Training Video Course

CISM: Certified Information Security Manager

PDFs and exam guides are not so efficient, right? Prepare for your Isaca examination with our training course. The CISM course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Isaca certification exam. Pass the Isaca CISM test with flying colors.

Rating
4.62rating
Students
523
Duration
14:34:18 h
$16.49
$14.99

Curriculum for CISM Video Course

Name of Video Time
Play Video: Course Introduction
1. Course Introduction
01:02
Name of Video Time
Play Video: Lesson 1: Information Security Governance Overview
1. Lesson 1: Information Security Governance Overview
00:53
Play Video: Information Security Governance Overview Part1
2. Information Security Governance Overview Part1
01:12
Play Video: Information Security Governance Overview Part2
3. Information Security Governance Overview Part2
02:00
Play Video: Information Security Governance Overview Part3
4. Information Security Governance Overview Part3
01:22
Play Video: Information Security Governance Overview Part4
5. Information Security Governance Overview Part4
01:32
Play Video: Information Security Governance Overview Part5
6. Information Security Governance Overview Part5
00:30
Play Video: Importance of Information Security Governance Part1
7. Importance of Information Security Governance Part1
06:21
Play Video: Importance of Information Security Governance Part2
8. Importance of Information Security Governance Part2
01:19
Play Video: Outcomes of Information Security Governance Part1
9. Outcomes of Information Security Governance Part1
00:33
Play Video: Outcomes of Information Security Governance Part2
10. Outcomes of Information Security Governance Part2
01:26
Play Video: Outcomes of Information Security Governance Part3
11. Outcomes of Information Security Governance Part3
02:45
Play Video: Outcomes of Information Security Governance Part4
12. Outcomes of Information Security Governance Part4
01:27
Play Video: Outcomes of Information Security Governance Part5
13. Outcomes of Information Security Governance Part5
01:54
Play Video: Outcomes of Information Security Governance Part6
14. Outcomes of Information Security Governance Part6
01:28
Play Video: Lesson 2: Effective Information Security Governance
15. Lesson 2: Effective Information Security Governance
00:31
Play Video: Business Goals and Objectives Part1
16. Business Goals and Objectives Part1
01:31
Play Video: Business Goals and Objectives Part2
17. Business Goals and Objectives Part2
02:00
Play Video: Roles and Responsibilities of Senior Management Part1
18. Roles and Responsibilities of Senior Management Part1
01:02
Play Video: Roles and Responsibilities of Senior Management Part2
19. Roles and Responsibilities of Senior Management Part2
00:43
Play Video: Domain Tasks Part1
20. Domain Tasks Part1
01:21
Play Video: Domain Tasks Part2
21. Domain Tasks Part2
03:16
Play Video: Business Model for Information Security Part1
22. Business Model for Information Security Part1
00:45
Play Video: Business Model for Information Security Part2
23. Business Model for Information Security Part2
01:09
Play Video: Business Model for Information Security Part3
24. Business Model for Information Security Part3
03:16
Play Video: Business Model for Information Security Part4
25. Business Model for Information Security Part4
01:37
Play Video: Dynamic Interconnections Part1
26. Dynamic Interconnections Part1
00:34
Play Video: Dynamic Interconnections Part2
27. Dynamic Interconnections Part2
02:55
Play Video: Dynamic Interconnections Part3
28. Dynamic Interconnections Part3
01:55
Play Video: Dynamic Interconnections Part4
29. Dynamic Interconnections Part4
00:51
Play Video: Lesson 3: Information Security Concepts and Technologies
30. Lesson 3: Information Security Concepts and Technologies
03:27
Play Video: Information Security Concepts and Technologies Part1
31. Information Security Concepts and Technologies Part1
02:58
Play Video: Information Security Concepts and Technologies Part2
32. Information Security Concepts and Technologies Part2
03:25
Play Video: Information Security Concepts and Technologies Part3
33. Information Security Concepts and Technologies Part3
01:50
Play Video: Technologies Part1
34. Technologies Part1
01:41
Play Video: Technologies Part2
35. Technologies Part2
06:12
Play Video: Lesson 4: Information Security Manager
36. Lesson 4: Information Security Manager
00:33
Play Video: Responsibilities
37. Responsibilities
01:48
Play Video: Senior Management Commitment Part1
38. Senior Management Commitment Part1
00:48
Play Video: Senior Management Commitment Part2
39. Senior Management Commitment Part2
02:27
Play Video: Obtaining Senior Management Commitment Part1
40. Obtaining Senior Management Commitment Part1
00:24
Play Video: Obtaining Senior Management Commitment Part2
41. Obtaining Senior Management Commitment Part2
00:53
Play Video: Establishing Reporting and Communication Channels Part1
42. Establishing Reporting and Communication Channels Part1
01:13
Play Video: Establishing Reporting and Communication Channels Part2
43. Establishing Reporting and Communication Channels Part2
01:07
Play Video: Lesson 5: Scope and Charter of Information Security Governance
44. Lesson 5: Scope and Charter of Information Security Governance
01:55
Play Video: Assurance Process Integration and Convergence
45. Assurance Process Integration and Convergence
02:24
Play Video: Convergence
46. Convergence
02:32
Play Video: Governance and Third-Party Relationships
47. Governance and Third-Party Relationships
02:38
Play Video: Lesson 6: Information Security Governance Metrics
48. Lesson 6: Information Security Governance Metrics
00:56
Play Video: Metrics
49. Metrics
01:39
Play Video: Effective Security Metrics Part1
50. Effective Security Metrics Part1
01:46
Play Video: Effective Security Metrics Part2
51. Effective Security Metrics Part2
01:01
Play Video: Effective Security Metrics Part3
52. Effective Security Metrics Part3
01:51
Play Video: Effective Security Metrics Part4
53. Effective Security Metrics Part4
00:39
Play Video: Security Implementation Metrics
54. Security Implementation Metrics
01:17
Play Video: Strategic Alignment Part1
55. Strategic Alignment Part1
02:56
Play Video: Strategic Alignment Part2
56. Strategic Alignment Part2
01:11
Play Video: Risk Management
57. Risk Management
01:14
Play Video: Value Delivery
58. Value Delivery
01:02
Play Video: Resource Management Part1
59. Resource Management Part1
00:47
Play Video: Resource Management Part2
60. Resource Management Part2
00:41
Play Video: Performance Measurement
61. Performance Measurement
03:06
Play Video: Assurance Process Integration/Convergence
62. Assurance Process Integration/Convergence
02:54
Play Video: Lesson 7: Information Security Strategy Overview
63. Lesson 7: Information Security Strategy Overview
00:53
Play Video: Another View of Strategy
64. Another View of Strategy
00:41
Play Video: Lesson 8: Creating Information Security Strategy
65. Lesson 8: Creating Information Security Strategy
00:16
Play Video: Information Security Strategy
66. Information Security Strategy
01:22
Play Video: Common Pitfalls Part1
67. Common Pitfalls Part1
04:38
Play Video: Common Pitfalls Part2
68. Common Pitfalls Part2
02:19
Play Video: Objectives of the Information Security Strategy
69. Objectives of the Information Security Strategy
01:33
Play Video: What is the Goal?
70. What is the Goal?
01:40
Play Video: Defining Objectives
71. Defining Objectives
01:23
Play Video: Business Linkages
72. Business Linkages
01:48
Play Video: Business Case Development Part1
73. Business Case Development Part1
01:44
Play Video: Business Case Development Part2
74. Business Case Development Part2
02:36
Play Video: Business Case Development Part3
75. Business Case Development Part3
00:45
Play Video: Business Case Objectives
76. Business Case Objectives
00:57
Play Video: The Desired State
77. The Desired State
01:48
Play Video: COBIT
78. COBIT
01:08
Play Video: COBIT Controls
79. COBIT Controls
01:09
Play Video: COBIT Framework
80. COBIT Framework
00:48
Play Video: Capability Maturity Model
81. Capability Maturity Model
01:38
Play Video: Balanced Scorecard
82. Balanced Scorecard
01:22
Play Video: Architectural Approaches
83. Architectural Approaches
01:03
Play Video: ISO/IEC 27001 and 27002
84. ISO/IEC 27001 and 27002
01:00
Play Video: Risk Objectives Part1
85. Risk Objectives Part1
01:39
Play Video: Risk Objectives Part2
86. Risk Objectives Part2
03:11
Play Video: Lesson 9: Determining Current State Of Security
87. Lesson 9: Determining Current State Of Security
00:45
Play Video: Current Risk Part1
88. Current Risk Part1
02:37
Play Video: Current Risk Part2
89. Current Risk Part2
01:11
Play Video: BIA
90. BIA
01:11
Play Video: Lesson 10: Information Security Strategy Development
91. Lesson 10: Information Security Strategy Development
01:52
Play Video: The Roadmap
92. The Roadmap
01:01
Play Video: Elements of a Strategy
93. Elements of a Strategy
03:27
Play Video: Strategy Resources and Constraints
94. Strategy Resources and Constraints
02:46
Play Video: Lesson 11: Strategy Resources
95. Lesson 11: Strategy Resources
00:32
Play Video: Policies and Standards
96. Policies and Standards
01:01
Play Video: Definitions
97. Definitions
05:48
Play Video: Enterprise Information Security Architectures
98. Enterprise Information Security Architectures
01:30
Play Video: Controls
99. Controls
03:00
Play Video: Countermeasures
100. Countermeasures
00:55
Play Video: Technologies
101. Technologies
01:50
Play Video: Personnel
102. Personnel
01:54
Play Video: Organizational Structure
103. Organizational Structure
03:47
Play Video: Employee Roles and Responsibilities
104. Employee Roles and Responsibilities
00:28
Play Video: Skills
105. Skills
01:17
Play Video: Audits
106. Audits
01:41
Play Video: Compliance Enforcement
107. Compliance Enforcement
02:24
Play Video: Threat Assessment
108. Threat Assessment
01:41
Play Video: Vulnerability Assessment
109. Vulnerability Assessment
02:21
Play Video: Risk Assessment
110. Risk Assessment
02:19
Play Video: Insurance
111. Insurance
02:04
Play Video: Business Impact Assessment
112. Business Impact Assessment
02:32
Play Video: Outsourced Security Providers
113. Outsourced Security Providers
02:57
Play Video: Lesson 12: Strategy Constraints
114. Lesson 12: Strategy Constraints
00:23
Play Video: Legal and Regulatory Requirements
115. Legal and Regulatory Requirements
01:43
Play Video: Physical Constraints
116. Physical Constraints
02:56
Play Video: The Security Strategy
117. The Security Strategy
01:36
Play Video: Lesson 13: Action Plan to Implement Strategy
118. Lesson 13: Action Plan to Implement Strategy
01:13
Play Video: Gap Analysis Part1
119. Gap Analysis Part1
01:35
Play Video: Gap Analysis Part2
120. Gap Analysis Part2
00:52
Play Video: Gap Analysis Part3
121. Gap Analysis Part3
03:01
Play Video: Policy Development Part1
122. Policy Development Part1
01:42
Play Video: Policy Development Part2
123. Policy Development Part2
01:00
Play Video: Standards Development
124. Standards Development
02:45
Play Video: Training and Awareness
125. Training and Awareness
00:35
Play Video: Action Plan Metrics
126. Action Plan Metrics
01:23
Play Video: General Metric Considerations Part1
127. General Metric Considerations Part1
00:23
Play Video: General Metric Considerations Part2
128. General Metric Considerations Part2
00:35
Play Video: General Metric Considerations Part3
129. General Metric Considerations Part3
00:43
Play Video: General Metric Considerations Part4
130. General Metric Considerations Part4
00:23
Play Video: CMM4 Statements
131. CMM4 Statements
02:00
Play Video: Objectives for CMM4
132. Objectives for CMM4
00:47
Play Video: Domain 01 Review
133. Domain 01 Review
00:44
Name of Video Time
Play Video: Lesson 1: Risk Management Overview
1. Lesson 1: Risk Management Overview
00:59
Play Video: Risk Management Overview
2. Risk Management Overview
01:51
Play Video: Types of Risk Analysis
3. Types of Risk Analysis
07:08
Play Video: The Importance of Risk Management
4. The Importance of Risk Management
02:14
Play Video: Risk Management Outcomes
5. Risk Management Outcomes
01:35
Play Video: Risk Management Strategy
6. Risk Management Strategy
01:49
Play Video: Lesson 2: Good Information Security Risk Management
7. Lesson 2: Good Information Security Risk Management
04:14
Play Video: Context and Purpose
8. Context and Purpose
03:08
Play Video: Scope and Charter
9. Scope and Charter
00:39
Play Video: Assets
10. Assets
02:31
Play Video: Other Risk Management Goals
11. Other Risk Management Goals
02:02
Play Video: Roles and Responsibilities
12. Roles and Responsibilities
02:52
Play Video: Lesson 3: Information Security Risk Management Concepts
13. Lesson 3: Information Security Risk Management Concepts
06:06
Play Video: Technologies
14. Technologies
06:39
Play Video: Lesson 4: Implementing Risk Management
15. Lesson 4: Implementing Risk Management
02:08
Play Video: The Risk Management Framework
16. The Risk Management Framework
02:00
Play Video: The External Environment
17. The External Environment
01:48
Play Video: The Internal Environment
18. The Internal Environment
02:07
Play Video: The Risk Management Context
19. The Risk Management Context
00:47
Play Video: Gap Analysis
20. Gap Analysis
02:21
Play Video: Other Organizational Support
21. Other Organizational Support
04:09
Play Video: Risk Analysis
22. Risk Analysis
01:22
Play Video: Lesson 5: Risk Assessment
23. Lesson 5: Risk Assessment
01:19
Play Video: NIST Risk Assessment Methodology
24. NIST Risk Assessment Methodology
03:49
Play Video: Aggregated or Cascading Risk
25. Aggregated or Cascading Risk
02:54
Play Video: Other Risk Assessment Approaches
26. Other Risk Assessment Approaches
01:18
Play Video: Identification of Risks
27. Identification of Risks
01:49
Play Video: Threats
28. Threats
01:08
Play Video: Vulnerabilities Part1
29. Vulnerabilities Part1
02:11
Play Video: Vulnerabilities Part2
30. Vulnerabilities Part2
04:10
Play Video: Risks
31. Risks
01:36
Play Video: Analysis of Relevant Risks
32. Analysis of Relevant Risks
01:48
Play Video: Risk Analysis
33. Risk Analysis
02:29
Play Video: Semi -Quantitative Analysis
34. Semi -Quantitative Analysis
01:52
Play Video: Quantitative Analysis Example
35. Quantitative Analysis Example
04:14
Play Video: Evaluation of Risks
36. Evaluation of Risks
00:46
Play Video: Risk Treatment Options
37. Risk Treatment Options
04:39
Play Video: Impact
38. Impact
02:59
Play Video: Lesson 6: Controls Countermeasures
39. Lesson 6: Controls Countermeasures
00:25
Play Video: Controls
40. Controls
04:43
Play Video: Residual Risk
41. Residual Risk
03:38
Play Video: Information Resource Valuation
42. Information Resource Valuation
01:33
Play Video: Methods of Valuing Assets
43. Methods of Valuing Assets
01:36
Play Video: Information Asset Classification
44. Information Asset Classification
03:32
Play Video: Determining Classification
45. Determining Classification
02:05
Play Video: Impact Part1
46. Impact Part1
03:53
Play Video: Impact Part2
47. Impact Part2
01:03
Play Video: Lesson 7: Recovery Time Objectives
48. Lesson 7: Recovery Time Objectives
00:49
Play Video: Recovery Point Objectives
49. Recovery Point Objectives
04:18
Play Video: Service Delivery Objectives
50. Service Delivery Objectives
01:58
Play Video: Third-Party Service Providers
51. Third-Party Service Providers
01:44
Play Video: Working with Lifecycle Processes
52. Working with Lifecycle Processes
02:08
Play Video: IT System Development
53. IT System Development
02:12
Play Video: Project Management Part1
54. Project Management Part1
00:47
Play Video: Project Management Part2
55. Project Management Part2
02:10
Play Video: Lesson 8: Risk Monitoring and Communication
56. Lesson 8: Risk Monitoring and Communication
01:17
Play Video: Risk Monitoring and Communication
57. Risk Monitoring and Communication
00:38
Play Video: Other Communications
58. Other Communications
01:25
Play Video: Domain 02 Review
59. Domain 02 Review
01:01
Name of Video Time
Play Video: Introduction
1. Introduction
00:31
Play Video: Lesson 1: Development of Information Security Program
2. Lesson 1: Development of Information Security Program
02:50
Play Video: Importance of the Program
3. Importance of the Program
00:52
Play Video: Outcomes of Security Program Development
4. Outcomes of Security Program Development
01:47
Play Video: Effective Information Security Program Development
5. Effective Information Security Program Development
04:59
Play Video: Lesson 2: Information Security Program Objectives
6. Lesson 2: Information Security Program Objectives
00:10
Play Video: Cross Organizational Responsibilities
7. Cross Organizational Responsibilities
01:55
Play Video: Program Objectives Part1
8. Program Objectives Part1
02:23
Play Video: Program Objectives Part2
9. Program Objectives Part2
01:18
Play Video: Defining Objectives Part1
10. Defining Objectives Part1
02:11
Play Video: Defining Objectives Part2
11. Defining Objectives Part2
01:08
Play Video: Lesson 3: Information Security Program Development Concepts Part1
12. Lesson 3: Information Security Program Development Concepts Part1
04:02
Play Video: Information Security Program Development Concepts Part2
13. Information Security Program Development Concepts Part2
05:39
Play Video: Technology Resources
14. Technology Resources
02:44
Play Video: Information Security Manager
15. Information Security Manager
01:25
Play Video: Lesson 4: Scope and Charter of Information Security Program Development
16. Lesson 4: Scope and Charter of Information Security Program Development
00:30
Play Video: Assurance Function Integration
17. Assurance Function Integration
01:35
Play Video: Challenges in Developing Information Security Program
18. Challenges in Developing Information Security Program
01:54
Play Video: Pitfalls
19. Pitfalls
02:48
Play Video: Objectives of the Security Program
20. Objectives of the Security Program
02:06
Play Video: Program Goals
21. Program Goals
02:52
Play Video: The Steps of the Security Program
22. The Steps of the Security Program
01:46
Play Video: Defining the Roadmap Part1
23. Defining the Roadmap Part1
01:38
Play Video: Defining the Roadmap Part2
24. Defining the Roadmap Part2
00:58
Play Video: Elements of the Roadmap Part1
25. Elements of the Roadmap Part1
01:18
Play Video: Elements of the Roadmap Part2
26. Elements of the Roadmap Part2
00:34
Play Video: Elements of the Roadmap Part3
27. Elements of the Roadmap Part3
01:57
Play Video: Elements of the Roadmap Part4
28. Elements of the Roadmap Part4
01:17
Play Video: Elements of the Roadmap Part5
29. Elements of the Roadmap Part5
00:18
Play Video: Gap Analysis
30. Gap Analysis
00:44
Play Video: Lesson 5: Information Security Management Framework
31. Lesson 5: Information Security Management Framework
00:15
Play Video: Security Management Framework
32. Security Management Framework
04:55
Play Video: COBIT 5
33. COBIT 5
05:59
Play Video: ISO/IEC 27001
34. ISO/IEC 27001
04:30
Play Video: Lesson 6: Information Security Framework Components
35. Lesson 6: Information Security Framework Components
00:13
Play Video: Operational Components Part1
36. Operational Components Part1
01:56
Play Video: Operational Components Part2
37. Operational Components Part2
03:11
Play Video: Management Components
38. Management Components
01:31
Play Video: Administrative Components
39. Administrative Components
03:30
Play Video: Educational and Informational Components
40. Educational and Informational Components
01:26
Play Video: Lesson 7: Information Security Program Resources
41. Lesson 7: Information Security Program Resources
01:32
Play Video: Resources
42. Resources
03:27
Play Video: Documentation
43. Documentation
00:54
Play Video: Enterprise Architecture Part1
44. Enterprise Architecture Part1
04:29
Play Video: Enterprise Architecture Part2
45. Enterprise Architecture Part2
01:54
Play Video: Enterprise Architecture Part3
46. Enterprise Architecture Part3
01:11
Play Video: Controls as Strategy Implementation Resources Part1
47. Controls as Strategy Implementation Resources Part1
03:42
Play Video: Controls as Strategy Implementation Resources Part2
48. Controls as Strategy Implementation Resources Part2
02:20
Play Video: Controls as Strategy Implementation Resources Part3
49. Controls as Strategy Implementation Resources Part3
04:35
Play Video: Controls as Strategy Implementation Resources Part4
50. Controls as Strategy Implementation Resources Part4
02:19
Play Video: Common Control Practices
51. Common Control Practices
01:41
Play Video: Countermeasures
52. Countermeasures
00:37
Play Video: Technologies Part1
53. Technologies Part1
01:13
Play Video: Technologies Part2
54. Technologies Part2
01:52
Play Video: Technologies Part3
55. Technologies Part3
01:39
Play Video: Technologies Part4
56. Technologies Part4
05:38
Play Video: Personnel Part1
57. Personnel Part1
02:00
Play Video: Personnel Part2
58. Personnel Part2
02:56
Play Video: Security Awareness
59. Security Awareness
01:28
Play Video: Awareness Topics
60. Awareness Topics
05:18
Play Video: Formal Audits
61. Formal Audits
01:16
Play Video: Compliance Enforcement
62. Compliance Enforcement
01:03
Play Video: Project Risk Analysis
63. Project Risk Analysis
03:09
Play Video: Other Actions
64. Other Actions
02:58
Play Video: Other Organizational Support
65. Other Organizational Support
01:21
Play Video: Program Budgeting Part1
66. Program Budgeting Part1
01:03
Play Video: Program Budgeting Part2
67. Program Budgeting Part2
02:19
Play Video: Lesson 8: Implementing an Information Security Program
68. Lesson 8: Implementing an Information Security Program
00:13
Play Video: Policy Compliance
69. Policy Compliance
02:38
Play Video: Standards Compliance
70. Standards Compliance
02:44
Play Video: Training and Education
71. Training and Education
01:43
Play Video: ISACA Control Objectives
72. ISACA Control Objectives
03:52
Play Video: Third-party Service Providers Part1
73. Third-party Service Providers Part1
01:08
Play Video: Third-party Service Providers Part2
74. Third-party Service Providers Part2
04:22
Play Video: Integration into Lifecycle Processes
75. Integration into Lifecycle Processes
02:14
Play Video: Monitoring and Communication
76. Monitoring and Communication
03:33
Play Video: Documentation
77. Documentation
01:33
Play Video: The Plan of Action Part1
78. The Plan of Action Part1
01:17
Play Video: The Plan of Action Part2
79. The Plan of Action Part2
01:36
Play Video: Lesson 9: Information Infrastructure and Architecture
80. Lesson 9: Information Infrastructure and Architecture
00:53
Play Video: Managing Complexity Part1
81. Managing Complexity Part1
04:42
Play Video: Managing Complexity Part2
82. Managing Complexity Part2
01:45
Play Video: Objectives of Information Security Architectures Part1
83. Objectives of Information Security Architectures Part1
01:30
Play Video: Objectives of Information Security Architectures Part2
84. Objectives of Information Security Architectures Part2
01:15
Play Video: Physical and Environmental Controls
85. Physical and Environmental Controls
03:32
Play Video: Lesson 10: Information Security Program
86. Lesson 10: Information Security Program
03:03
Play Video: Information Security Program Deployment Metrics
87. Information Security Program Deployment Metrics
02:27
Play Video: Metrics
88. Metrics
02:02
Play Video: Strategic Alignment
89. Strategic Alignment
00:53
Play Video: Risk Management
90. Risk Management
01:41
Play Video: Value Delivery
91. Value Delivery
00:35
Play Video: Resource Management
92. Resource Management
01:23
Play Video: Assurance Process Integration
93. Assurance Process Integration
00:27
Play Video: Performance Measurement
94. Performance Measurement
00:41
Play Video: Security Baselines
95. Security Baselines
00:38
Play Video: Lesson 11: Security Program Services and Operational Activities
96. Lesson 11: Security Program Services and Operational Activities
00:48
Play Video: IS Liaison Responsibilities Part1
97. IS Liaison Responsibilities Part1
10:17
Play Video: IS Liaison Responsibilities Part2
98. IS Liaison Responsibilities Part2
02:28
Play Video: Cross-Organizational Responsibilities
99. Cross-Organizational Responsibilities
01:34
Play Video: Security Reviews and Audits Part1
100. Security Reviews and Audits Part1
03:27
Play Video: Security Reviews and Audits Part2
101. Security Reviews and Audits Part2
01:38
Play Video: Management of Security Technology
102. Management of Security Technology
01:25
Play Video: Due Diligence Part1
103. Due Diligence Part1
04:10
Play Video: Due Diligence Part2
104. Due Diligence Part2
01:36
Play Video: Compliance Monitoring and Enforcement Part1
105. Compliance Monitoring and Enforcement Part1
02:02
Play Video: Compliance Monitoring and Enforcement Part2
106. Compliance Monitoring and Enforcement Part2
01:46
Play Video: Assessment of Risk and Impact Part1
107. Assessment of Risk and Impact Part1
02:17
Play Video: Assessment of Risk and Impact Part2
108. Assessment of Risk and Impact Part2
01:28
Play Video: Outsourcing and Service Providers
109. Outsourcing and Service Providers
02:33
Play Video: Cloud Computing Part1
110. Cloud Computing Part1
01:37
Play Video: Cloud Computing Part2
111. Cloud Computing Part2
01:54
Play Video: Cloud Computing Part3
112. Cloud Computing Part3
02:23
Play Video: Integration with IT Processes
113. Integration with IT Processes
00:42
Play Video: Domain 03 Review
114. Domain 03 Review
01:13
Name of Video Time
Play Video: Lesson 1: Incident Management Overview Part1
1. Lesson 1: Incident Management Overview Part1
00:47
Play Video: Incident Management Overview Part2
2. Incident Management Overview Part2
03:08
Play Video: Incident Management Overview Part3
3. Incident Management Overview Part3
03:45
Play Video: Types of Events Part1
4. Types of Events Part1
02:44
Play Video: Types of Events Part2
5. Types of Events Part2
03:20
Play Video: Goals of Incident Management Part1
6. Goals of Incident Management Part1
04:45
Play Video: Goals of Incident Management Part2
7. Goals of Incident Management Part2
06:31
Play Video: Goals of Incident Management Part3
8. Goals of Incident Management Part3
03:26
Play Video: Lesson 2: Incident Response Procedures Part1
9. Lesson 2: Incident Response Procedures Part1
00:23
Play Video: Incident Response Procedures Part2
10. Incident Response Procedures Part2
03:40
Play Video: Importance of Incident Management
11. Importance of Incident Management
08:01
Play Video: Outcomes of Incident Management
12. Outcomes of Incident Management
03:50
Play Video: Incident Management
13. Incident Management
01:35
Play Video: Concepts Part1
14. Concepts Part1
03:44
Play Video: Concepts Part2
15. Concepts Part2
01:35
Play Video: Concepts Part3
16. Concepts Part3
01:34
Play Video: Incident Management Systems Part1
17. Incident Management Systems Part1
04:02
Play Video: Incident Management Systems Part2
18. Incident Management Systems Part2
00:53
Play Video: Lesson 3: Incident Management Organization
19. Lesson 3: Incident Management Organization
02:31
Play Video: Responsibilities Part1
20. Responsibilities Part1
03:44
Play Video: Responsibilities Part2
21. Responsibilities Part2
02:58
Play Video: Responsibilities Part3
22. Responsibilities Part3
05:10
Play Video: Senior Management Commitment
23. Senior Management Commitment
01:02
Play Video: Lesson 4: Incident Management Resources
24. Lesson 4: Incident Management Resources
00:25
Play Video: Policies and Standards
25. Policies and Standards
00:36
Play Video: Incident Response Technology Concepts
26. Incident Response Technology Concepts
11:12
Play Video: Personnel
27. Personnel
03:11
Play Video: Roles and Responsibilities (eNotes)
28. Roles and Responsibilities (eNotes)
08:24
Play Video: Skills
29. Skills
08:09
Play Video: Awareness and Education
30. Awareness and Education
01:20
Play Video: Audits
31. Audits
02:49
Play Video: Lesson 5: Incident Management Objectives
32. Lesson 5: Incident Management Objectives
00:17
Play Video: Defining Objectives
33. Defining Objectives
00:48
Play Video: The Desired State
34. The Desired State
03:29
Play Video: Strategic Alignment
35. Strategic Alignment
06:42
Play Video: Other Concerns
36. Other Concerns
02:33
Play Video: Lesson 6: Incident Management Metrics and Indicators
37. Lesson 6: Incident Management Metrics and Indicators
05:14
Play Video: Implementation of the Security Program Management
38. Implementation of the Security Program Management
03:01
Play Video: Management Metrics and Monitoring Part1
39. Management Metrics and Monitoring Part1
01:35
Play Video: Management Metrics and Monitoring Part2
40. Management Metrics and Monitoring Part2
02:48
Play Video: Other Security Monitoring Efforts
41. Other Security Monitoring Efforts
04:24
Play Video: Lesson 7: Current State of Incident Response Capability
42. Lesson 7: Current State of Incident Response Capability
00:11
Play Video: Threats
43. Threats
04:39
Play Video: Vulnerabilities
44. Vulnerabilities
06:15
Play Video: Lesson 8: Developing an Incident Response Plan
45. Lesson 8: Developing an Incident Response Plan
00:44
Play Video: Elements of an Incident Response Plan
46. Elements of an Incident Response Plan
08:19
Play Video: Gap Analysis
47. Gap Analysis
03:05
Play Video: BIA Part1
48. BIA Part1
05:05
Play Video: BIA Part2
49. BIA Part2
02:48
Play Video: Escalation Process for Effective IM
50. Escalation Process for Effective IM
02:45
Play Video: Help Desk Processes for Identifying Security Incidents
51. Help Desk Processes for Identifying Security Incidents
01:27
Play Video: Incident Management and Response Teams
52. Incident Management and Response Teams
02:10
Play Video: Organizing, Training, and Equipping the Response Staff
53. Organizing, Training, and Equipping the Response Staff
01:55
Play Video: Incident Notification Process
54. Incident Notification Process
00:55
Play Video: Challenges in making an Incident Management Plan
55. Challenges in making an Incident Management Plan
02:18
Play Video: Lesson 9: BCP/DRP
56. Lesson 9: BCP/DRP
07:49
Play Video: Goals of Recovery Operations Part1
57. Goals of Recovery Operations Part1
02:02
Play Video: Goals of Recovery Operations Part2
58. Goals of Recovery Operations Part2
01:57
Play Video: Choosing a Site Selection Part1
59. Choosing a Site Selection Part1
05:37
Play Video: Choosing a Site Selection Part2
60. Choosing a Site Selection Part2
01:18
Play Video: Implementing the Strategy
61. Implementing the Strategy
03:58
Play Video: Incident Management Response Teams
62. Incident Management Response Teams
02:10
Play Video: Network Service High-availability
63. Network Service High-availability
04:17
Play Video: Storage High-availability
64. Storage High-availability
04:01
Play Video: Risk Transference
65. Risk Transference
01:27
Play Video: Other Response Recovery Plan Options
66. Other Response Recovery Plan Options
01:29
Play Video: Lesson 10: Testing Response and Recovery Plans
67. Lesson 10: Testing Response and Recovery Plans
02:17
Play Video: Periodic Testing
68. Periodic Testing
01:17
Play Video: Analyzing Test Results Part1
69. Analyzing Test Results Part1
02:06
Play Video: Analyzing Test Results Part2
70. Analyzing Test Results Part2
03:39
Play Video: Measuring the Test Results
71. Measuring the Test Results
00:58
Play Video: Lesson 11: Executing the Plan
72. Lesson 11: Executing the Plan
01:56
Play Video: Updating the Plan
73. Updating the Plan
01:15
Play Video: Intrusion Detection Policies
74. Intrusion Detection Policies
01:38
Play Video: Who to Notify about an Incident
75. Who to Notify about an Incident
01:52
Play Video: Recovery Operations
76. Recovery Operations
01:53
Play Video: Other Recovery Operations
77. Other Recovery Operations
01:57
Play Video: Forensic Investigation
78. Forensic Investigation
03:05
Play Video: Hacker / Penetration Methodology
79. Hacker / Penetration Methodology
11:50
Play Video: Domain 04 Review
80. Domain 04 Review
01:15
Play Video: Course Closure
81. Course Closure
00:34

About Isaca CISM Training Course

This training course is designed to help with Isaca CISM (CISM: Certified Information Security Manager) exam preparation .

CISM is a technical security video course that is recommended for individuals who wish to involve their learning in auditing field. The course is facilitated by ISACA which is a renowned sponsor for IT courses.

The student will perceive this course as a giant combination of the most credited topics in the world of information systems. This is due to the ultimately expressed concepts in Risk Management, Security Program Development, Security Incident Management and so many units under the course outline. This video course will enlighten the candidate with the advanced understanding of the topics covered herein.

Description

ISACA-CISM video course is truly a perfect combination of skills that a candidate will impressively understand as it reduces monotony caused by learning one subject matter throughout the lectures. The lectures are so unique every time it is brought into the discussion. The performance of this course is often expected to be higher than other courses under the same category.

The candidate will be enlightened with the knowledge on GRC, CIA, Access Control, Cryptography, Network Architecture, Hashing techniques, BCP, and DRP. This knowledge will ensure that the candidate is able to perform various administrative duties as far as technology and auditing are a concern. The professionals pursuing this course will have a clear overview of how to control access to data in a system. These technical skills are suitable for the auditing career because the audits of any organization are ought to be confidential. This has been captured well in the lecture explaining the CIA triads. Anyone interested in the brief introduction of the course is advised to take this key of opportunities by pursuing CISA video course.

Knowledge and skills students develop
  • GRC techniques
  • CIA triads
  • Report metrics skills
  • Risk Register analysis
  • BIA terminologies
  • Access control
  • Authorization and Authentication
Requirements for this course
  • The candidate must follow the professional ethics in compliance with ISACA.
  • Experience of five years in the IT security field is required.
  • The professional must provide documents required during the application.
  • Ability to implement the concepts and task given by the instructor is highly required.
Examination paper design
  • The exam consists of 100-150 questions from the course syllabus.
  • the price charged for doing this examination is $150.00
  • The type of questions that the learner should expect are multiple choice.
  • It is scheduled to be done for three hours.
Audience to target
  • Experts in the field of Science, Engineering, and technology.
  • Internal Auditors who want to start their journey in information security.
  • Business Administrators who are interested in learning security and software management.
  • Any person having the ambition to polish their understanding of security and risk management.
Job opportunities
  • Auditing Consultant
  • Information Security specialist.
  • Telecommunication Engineer
  • Data administrator
  • Business Administrator
  • IT consultant
  • Server Manager

The skilled professionals in this field have realized a rising salary that goes up to 70% upon certification.

Conclusion

The learners are privileged to have learned two related discipline in one collection. The students will not only be equipped with the learners with security skills but also the auditing skills that collaborate together.

Download Isaca CISM Exam Questions & Answers

Get 100% Real Exam Questions, Accurate & Verified Answers As Seen in the Real Exam!
30 Days Free Updates, Instant Download!

Isaca CISM Premium Bundle
$69.97
$49.99

CISM Premium Bundle

  • Premium File: 1519 Questions & Answers. Last update: Feb 25, 2021
  • Training Course: 51 Video Lectures
  • Study Guide: 822 Pages
  • Real Questions
  • 100% Accurate Answers
  • Fast Exam Updates
Get Unlimited Access to ALL Premium Files

CISM Premium Bundle

Isaca CISM Premium Bundle
  • Premium File: 1519 Questions & Answers. Last update: Feb 25, 2021
  • Training Course: 51 Video Lectures
  • Study Guide: 822 Pages
  • Real Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$69.97
$49.99
Get Unlimited Access to ALL Premium Files

Free CISM Exam Questions & CISM Dumps

File Name Size Votes
File Name
isaca.selftesttraining.cism.v2021-02-12.by.elijah.954q.vce
Size
1.29 MB
Votes
1

Comments (5)

Add Comment

Please post your comments about CISM Exams. Don't share your email address asking for CISM braindumps or CISM exam pdf files.

  • ROWLAND
  • United Arab Emirates
  • Jan 28, 2021

Wow! The course does not leave anyone behind thinking of what to do to understand these concepts. The instructor has considered all my colleagues without favor. I strongly believe we all will be scored highly.

  • {milo}
  • Canada
  • Jan 06, 2021

great! I have just helped my boss to protect his computer from other devices accessing his data whenever he connects to a WLAN network and now the issue is sorted.

  • Anirudth Noli
  • United States
  • Dec 23, 2020

I think the instructor should try to be audible enough in his speech. Sometimes it is hard to get some terms. I know that is a little adjustment to be made within no time. Still, in general the course is very helpful. Thanks!

  • Jalil
  • Germany
  • Dec 01, 2020

these course has enlightened me with so many concepts that I have always desired to know in my life as a computer scientist. I fully recommend this course to anyone out there.

  • garfild
  • Puerto Rico
  • Nov 17, 2020

CIA. I was ignorant about the meaning of this abbreviated text before. once I was thinking about the FBI agents learning the course but later realized that these are information security triads!

Add Comment

Purchase Individually

CISM  Premium File
CISM
Premium File
1519 Q&A
$43.99 $39.99
CISM  Training Course
CISM
Training Course
51 Lectures
$16.49 $14.99
CISM  Study Guide
CISM
Study Guide
822 Pages
$16.49 $14.99

Isaca Certifications

Top Isaca Exams

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.