ISACA CISM Certified Information Security Manager Video Training Course & PDF Guides Download
Number of courses : 03
Size : 9.27 GB (5 PART DOWNLOAD)
CISM Course : 01
ISACA Certified Information Security Manager (CISM)
PART-01
001_Introduction
002_Governance_Overview
003_Business_Goals_and_Objectives
006_Roles_and_Responsibilities_
007_Risk_Management_and_IS_Roles_and_Responsibilities
008_Third-Party_Relationships
010_Effective_Metrics
011_Strategy_Development
012_Strategy_Goal_Objective_and_Desired_State
013_Current_State_of_Security
014_Strategy_Elements
016_IS_Resources
017_IS_Constraints
019_Implementation_Action_Plan_Development
020_IS_Program_Objectives
022_Risk_Management_Overview
023_Strategy_Communication_and_Risk_Awareness
024_Effective_Information_Risk_Management
025_Risk_Management_Concepts
026_Implementing_Risk_Management
028_Risk_Assessment_Overview
029_Risk_Assessment_Methodology
031_Asset_Classification_Overview
032_BIA_Key_Metrics
033_Third_Party_Service_Providers
034_Integration_with_Life_Cycle_Processes
035_Security_Control_Baselines
037_Risk_Monitoring_Overview
038_Training_and_Awareness
039_Documentation
041_IS_Program_Development_and_Management_Overview
042_IS_Program_Elements
043_Defining_IS_Program_Objectives
044_Technology_Resources
045_Scope_and_Charter
PART-02
046_IS_Management_Framework
047_IS_Management_Framework_Components
048_Defining_IS_Program_Road_Map
049_IS_Infrastructure_and_Architecture
050_Architecture_Implementation
053_Management_and_Administrative_Activities
054_Services_and_Operational_Activities
056_Controls_and_Countermeasures
057_Metrics_and_Monitoring
058_Program_Challenges
060_Incident_Management_Introduction
061_Incident_Management_Overview
062_Incident_Response_Procedures
063_Incident_Management_Organization
064_Incident_Management_Resources
065_Incident_Management_Objectives
066_Metrics_and_Indicators
067_Defining_Incident_Management_Procedures
069_Current_State_of_IR_Capability
070_Developing_an_IR_Plan
071_BC_and_DR_Procedures
072_Testing_IR_BC_and_DR_Plans
073_Executing_Response_and_Recovery_Plans
074_Post-Incident_Activities_and_Investigation
CISM Course : 02
ISACA CISM Certified Information Security Manager
01 Introduction
001 Introduction.en.srt
001 Introduction
002 Scope and Exam Info.en.srt
002 Scope and Exam Info
02 Information Security Governance
003 CISM-05-Security-Strategy
003 Information Security Governance.en.srt
003 Information Security Governance
004 CISM-04-Governance-Tasks
004 Information Security Governance Tasks.en.srt
004 Information Security Governance Tasks
005 Information Security Strategy.en.srt
005 Information Security Strategy
006 Alignment to Organizational Goals.en.srt
006 Alignment to Organizational Goals
007 Security Frameworks.en.srt
007 Security Frameworks
008 IS Roles and Responsibilities.en.srt
008 IS Roles and Responsibilities
009 Integrated Governance.en.srt
009 Integrated Governance
010 Industry Standards.en.srt
010 Industry Standards
011 Balanced Scorecard.en.srt
011 Balanced Scorecard
012 Structure.en.srt
012 Structure
013 Business Case.en.srt
013 Business Case
014 Security Budget.en.srt
014 Security Budget
015 Security Influencers.en.srt
015 Security Influencers
016 Governance, Risk and Compliance.en.srt
016 Governance, Risk and Compliance
017 Obtain Management Commitment.en.srt
017 Obtain Management Commitment
018 Security Management Roles.en.srt
018 Security Management Roles
019 Organizational Structures.en.srt
019 Organizational Structures
020 Effective Communication.en.srt
020 Effective Communication
021 Security Metrics.en.srt
021 Security Metrics
03 Risk Management and Compliance
022 Risk Management and Compliance.en.srt
022 Risk Management and Compliance
023 Information Classification.en.srt
023 Information Classification
024 Responsibility Assignment.en.srt
024 Responsibility Assignment
025 Evaluate Risk Impact.en.srt
025 Evaluate Risk Impact
026 Asset Validation.en.srt
026 Asset Validation
027 Legal Requirements.en.srt
027 Legal Requirements
028 Identifying Emerging Threats.en.srt
028 Identifying Emerging Threats
029 When It's Time to Reassess.en.srt
029 When It's Time to Reassess
030 Threat Knowledge.en.srt
030 Threat Knowledge
031 Risk Assessments and Analysis Methodologies.en.srt
031 Risk Assessments and Analysis Methodologies
032 Risk Assessment Methodology.en.srt
032 Risk Assessment Methodology
033 Risk Prioritization.en.srt
033 Risk Prioritization
034 Risk Factors.en.srt
034 Risk Factors
035 Risk Reporting.en.srt
035 Risk Reporting
036 Risk Monitoring.en.srt
036 Risk Monitoring
037 Risk Treatment Strategies.en.srt
037 Risk Treatment Strategies
038 Risk Baselines.en.srt
038 Risk Baselines
039 Monitoring Security Controls.en.srt
039 Monitoring Security Controls
040 Gap Analysis.en.srt
040 Gap Analysis
041 Risk Integration.en.srt
041 Risk Integration
042 Compliance Reporting.en.srt
042 Compliance Reporting
043 Cost Determines Treatment.en.srt
043 Cost Determines Treatment
04 Information Security Program Development and Management
044 Information Security Program Development Management.en.srt
044 Information Security Program Development Management
045 Alignment with the Business.en.srt
045 Alignment with the Business
046 Acquire and Deploy Security Resources.en.srt
046 Acquire and Deploy Security Resources
047 Keep it Running.en.srt
047 Keep it Running
048 Controls and Counter Measures.en.srt
048 Controls and Counter Measures
049 Security Architecture.en.srt
049 Security Architecture
050 Standards and Procedures Development.en.srt
050 Standards and Procedures Development
051 Security Controls.en.srt
051 Security Controls
052 Security Implementation.en.srt
CISM Course : 03
Module 00-Introduction
Module 01-Information Security Governance 954.1 MB
Module 02-Risk Management 467.7 MB
Module 03-Security Architecture 740.3 MB
Module 04-Information Security Management 973.1 MB
Module 05-Incident Response and Business Continuity
You can Instant Download a PDF file After successful payment , This PDF File
You can Instant Download a PDF file
After successful payment ,
This PDF File Contains Course Download links
You can Download This Course immediately from click that Links.