• No products in the cart.

Course Curriculum

Introduction
1. Course Structure 00:06:00
2. Introduction CISM 00:10:00
3. Course Outline 00:08:00
D1-Information Security Governance
1. Needed Background 00:05:00
2. GRC 00:02:00
3. Senior Management and GRC 00:07:00
4. Senior Management and Risk 00:07:00
5. Organizational Structure 00:05:00
3. Domain 1 Information Security Governance
1. Introduction to Security Concepts 00:12:00
2. Business Goals and Objectives 00:05:00
3. Information Security Governance 00:04:00
4. CIA Triad 00:06:00
5. Information Security Components 00:05:00
6. Security Program Overview 00:06:00
7. Information Security Governance 00:03:00
8. Information Security Governance Output 00:03:00
9. Rules and Responsibility 00:05:00
10. GRC 2 00:01:00
11. Governance of Third Party 00:01:00
12. Establish, Monitor, Evaluate and Report Metrics 00:00:00
Domain 1 : Information Security Governance Introduction to Security Concepts (13:33) Business Goals and Objective (4:53) Information Security Governance (4:09) CIA Triad (5:40) Information Security components (4:00) Security Program Overview (5:48) Information Security Governace Output (2:48) Define roles and responsibilities (3:49) GRC (1:18) Governace of Third party (1:28) Start Establish, monitor, evaluate and report metrics (5:50) Domain 2 : Information Risk Management and Compliance
1. What is Risk CISM 00:00:00
2. Asset Evaluation CISM 00:00:00
3. Information Asset Register CISM 00:00:00
4. Classification Schemes 00:00:00
6. Risk Register CISM 00:00:00
6. Alignment of Risk Assessment and BIA CISM 00:00:00
7. Business Impact Analysis CISM 00:00:00
8. Ethics Issues in a Computing Environment CISM 00:00:00
9. Control Type CISM 00:00:00
10. Control Category CISM 00:00:00
11. Evaluate Information Security Control CISM 00:00:00
Domain 2 : Information Risk Management and Compliance Start What is Risk (11:59) Start Asset Evaluation (18:28) Start Information Asset Register (7:58) Start Classification Schemes (4:34) Start Risk Register (3:20) Start Alligment of Risk Asemment and BIA (4:03) Start Business Impact Analysis - BIA (10:09) Start Ethics Issues in a Computing Environment (5:29) Start Control Types (2:56) Start Control Catagory (3:51) Start Evaluate information security controls (3:53) Domain 3 : Information Security Program Development and Management
1. Establish and Maintain the Information Security Program CISM 00:00:00
2. Information Security Program Element CISM 00:00:00
3. Access Controls CISM 00:00:00
4. Authorization CISM 00:00:00
5. Intrusion Detection Systems CISM 00:00:00
6. Network Architecture Components CISM 00:00:00
7. Firewall CISM 00:00:00
8. Cryptography CISM 00:00:00
9. Symmetric Encryption CISM 00:00:00
10. Asymmetric Encryption CISM 00:00:00
11. Hashing 00:00:00
Domain 4 : Information Security Incident Management
1. Information Security Incident Management CISM 00:00:00
2. Incidence Response Team CISM 00:00:00
3. Incidence Report CISM 00:00:00
4. BCP and DRP CISM 00:00:00
5. Business Continuity Plan CISM 00:00:00
6. Business Impact Analysis CISM 00:00:00
7. MTD RTO RPO CISM 00:00:00
8. Disaster Recovery Plan CISM 00:00:00
9. Alternative Sites CISM 00:00:00
Get ready for the Exam
1. Get ready for the Exam CISM 00:00:00

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE
  • $300.00 $45.00
  • UNLIMITED ACCESS
  • Course Certificate
189 STUDENTS ENROLLED

    Course Reviews

    About

    Webscholar is an online education platform which imparts knowledge and skills to million of users worldwide.

    Maddision Square Garden, NY

    admin@webscholar.net

    Categories

    top
    Design  by © HCI Communications Ltd. All rights reserved.