the key aspects for a longer duration.Features of this course are as follow:This course is designed on the basis of official resources of ISACA.Course is designed specifically for candidates from non-technical background.Topics are arranged segment wise and aligned with latest CISM Review Manual. Exam oriented practice questions and practical example for CISM aspirants.Flashcards based learning mode.Use of smartarts for easy learningMore than 700 plus practice questions Please use this course as a supplement to ISACA's resources. This course will help you to decipher the technicities used in official resources. This course is specfically designed for the candidates from non IT background. We have used simple and plain English for the benefits of the candidates from non - English speaking countries.OverviewSection 1: Domain 1 - Information Security GovernanceLecture 1 1.1A - Information Security GovernanceLecture 2 1.1B - Governance FrameworkLecture 3 1.1C - QAE 1 - Information Security GovernanceLecture 4 1.4 - Retention of Business RecordsLecture 5 1.5 - Organization structureLecture 6 1.5A - Centralized and Decentralized FunctionsLecture 7 1.6A - Information security roles and responsibilitiesLecture 8 1.6B - Key Aspects - Information security roles and responsibilitiesLecture 9 1.6C - QAE 1 - Information security roles and responsibilitiesLecture 10 1.7 - Maturity modelLecture 11 1.8A - Information security governance metricsLecture 12 1.8B -QAE - Information security governance metricsLecture 13 1.9A - Information security strategy and planLecture 14 1.9B - Key Aspects - Information security strategy and planLecture 15 1.9C - QAE - Information security strategy and planLecture 16 1.13 - Enterprise information security architectureLecture 17 1.14 - Awareness and educationLecture 18 1.15 - Governance, Risk and ComplianceLecture 19 1.16A - Senior management commitmentLecture 20 1.16B - Key Aspects - Senior management commitmentLecture 21 1.16C - QAE 1 - Senior management commitmentLecture 22 1.17A - Business Case and Feasibility AnalysisLecture 23 1.17B - Key Aspects - Business Case and Feasibility AnalysisLecture 24 1.17C - QAE 1 - Business Case and Feasibility AnalysisLecture 25 1.18A - Governance of third-party relationshipsLecture 26 1.18B - Key Aspects - Governance of third-party relationshipsLecture 27 1.18C - QAE 1 - Governance of third-party relationshipsSection 2: Domain 2 - Information Risk ManagementLecture 28 2.1A - ISACA's Thinking HatLecture 29 2.1B - Risk Management OverviewLecture 30 2.2A - Risk Management StrategyLecture 31 2.2B - Risk Capacity, Appetite and ToleranceLecture 32 2.4A - Risk AssessmentLecture 33 2.4B - Risk Analysis MethodologiesLecture 34 2.4C - QAE 1 - Risk AssessmentLecture 35 2.5 - Information asset classificationLecture 36 2.6A - Asset ValuationLecture 37 2.6B -QAE - Asset ValuationLecture 38 2.7A - RTO & RPOLecture 39 2.7B - SDO MTO AIWLecture 40 2.8 - Outsourcing and Third Party Service ProviderLecture 41 2.10A - Change ManagementLecture 42 2.10B - QAE - Change ManagementLecture 43 2.11A - Patch ManagementLecture 44 2.11B - QAE - Patch ManagementLecture 45 2.12A - Security Baseline ControlLecture 46 2.12B - QAE - Security Baseline ControlLecture 47 Flashcards - Understanding the RiskSection 3: Domain 3 - Information Security ProgramLecture 48 Chapter 3.1A - Defense in DepthLecture 49 Chapter 3.1B - Information Security Program Development ManagementLecture 50 3.2 - Information Security Program ObjectiveLecture 51 3.3A - Information Security Framework ComponentsLecture 52 3.3B - QAE - Information Security Framework ComponentsLecture 53 3.4A - Key Aspects - Information Security Program Road MapLecture 54 Chapter 3.4B - QAE - Information Security Program Road Map - CopyLecture 55 3.5A - Information Security Policy, Standard and ProceduresLecture 56 3.5B - QAE - Information Security Policy, Standard and ProceduresLecture 57 3.6 - Security BudgetLecture 58 3.7A - Key Aspects - Security Program Management and Administrative ActivitiesLecture 59 3.7B - QAE 1 - Security Program Management and Administrative ActivitiesLecture 60 3.8 - Privacy LawsLecture 61 3.9 - Information Security ArchitectureLecture 62 3.10A - Architecture ImplementationLecture 63 3.10B - QAE - Architecture ImplementationLecture 64 3.11A - Identity & Access ControlLecture 65 3.11B - Key Aspects - Identity & Access ControlLecture 66 3.11C - QAE - Identity & Access ControlLecture 67 3.12 - BiometricsLecture 68 3.13 - Factor of AuthenticationLecture 69 3.14 - Wireless NetworksLecture 70 3.15 - Different Attack MethodsLecture 71 3.16 - Cloud computingLecture 72 3.17A - Fail 'Open' Fail 'Close'Lecture 73 3.17B - Key Aspects - Controls and CountermeasuresLecture 74 3.17C - QAE 1 - Controls and CountermeasuresLecture 75 3.18 - Vulnerability Assessment & Penetration TestingLecture 76 3.19A - Key Aspects - Security Program Metrics and MonitoringLecture 77 3.19B - QAE 1 - Security Program Metrics and MonitoringLecture 78 CISM Flashcards - Domain 3Section 4: Domain 4 - Incident ManagementLecture 79 4.1A - Firewall TypesLecture 80 4.1B - Firewall ImplementationLecture 81 4.1C - Proxy / Demilitarized ZoneLecture 82 4.2A - Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)Lecture 83 4.2B - Key Aspects - IDS and IPSLecture 84 4.3 - Digital SignatureLecture 85 4.4 - Elements of PKILecture 86 4.5 - Asymmetric EncryptionLecture 87 4.6A - Phases of Incident Management Life CycleLecture 88 4.6B - SDO-MTO-AIWLecture 89 4.6C - Key Aspects - Incident Management OverviewLecture 90 4.6D - QAE 1 - Incident Management OverviewLecture 91 4.7A - Incident Response ProcedureLecture 92 4.7B - QAE - Incident Response ProcedureLecture 93 4.8A -Key Aspects - Developing Incident Response PlanLecture 94 4.8B -QAE - Developing Incident Response PlanLecture 95 4.9A - Business Continuity PlanLecture 96 4.9B- Disaster Recovery PlanLecture 97 4.9C - Business Impact AnalysisLecture 98 4.10A - Testing Incident Response Plan, BCP and DRPLecture 99 4.10B - Key Aspects - Testing Incident Response Plan, BCP and DRPLecture 100 4.10C - QAE - Testing Incident Response Plan, BCP and DRPLecture 101 4.11 - Executing Response and Recovery PlanLecture 102 4.12A Evidence Collection & ForensicsLecture 103 4.12B - Key Aspects - Post Incident Activities and InvestigationLecture 104 4.12C - QAE 1 - Post Incident Activities and InvestigationLecture 105 CISM Flashcards - Domain 4Information Security Professionals,IT Auditors,Risk ManagerCourse info[center]https://fikper.com/IoLO3kDn2W/Udemy-_ISACA_Certified_Information_Security_Manager_CISM.z01.htmlhttps://nitroflare.com/view/6B60E3407401FBEhttps://rapidgator.net/file/117b6ef0765ffc1eff9462dd942e2649https://fikper.com/PRZWIPDRMY/Udemy-_ISACA_Certified_Information_Security_Manager_CISM.zip.htmlhttps://nitroflare.com/view/AAAF787020245D7https://rapidgator.net/file/fb9ad837654f1ee1d6a0bd4b7926e7ad[/center] Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now