• No products in the cart.

$300.00 $45.00

Course Curriculum

    • 1. Course Structure 00:06:00
    • Course Structure
    • 2. Introduction CISM 00:10:00
    • Introduction CISM
    • 3. Course Outline 00:08:00
    • Course Outline
    • 1. Needed Background 00:05:00
    • Needed Background
    • 2. GRC 00:02:00
    • Governance, Risk and Compliance
    • 3. Senior Management and GRC 00:07:00
    • Senior Management and GRC
    • 4. Senior Management and Risk 00:07:00
    • Senior Management and Risk
    • 5. Organizational Structure 00:05:00
    • Organizational Structure
    • 1. Introduction to Security Concepts 00:12:00
    • Introduction to Security Concepts
    • 2. Business Goals and Objectives 00:05:00
    • Business Goals and Objectives
    • 3. Information Security Governance 00:04:00
    • Information Security Governance
    • 4. CIA Triad 00:06:00
    • CIA Triad
    • 5. Information Security Components 00:05:00
    • Information Security Components
    • 6. Security Program Overview 00:06:00
    • Security Program Overview
    • 7. Information Security Governance 00:03:00
    • Information Security Governance
    • 8. Information Security Governance Output 00:03:00
    • Information Security Governance Output
    • 9. Rules and Responsibility 00:05:00
    • Rules and Responsibility
    • 10. GRC 2 00:01:00
    • GRC 2
    • 11. Governance of Third Party 00:01:00
    • Governance of Third Party
    • 12. Establish, Monitor, Evaluate and Report Metrics 00:00:00
    • 1. What is Risk CISM 00:00:00
    • 2. Asset Evaluation CISM 00:00:00
    • 3. Information Asset Register CISM 00:00:00
    • 4. Classification Schemes 00:00:00
    • 6. Risk Register CISM 00:00:00
    • 6. Alignment of Risk Assessment and BIA CISM 00:00:00
    • 7. Business Impact Analysis CISM 00:00:00
    • 8. Ethics Issues in a Computing Environment CISM 00:00:00
    • 9. Control Type CISM 00:00:00
    • 10. Control Category CISM 00:00:00
    • 11. Evaluate Information Security Control CISM 00:00:00
    • 1. Establish and Maintain the Information Security Program CISM 00:00:00
    • 2. Information Security Program Element CISM 00:00:00
    • 3. Access Controls CISM 00:00:00
    • 4. Authorization CISM 00:00:00
    • 5. Intrusion Detection Systems CISM 00:00:00
    • 6. Network Architecture Components CISM 00:00:00
    • 7. Firewall CISM 00:00:00
    • 8. Cryptography CISM 00:00:00
    • 9. Symmetric Encryption CISM 00:00:00
    • 10. Asymmetric Encryption CISM 00:00:00
    • 11. Hashing 00:00:00
    • 1. Information Security Incident Management CISM 00:00:00
    • 2. Incidence Response Team CISM 00:00:00
    • 3. Incidence Report CISM 00:00:00
    • 4. BCP and DRP CISM 00:00:00
    • 5. Business Continuity Plan CISM 00:00:00
    • 6. Business Impact Analysis CISM 00:00:00
    • 7. MTD RTO RPO CISM 00:00:00
    • 8. Disaster Recovery Plan CISM 00:00:00
    • 9. Alternative Sites CISM 00:00:00
    • 1. Get ready for the Exam CISM 00:00:00
Site Design © HCI Communications Ltd. All rights reserved.