Training Video Course

CISM: Certified Information Security Manager

PDFs and exam guides are not so efficient, right? Prepare for your Isaca examination with our training course. The CISM course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Isaca certification exam. Pass the Isaca CISM test with flying colors.

Rating
4.62rating
Students
523
Duration
14:34:18 h
$16.49
$14.99

Curriculum for CISM Certification Video Course

Name of Video Time
Play Video: Course Introduction
1. Course Introduction
01:02
Name of Video Time
Play Video: Lesson 1: Information Security Governance Overview
1. Lesson 1: Information Security Governance Overview
00:53
Play Video: Information Security Governance Overview Part1
2. Information Security Governance Overview Part1
01:12
Play Video: Information Security Governance Overview Part2
3. Information Security Governance Overview Part2
02:00
Play Video: Information Security Governance Overview Part3
4. Information Security Governance Overview Part3
01:22
Play Video: Information Security Governance Overview Part4
5. Information Security Governance Overview Part4
01:32
Play Video: Information Security Governance Overview Part5
6. Information Security Governance Overview Part5
00:30
Play Video: Importance of Information Security Governance Part1
7. Importance of Information Security Governance Part1
06:21
Play Video: Importance of Information Security Governance Part2
8. Importance of Information Security Governance Part2
01:19
Play Video: Outcomes of Information Security Governance Part1
9. Outcomes of Information Security Governance Part1
00:33
Play Video: Outcomes of Information Security Governance Part2
10. Outcomes of Information Security Governance Part2
01:26
Play Video: Outcomes of Information Security Governance Part3
11. Outcomes of Information Security Governance Part3
02:45
Play Video: Outcomes of Information Security Governance Part4
12. Outcomes of Information Security Governance Part4
01:27
Play Video: Outcomes of Information Security Governance Part5
13. Outcomes of Information Security Governance Part5
01:54
Play Video: Outcomes of Information Security Governance Part6
14. Outcomes of Information Security Governance Part6
01:28
Play Video: Lesson 2: Effective Information Security Governance
15. Lesson 2: Effective Information Security Governance
00:31
Play Video: Business Goals and Objectives Part1
16. Business Goals and Objectives Part1
01:31
Play Video: Business Goals and Objectives Part2
17. Business Goals and Objectives Part2
02:00
Play Video: Roles and Responsibilities of Senior Management Part1
18. Roles and Responsibilities of Senior Management Part1
01:02
Play Video: Roles and Responsibilities of Senior Management Part2
19. Roles and Responsibilities of Senior Management Part2
00:43
Play Video: Domain Tasks Part1
20. Domain Tasks Part1
01:21
Play Video: Domain Tasks Part2
21. Domain Tasks Part2
03:16
Play Video: Business Model for Information Security Part1
22. Business Model for Information Security Part1
00:45
Play Video: Business Model for Information Security Part2
23. Business Model for Information Security Part2
01:09
Play Video: Business Model for Information Security Part3
24. Business Model for Information Security Part3
03:16
Play Video: Business Model for Information Security Part4
25. Business Model for Information Security Part4
01:37
Play Video: Dynamic Interconnections Part1
26. Dynamic Interconnections Part1
00:34
Play Video: Dynamic Interconnections Part2
27. Dynamic Interconnections Part2
02:55
Play Video: Dynamic Interconnections Part3
28. Dynamic Interconnections Part3
01:55
Play Video: Dynamic Interconnections Part4
29. Dynamic Interconnections Part4
00:51
Play Video: Lesson 3: Information Security Concepts and Technologies
30. Lesson 3: Information Security Concepts and Technologies
03:27
Play Video: Information Security Concepts and Technologies Part1
31. Information Security Concepts and Technologies Part1
02:58
Play Video: Information Security Concepts and Technologies Part2
32. Information Security Concepts and Technologies Part2
03:25
Play Video: Information Security Concepts and Technologies Part3
33. Information Security Concepts and Technologies Part3
01:50
Play Video: Technologies Part1
34. Technologies Part1
01:41
Play Video: Technologies Part2
35. Technologies Part2
06:12
Play Video: Lesson 4: Information Security Manager
36. Lesson 4: Information Security Manager
00:33
Play Video: Responsibilities
37. Responsibilities
01:48
Play Video: Senior Management Commitment Part1
38. Senior Management Commitment Part1
00:48
Play Video: Senior Management Commitment Part2
39. Senior Management Commitment Part2
02:27
Play Video: Obtaining Senior Management Commitment Part1
40. Obtaining Senior Management Commitment Part1
00:24
Play Video: Obtaining Senior Management Commitment Part2
41. Obtaining Senior Management Commitment Part2
00:53
Play Video: Establishing Reporting and Communication Channels Part1
42. Establishing Reporting and Communication Channels Part1
01:13
Play Video: Establishing Reporting and Communication Channels Part2
43. Establishing Reporting and Communication Channels Part2
01:07
Play Video: Lesson 5: Scope and Charter of Information Security Governance
44. Lesson 5: Scope and Charter of Information Security Governance
01:55
Play Video: Assurance Process Integration and Convergence
45. Assurance Process Integration and Convergence
02:24
Play Video: Convergence
46. Convergence
02:32
Play Video: Governance and Third-Party Relationships
47. Governance and Third-Party Relationships
02:38
Play Video: Lesson 6: Information Security Governance Metrics
48. Lesson 6: Information Security Governance Metrics
00:56
Play Video: Metrics
49. Metrics
01:39
Play Video: Effective Security Metrics Part1
50. Effective Security Metrics Part1
01:46
Play Video: Effective Security Metrics Part2
51. Effective Security Metrics Part2
01:01
Play Video: Effective Security Metrics Part3
52. Effective Security Metrics Part3
01:51
Play Video: Effective Security Metrics Part4
53. Effective Security Metrics Part4
00:39
Play Video: Security Implementation Metrics
54. Security Implementation Metrics
01:17
Play Video: Strategic Alignment Part1
55. Strategic Alignment Part1
02:56
Play Video: Strategic Alignment Part2
56. Strategic Alignment Part2
01:11
Play Video: Risk Management
57. Risk Management
01:14
Play Video: Value Delivery
58. Value Delivery
01:02
Play Video: Resource Management Part1
59. Resource Management Part1
00:47
Play Video: Resource Management Part2
60. Resource Management Part2
00:41
Play Video: Performance Measurement
61. Performance Measurement
03:06
Play Video: Assurance Process Integration/Convergence
62. Assurance Process Integration/Convergence
02:54
Play Video: Lesson 7: Information Security Strategy Overview
63. Lesson 7: Information Security Strategy Overview
00:53
Play Video: Another View of Strategy
64. Another View of Strategy
00:41
Play Video: Lesson 8: Creating Information Security Strategy
65. Lesson 8: Creating Information Security Strategy
00:16
Play Video: Information Security Strategy
66. Information Security Strategy
01:22
Play Video: Common Pitfalls Part1
67. Common Pitfalls Part1
04:38
Play Video: Common Pitfalls Part2
68. Common Pitfalls Part2
02:19
Play Video: Objectives of the Information Security Strategy
69. Objectives of the Information Security Strategy
01:33
Play Video: What is the Goal?
70. What is the Goal?
01:40
Play Video: Defining Objectives
71. Defining Objectives
01:23
Play Video: Business Linkages
72. Business Linkages
01:48
Play Video: Business Case Development Part1
73. Business Case Development Part1
01:44
Play Video: Business Case Development Part2
74. Business Case Development Part2
02:36
Play Video: Business Case Development Part3
75. Business Case Development Part3
00:45
Play Video: Business Case Objectives
76. Business Case Objectives
00:57
Play Video: The Desired State
77. The Desired State
01:48
Play Video: COBIT
78. COBIT
01:08
Play Video: COBIT Controls
79. COBIT Controls
01:09
Play Video: COBIT Framework
80. COBIT Framework
00:48
Play Video: Capability Maturity Model
81. Capability Maturity Model
01:38
Play Video: Balanced Scorecard
82. Balanced Scorecard
01:22
Play Video: Architectural Approaches
83. Architectural Approaches
01:03
Play Video: ISO/IEC 27001 and 27002
84. ISO/IEC 27001 and 27002
01:00
Play Video: Risk Objectives Part1
85. Risk Objectives Part1
01:39
Play Video: Risk Objectives Part2
86. Risk Objectives Part2
03:11
Play Video: Lesson 9: Determining Current State Of Security
87. Lesson 9: Determining Current State Of Security
00:45
Play Video: Current Risk Part1
88. Current Risk Part1
02:37
Play Video: Current Risk Part2
89. Current Risk Part2
01:11
Play Video: BIA
90. BIA
01:11
Play Video: Lesson 10: Information Security Strategy Development
91. Lesson 10: Information Security Strategy Development
01:52
Play Video: The Roadmap
92. The Roadmap
01:01
Play Video: Elements of a Strategy
93. Elements of a Strategy
03:27
Play Video: Strategy Resources and Constraints
94. Strategy Resources and Constraints
02:46
Play Video: Lesson 11: Strategy Resources
95. Lesson 11: Strategy Resources
00:32
Play Video: Policies and Standards
96. Policies and Standards
01:01
Play Video: Definitions
97. Definitions
05:48
Play Video: Enterprise Information Security Architectures
98. Enterprise Information Security Architectures
01:30
Play Video: Controls
99. Controls
03:00
Play Video: Countermeasures
100. Countermeasures
00:55
Play Video: Technologies
101. Technologies
01:50
Play Video: Personnel
102. Personnel
01:54
Play Video: Organizational Structure
103. Organizational Structure
03:47
Play Video: Employee Roles and Responsibilities
104. Employee Roles and Responsibilities
00:28
Play Video: Skills
105. Skills
01:17
Play Video: Audits
106. Audits
01:41
Play Video: Compliance Enforcement
107. Compliance Enforcement
02:24
Play Video: Threat Assessment
108. Threat Assessment
01:41
Play Video: Vulnerability Assessment
109. Vulnerability Assessment
02:21
Play Video: Risk Assessment
110. Risk Assessment
02:19
Play Video: Insurance
111. Insurance
02:04
Play Video: Business Impact Assessment
112. Business Impact Assessment
02:32
Play Video: Outsourced Security Providers
113. Outsourced Security Providers
02:57
Play Video: Lesson 12: Strategy Constraints
114. Lesson 12: Strategy Constraints
00:23
Play Video: Legal and Regulatory Requirements
115. Legal and Regulatory Requirements
01:43
Play Video: Physical Constraints
116. Physical Constraints
02:56
Play Video: The Security Strategy
117. The Security Strategy
01:36
Play Video: Lesson 13: Action Plan to Implement Strategy
118. Lesson 13: Action Plan to Implement Strategy
01:13
Play Video: Gap Analysis Part1
119. Gap Analysis Part1
01:35
Play Video: Gap Analysis Part2
120. Gap Analysis Part2
00:52
Play Video: Gap Analysis Part3
121. Gap Analysis Part3
03:01
Play Video: Policy Development Part1
122. Policy Development Part1
01:42
Play Video: Policy Development Part2
123. Policy Development Part2
01:00
Play Video: Standards Development
124. Standards Development
02:45
Play Video: Training and Awareness
125. Training and Awareness
00:35
Play Video: Action Plan Metrics
126. Action Plan Metrics
01:23
Play Video: General Metric Considerations Part1
127. General Metric Considerations Part1
00:23
Play Video: General Metric Considerations Part2
128. General Metric Considerations Part2
00:35
Play Video: General Metric Considerations Part3
129. General Metric Considerations Part3
00:43
Play Video: General Metric Considerations Part4
130. General Metric Considerations Part4
00:23
Play Video: CMM4 Statements
131. CMM4 Statements
02:00
Play Video: Objectives for CMM4
132. Objectives for CMM4
00:47
Play Video: Domain 01 Review
133. Domain 01 Review
00:44
Name of Video Time
Play Video: Lesson 1: Risk Management Overview
1. Lesson 1: Risk Management Overview
00:59
Play Video: Risk Management Overview
2. Risk Management Overview
01:51
Play Video: Types of Risk Analysis
3. Types of Risk Analysis
07:08
Play Video: The Importance of Risk Management
4. The Importance of Risk Management
02:14
Play Video: Risk Management Outcomes
5. Risk Management Outcomes
01:35
Play Video: Risk Management Strategy
6. Risk Management Strategy
01:49
Play Video: Lesson 2: Good Information Security Risk Management
7. Lesson 2: Good Information Security Risk Management
04:14
Play Video: Context and Purpose
8. Context and Purpose
03:08
Play Video: Scope and Charter
9. Scope and Charter
00:39
Play Video: Assets
10. Assets
02:31
Play Video: Other Risk Management Goals
11. Other Risk Management Goals
02:02
Play Video: Roles and Responsibilities
12. Roles and Responsibilities
02:52
Play Video: Lesson 3: Information Security Risk Management Concepts
13. Lesson 3: Information Security Risk Management Concepts
06:06
Play Video: Technologies
14. Technologies
06:39
Play Video: Lesson 4: Implementing Risk Management
15. Lesson 4: Implementing Risk Management
02:08
Play Video: The Risk Management Framework
16. The Risk Management Framework
02:00
Play Video: The External Environment
17. The External Environment
01:48
Play Video: The Internal Environment
18. The Internal Environment
02:07
Play Video: The Risk Management Context
19. The Risk Management Context
00:47
Play Video: Gap Analysis
20. Gap Analysis
02:21
Play Video: Other Organizational Support
21. Other Organizational Support
04:09
Play Video: Risk Analysis
22. Risk Analysis
01:22
Play Video: Lesson 5: Risk Assessment
23. Lesson 5: Risk Assessment
01:19
Play Video: NIST Risk Assessment Methodology
24. NIST Risk Assessment Methodology
03:49
Play Video: Aggregated or Cascading Risk
25. Aggregated or Cascading Risk
02:54
Play Video: Other Risk Assessment Approaches
26. Other Risk Assessment Approaches
01:18
Play Video: Identification of Risks
27. Identification of Risks
01:49
Play Video: Threats
28. Threats
01:08
Play Video: Vulnerabilities Part1
29. Vulnerabilities Part1
02:11
Play Video: Vulnerabilities Part2
30. Vulnerabilities Part2
04:10
Play Video: Risks
31. Risks
01:36
Play Video: Analysis of Relevant Risks
32. Analysis of Relevant Risks
01:48
Play Video: Risk Analysis
33. Risk Analysis
02:29
Play Video: Semi -Quantitative Analysis
34. Semi -Quantitative Analysis
01:52
Play Video: Quantitative Analysis Example
35. Quantitative Analysis Example
04:14
Play Video: Evaluation of Risks
36. Evaluation of Risks
00:46
Play Video: Risk Treatment Options
37. Risk Treatment Options
04:39
Play Video: Impact
38. Impact
02:59
Play Video: Lesson 6: Controls Countermeasures
39. Lesson 6: Controls Countermeasures
00:25
Play Video: Controls
40. Controls
04:43
Play Video: Residual Risk
41. Residual Risk
03:38
Play Video: Information Resource Valuation
42. Information Resource Valuation
01:33
Play Video: Methods of Valuing Assets
43. Methods of Valuing Assets
01:36
Play Video: Information Asset Classification
44. Information Asset Classification
03:32
Play Video: Determining Classification
45. Determining Classification
02:05
Play Video: Impact Part1
46. Impact Part1
03:53
Play Video: Impact Part2
47. Impact Part2
01:03
Play Video: Lesson 7: Recovery Time Objectives
48. Lesson 7: Recovery Time Objectives
00:49
Play Video: Recovery Point Objectives
49. Recovery Point Objectives
04:18
Play Video: Service Delivery Objectives
50. Service Delivery Objectives
01:58
Play Video: Third-Party Service Providers
51. Third-Party Service Providers
01:44
Play Video: Working with Lifecycle Processes
52. Working with Lifecycle Processes
02:08
Play Video: IT System Development
53. IT System Development
02:12
Play Video: Project Management Part1
54. Project Management Part1
00:47
Play Video: Project Management Part2
55. Project Management Part2
02:10
Play Video: Lesson 8: Risk Monitoring and Communication
56. Lesson 8: Risk Monitoring and Communication
01:17
Play Video: Risk Monitoring and Communication
57. Risk Monitoring and Communication
00:38
Play Video: Other Communications
58. Other Communications
01:25
Play Video: Domain 02 Review
59. Domain 02 Review
01:01
Name of Video Time
Play Video: Introduction
1. Introduction
00:31
Play Video: Lesson 1: Development of Information Security Program
2. Lesson 1: Development of Information Security Program
02:50
Play Video: Importance of the Program
3. Importance of the Program
00:52
Play Video: Outcomes of Security Program Development
4. Outcomes of Security Program Development
01:47
Play Video: Effective Information Security Program Development
5. Effective Information Security Program Development
04:59
Play Video: Lesson 2: Information Security Program Objectives
6. Lesson 2: Information Security Program Objectives
00:10
Play Video: Cross Organizational Responsibilities
7. Cross Organizational Responsibilities
01:55
Play Video: Program Objectives Part1
8. Program Objectives Part1
02:23
Play Video: Program Objectives Part2
9. Program Objectives Part2
01:18
Play Video: Defining Objectives Part1
10. Defining Objectives Part1
02:11
Play Video: Defining Objectives Part2
11. Defining Objectives Part2
01:08
Play Video: Lesson 3: Information Security Program Development Concepts Part1
12. Lesson 3: Information Security Program Development Concepts Part1
04:02
Play Video: Information Security Program Development Concepts Part2
13. Information Security Program Development Concepts Part2
05:39
Play Video: Technology Resources
14. Technology Resources
02:44
Play Video: Information Security Manager
15. Information Security Manager
01:25
Play Video: Lesson 4: Scope and Charter of Information Security Program Development
16. Lesson 4: Scope and Charter of Information Security Program Development
00:30
Play Video: Assurance Function Integration
17. Assurance Function Integration
01:35
Play Video: Challenges in Developing Information Security Program
18. Challenges in Developing Information Security Program
01:54
Play Video: Pitfalls
19. Pitfalls
02:48
Play Video: Objectives of the Security Program
20. Objectives of the Security Program
02:06
Play Video: Program Goals
21. Program Goals
02:52
Play Video: The Steps of the Security Program
22. The Steps of the Security Program
01:46
Play Video: Defining the Roadmap Part1
23. Defining the Roadmap Part1
01:38
Play Video: Defining the Roadmap Part2
24. Defining the Roadmap Part2
00:58
Play Video: Elements of the Roadmap Part1
25. Elements of the Roadmap Part1
01:18
Play Video: Elements of the Roadmap Part2
26. Elements of the Roadmap Part2
00:34
Play Video: Elements of the Roadmap Part3
27. Elements of the Roadmap Part3
01:57
Play Video: Elements of the Roadmap Part4
28. Elements of the Roadmap Part4
01:17
Play Video: Elements of the Roadmap Part5
29. Elements of the Roadmap Part5
00:18
Play Video: Gap Analysis
30. Gap Analysis
00:44
Play Video: Lesson 5: Information Security Management Framework
31. Lesson 5: Information Security Management Framework
00:15
Play Video: Security Management Framework
32. Security Management Framework
04:55
Play Video: COBIT 5
33. COBIT 5
05:59
Play Video: ISO/IEC 27001
34. ISO/IEC 27001
04:30
Play Video: Lesson 6: Information Security Framework Components
35. Lesson 6: Information Security Framework Components
00:13
Play Video: Operational Components Part1
36. Operational Components Part1
01:56
Play Video: Operational Components Part2
37. Operational Components Part2
03:11
Play Video: Management Components
38. Management Components
01:31
Play Video: Administrative Components
39. Administrative Components
03:30
Play Video: Educational and Informational Components
40. Educational and Informational Components
01:26
Play Video: Lesson 7: Information Security Program Resources
41. Lesson 7: Information Security Program Resources
01:32
Play Video: Resources
42. Resources
03:27
Play Video: Documentation
43. Documentation
00:54
Play Video: Enterprise Architecture Part1
44. Enterprise Architecture Part1
04:29
Play Video: Enterprise Architecture Part2
45. Enterprise Architecture Part2
01:54
Play Video: Enterprise Architecture Part3
46. Enterprise Architecture Part3
01:11
Play Video: Controls as Strategy Implementation Resources Part1
47. Controls as Strategy Implementation Resources Part1
03:42
Play Video: Controls as Strategy Implementation Resources Part2
48. Controls as Strategy Implementation Resources Part2
02:20
Play Video: Controls as Strategy Implementation Resources Part3
49. Controls as Strategy Implementation Resources Part3
04:35
Play Video: Controls as Strategy Implementation Resources Part4
50. Controls as Strategy Implementation Resources Part4
02:19
Play Video: Common Control Practices
51. Common Control Practices
01:41
Play Video: Countermeasures
52. Countermeasures
00:37
Play Video: Technologies Part1
53. Technologies Part1
01:13
Play Video: Technologies Part2
54. Technologies Part2
01:52
Play Video: Technologies Part3
55. Technologies Part3
01:39
Play Video: Technologies Part4
56. Technologies Part4
05:38
Play Video: Personnel Part1
57. Personnel Part1
02:00
Play Video: Personnel Part2
58. Personnel Part2
02:56
Play Video: Security Awareness
59. Security Awareness
01:28
Play Video: Awareness Topics
60. Awareness Topics
05:18
Play Video: Formal Audits
61. Formal Audits
01:16
Play Video: Compliance Enforcement
62. Compliance Enforcement
01:03
Play Video: Project Risk Analysis
63. Project Risk Analysis
03:09
Play Video: Other Actions
64. Other Actions
02:58
Play Video: Other Organizational Support
65. Other Organizational Support
01:21
Play Video: Program Budgeting Part1
66. Program Budgeting Part1
01:03
Play Video: Program Budgeting Part2
67. Program Budgeting Part2
02:19
Play Video: Lesson 8: Implementing an Information Security Program
68. Lesson 8: Implementing an Information Security Program
00:13
Play Video: Policy Compliance
69. Policy Compliance
02:38
Play Video: Standards Compliance
70. Standards Compliance
02:44
Play Video: Training and Education
71. Training and Education
01:43
Play Video: ISACA Control Objectives
72. ISACA Control Objectives
03:52
Play Video: Third-party Service Providers Part1
73. Third-party Service Providers Part1
01:08
Play Video: Third-party Service Providers Part2
74. Third-party Service Providers Part2
04:22
Play Video: Integration into Lifecycle Processes
75. Integration into Lifecycle Processes
02:14
Play Video: Monitoring and Communication
76. Monitoring and Communication
03:33
Play Video: Documentation
77. Documentation
01:33
Play Video: The Plan of Action Part1
78. The Plan of Action Part1
01:17
Play Video: The Plan of Action Part2
79. The Plan of Action Part2
01:36
Play Video: Lesson 9: Information Infrastructure and Architecture
80. Lesson 9: Information Infrastructure and Architecture
00:53
Play Video: Managing Complexity Part1
81. Managing Complexity Part1
04:42
Play Video: Managing Complexity Part2
82. Managing Complexity Part2
01:45
Play Video: Objectives of Information Security Architectures Part1
83. Objectives of Information Security Architectures Part1
01:30
Play Video: Objectives of Information Security Architectures Part2
84. Objectives of Information Security Architectures Part2
01:15
Play Video: Physical and Environmental Controls
85. Physical and Environmental Controls
03:32
Play Video: Lesson 10: Information Security Program
86. Lesson 10: Information Security Program
03:03
Play Video: Information Security Program Deployment Metrics
87. Information Security Program Deployment Metrics
02:27
Play Video: Metrics
88. Metrics
02:02
Play Video: Strategic Alignment
89. Strategic Alignment
00:53
Play Video: Risk Management
90. Risk Management
01:41
Play Video: Value Delivery
91. Value Delivery
00:35
Play Video: Resource Management
92. Resource Management
01:23
Play Video: Assurance Process Integration
93. Assurance Process Integration
00:27
Play Video: Performance Measurement
94. Performance Measurement
00:41
Play Video: Security Baselines
95. Security Baselines
00:38
Play Video: Lesson 11: Security Program Services and Operational Activities
96. Lesson 11: Security Program Services and Operational Activities
00:48
Play Video: IS Liaison Responsibilities Part1
97. IS Liaison Responsibilities Part1
10:17
Play Video: IS Liaison Responsibilities Part2
98. IS Liaison Responsibilities Part2
02:28
Play Video: Cross-Organizational Responsibilities
99. Cross-Organizational Responsibilities
01:34
Play Video: Security Reviews and Audits Part1
100. Security Reviews and Audits Part1
03:27
Play Video: Security Reviews and Audits Part2
101. Security Reviews and Audits Part2
01:38
Play Video: Management of Security Technology
102. Management of Security Technology
01:25
Play Video: Due Diligence Part1
103. Due Diligence Part1
04:10
Play Video: Due Diligence Part2
104. Due Diligence Part2
01:36
Play Video: Compliance Monitoring and Enforcement Part1
105. Compliance Monitoring and Enforcement Part1
02:02
Play Video: Compliance Monitoring and Enforcement Part2
106. Compliance Monitoring and Enforcement Part2
01:46
Play Video: Assessment of Risk and Impact Part1
107. Assessment of Risk and Impact Part1
02:17
Play Video: Assessment of Risk and Impact Part2
108. Assessment of Risk and Impact Part2
01:28
Play Video: Outsourcing and Service Providers
109. Outsourcing and Service Providers
02:33
Play Video: Cloud Computing Part1
110. Cloud Computing Part1
01:37
Play Video: Cloud Computing Part2
111. Cloud Computing Part2
01:54
Play Video: Cloud Computing Part3
112. Cloud Computing Part3
02:23
Play Video: Integration with IT Processes
113. Integration with IT Processes
00:42
Play Video: Domain 03 Review
114. Domain 03 Review
01:13
Name of Video Time
Play Video: Lesson 1: Incident Management Overview Part1
1. Lesson 1: Incident Management Overview Part1
00:47
Play Video: Incident Management Overview Part2
2. Incident Management Overview Part2
03:08
Play Video: Incident Management Overview Part3
3. Incident Management Overview Part3
03:45
Play Video: Types of Events Part1
4. Types of Events Part1
02:44
Play Video: Types of Events Part2
5. Types of Events Part2
03:20
Play Video: Goals of Incident Management Part1
6. Goals of Incident Management Part1
04:45
Play Video: Goals of Incident Management Part2
7. Goals of Incident Management Part2
06:31
Play Video: Goals of Incident Management Part3
8. Goals of Incident Management Part3
03:26
Play Video: Lesson 2: Incident Response Procedures Part1
9. Lesson 2: Incident Response Procedures Part1
00:23
Play Video: Incident Response Procedures Part2
10. Incident Response Procedures Part2
03:40
Play Video: Importance of Incident Management
11. Importance of Incident Management
08:01
Play Video: Outcomes of Incident Management
12. Outcomes of Incident Management
03:50
Play Video: Incident Management
13. Incident Management
01:35
Play Video: Concepts Part1
14. Concepts Part1
03:44
Play Video: Concepts Part2
15. Concepts Part2
01:35
Play Video: Concepts Part3
16. Concepts Part3
01:34
Play Video: Incident Management Systems Part1
17. Incident Management Systems Part1
04:02
Play Video: Incident Management Systems Part2
18. Incident Management Systems Part2
00:53
Play Video: Lesson 3: Incident Management Organization
19. Lesson 3: Incident Management Organization
02:31
Play Video: Responsibilities Part1
20. Responsibilities Part1
03:44
Play Video: Responsibilities Part2
21. Responsibilities Part2
02:58
Play Video: Responsibilities Part3
22. Responsibilities Part3
05:10
Play Video: Senior Management Commitment
23. Senior Management Commitment
01:02
Play Video: Lesson 4: Incident Management Resources
24. Lesson 4: Incident Management Resources
00:25
Play Video: Policies and Standards
25. Policies and Standards
00:36
Play Video: Incident Response Technology Concepts
26. Incident Response Technology Concepts
11:12
Play Video: Personnel
27. Personnel
03:11
Play Video: Roles and Responsibilities (eNotes)
28. Roles and Responsibilities (eNotes)
08:24
Play Video: Skills
29. Skills
08:09
Play Video: Awareness and Education
30. Awareness and Education
01:20
Play Video: Audits
31. Audits
02:49
Play Video: Lesson 5: Incident Management Objectives
32. Lesson 5: Incident Management Objectives
00:17
Play Video: Defining Objectives
33. Defining Objectives
00:48
Play Video: The Desired State
34. The Desired State
03:29
Play Video: Strategic Alignment
35. Strategic Alignment
06:42
Play Video: Other Concerns
36. Other Concerns
02:33
Play Video: Lesson 6: Incident Management Metrics and Indicators
37. Lesson 6: Incident Management Metrics and Indicators
05:14
Play Video: Implementation of the Security Program Management
38. Implementation of the Security Program Management
03:01
Play Video: Management Metrics and Monitoring Part1
39. Management Metrics and Monitoring Part1
01:35
Play Video: Management Metrics and Monitoring Part2
40. Management Metrics and Monitoring Part2
02:48
Play Video: Other Security Monitoring Efforts
41. Other Security Monitoring Efforts
04:24
Play Video: Lesson 7: Current State of Incident Response Capability
42. Lesson 7: Current State of Incident Response Capability
00:11
Play Video: Threats
43. Threats
04:39
Play Video: Vulnerabilities
44. Vulnerabilities
06:15
Play Video: Lesson 8: Developing an Incident Response Plan
45. Lesson 8: Developing an Incident Response Plan
00:44
Play Video: Elements of an Incident Response Plan
46. Elements of an Incident Response Plan
08:19
Play Video: Gap Analysis
47. Gap Analysis
03:05
Play Video: BIA Part1
48. BIA Part1
05:05
Play Video: BIA Part2
49. BIA Part2
02:48
Play Video: Escalation Process for Effective IM
50. Escalation Process for Effective IM
02:45
Play Video: Help Desk Processes for Identifying Security Incidents
51. Help Desk Processes for Identifying Security Incidents
01:27
Play Video: Incident Management and Response Teams
52. Incident Management and Response Teams
02:10
Play Video: Organizing, Training, and Equipping the Response Staff
53. Organizing, Training, and Equipping the Response Staff
01:55
Play Video: Incident Notification Process
54. Incident Notification Process
00:55
Play Video: Challenges in making an Incident Management Plan
55. Challenges in making an Incident Management Plan
02:18
Play Video: Lesson 9: BCP/DRP
56. Lesson 9: BCP/DRP
07:49
Play Video: Goals of Recovery Operations Part1
57. Goals of Recovery Operations Part1
02:02
Play Video: Goals of Recovery Operations Part2
58. Goals of Recovery Operations Part2
01:57
Play Video: Choosing a Site Selection Part1
59. Choosing a Site Selection Part1
05:37
Play Video: Choosing a Site Selection Part2
60. Choosing a Site Selection Part2
01:18
Play Video: Implementing the Strategy
61. Implementing the Strategy
03:58
Play Video: Incident Management Response Teams
62. Incident Management Response Teams
02:10
Play Video: Network Service High-availability
63. Network Service High-availability
04:17
Play Video: Storage High-availability
64. Storage High-availability
04:01
Play Video: Risk Transference
65. Risk Transference
01:27
Play Video: Other Response Recovery Plan Options
66. Other Response Recovery Plan Options
01:29
Play Video: Lesson 10: Testing Response and Recovery Plans
67. Lesson 10: Testing Response and Recovery Plans
02:17
Play Video: Periodic Testing
68. Periodic Testing
01:17
Play Video: Analyzing Test Results Part1
69. Analyzing Test Results Part1
02:06
Play Video: Analyzing Test Results Part2
70. Analyzing Test Results Part2
03:39
Play Video: Measuring the Test Results
71. Measuring the Test Results
00:58
Play Video: Lesson 11: Executing the Plan
72. Lesson 11: Executing the Plan
01:56
Play Video: Updating the Plan
73. Updating the Plan
01:15
Play Video: Intrusion Detection Policies
74. Intrusion Detection Policies
01:38
Play Video: Who to Notify about an Incident
75. Who to Notify about an Incident
01:52
Play Video: Recovery Operations
76. Recovery Operations
01:53
Play Video: Other Recovery Operations
77. Other Recovery Operations
01:57
Play Video: Forensic Investigation
78. Forensic Investigation
03:05
Play Video: Hacker / Penetration Methodology
79. Hacker / Penetration Methodology
11:50
Play Video: Domain 04 Review
80. Domain 04 Review
01:15
Play Video: Course Closure
81. Course Closure
00:34

Isaca CISM Exam Dumps, Practice Test Questions

100% Latest & Updated Isaca CISM Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!

Isaca CISM Premium Bundle
$69.97
$49.99

CISM Premium Bundle

  • Premium File: 519 Questions & Answers. Last update: Dec 16, 2024
  • Training Course: 388 Video Lectures
  • Study Guide: 817 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

CISM Premium Bundle

Isaca CISM Premium Bundle
  • Premium File: 519 Questions & Answers. Last update: Dec 16, 2024
  • Training Course: 388 Video Lectures
  • Study Guide: 817 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$69.97
$49.99

Free CISM Exam Questions & CISM Dumps

File Name Size Votes
File Name
isaca.pass4sure.cism.v2024-10-30.by.alexander.1105q.vce
Size
1.99 MB
Votes
1
File Name
isaca.train4sure.cism.v2021-12-31.by.lucy.1091q.vce
Size
1.41 MB
Votes
1
File Name
isaca.test-king.cism.v2021-11-30.by.annabelle.1009q.vce
Size
1.31 MB
Votes
1
File Name
isaca.test-king.cism.v2021-06-05.by.grace.955q.vce
Size
1.26 MB
Votes
1
File Name
isaca.selftesttraining.cism.v2021-02-12.by.elijah.954q.vce
Size
1.29 MB
Votes
2

Isaca CISM Training Course

Want verified and proven knowledge for Certified Information Security Manager? Believe it's easy when you have ExamSnap's Certified Information Security Manager certification video training course by your side which along with our Isaca CISM Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.

Domain 01 - Information Security Governance

75. Business Case Development Part3

Now, a business case should be evaluated and reviewed to be able to determine if it actually has value and importance, or is it just some kind of cool fad? That sounds like a good idea. The case should be reviewed to determine if it will be managed properly. Can the benefits really be delivered? Are there dedicated resources we can use in achieving this business case? Are there interdependent projects being undertaken that need to be done in the correct sequence? Again, a business case might be an idea based on our achieving other objectives. And so we have to ask that question: are those other sorts of reporting projects going to be done? Are they being undertaken? Will it be finished so we can move forward with this next case that we're talking about?

76. Business Case Objectives

The business case process should be one that's adaptable, meaning it should be tailored to the size and risk of the proposal. There should be some consistency. The same basic business issues should be addressed by each project. It should be business-oriented concerning the business's capabilities and the impact on the business. Your business case process should be comprehensive. It should include all relevant factors for the proper evaluation of the business case. It certainly needs to be understandable. It needs to be relevant, logical, and simple to be able to evaluate. It needs to be measurable. At the very least, key elements of it should be quantifiable. The transparency of the case means that the key elements should be justified directly, not through a bunch of roundabout ways of reasoning to get to a certain point. And of course, there has to be accountability where the costs are clearer. Bye.

77. The Desired State

Now in the goal of our strategies, we said, "Of course, there needs to be a goal, right?" There has to be a target. We just don't do these things ad hoc. We want to get to a certain objective, and we often call that the desired state. Now, the desired state is really a reference to a snapshot of conditions at a particular point in the future. So the state of security can't necessarily be quantitatively defined. Therefore, to get to those states, we have to sometimes put them in qualitative terms regarding some of the attributes or characteristics or outcomes. In other words, I might say, "Look, we're being hit 150 times an hour with a port scan." So if we put in an intrusion detection system, which by the way, could or could not work, I'm just throwing that out as an example that we're going to say we're going to go from 15,000 down to 5000. You know what, I can't quantitatively say that. In fact, you never know, we may suddenly come under the attack of a group of people from overseas that have just picked us randomly. I mean, I can't do that, but I can quantitatively look at some of the attributes, such as how many of these port scans are getting through the network, what are the characteristics of the traffic, and the outcomes of putting it in? Am I getting fewer intrusions or less attacks against my servers? Again, I can't give you a quantified number of how many fewer, but we can look at it qualitatively and see if we're meeting some of those goals. Now we do want to try to make these as well defined as possible, but it is an important process to remember that we can't promise quantitatively the actual dollar amounts of savings or the numbers of things, but we can describe what the conditions of that desired state are. And that was done again through the attributes, characteristics, and what the eventual outcomes should be.

78. COBIT

COBIT focuses on its related processes from governance, management, and control perspectives. COBIT has a framework of supporting tools to be able to help you bridge the gap between technical issues and business risks. Now, with regards to what we're doing with CIS, the controlled objectives and procedures should extend beyond IT activities to include any activity that could impact information security. So what are we talking about here? As we're building up these strategies and we're looking for frameworks, it's important to remember that we don't necessarily want to focus on just IT-related processes where Cobett has a great framework for doing that. The goal of CIS M is to take a larger view of the architecture, as we said. And that is, again, remembering the data from its entire life cycle, from when it was first created or first entered, being transmitted, how it's being stored, how it's being reviewed. reviewed for accuracy all of these little pieces or places where the data could be touched. We kind of want to look at it from that aspect.

79. COBIT Controls

COBIT controls are typically defined as policies or procedures, practices, and organisational structures that are intended to provide some reasonable assurance that business objectives are met. COVID will define your enterprise governance as a set of responsibilities and practise offices that are exercised by the board and executive management. Now, again, what are we talking about? Controls are ways in which we try to deal with risk management. And yes, policies that sound like written pieces of paper, in fact do act as controls, as do the procedures that make up the purview of those policies. What we want you to do, the way we define practices, how the organisation is structured, all of that works together to be able to exercise control over the security of your assets. Now, some of those procedures, some of those policies may certainly talk about different applications of countermeasures or acceptable use or physical security, but they all fall under the guidelines of controls.

Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap Certified Information Security Manager certification video training course that goes in line with the corresponding Isaca CISM exam dumps, study guide, and practice test questions & answers.

Comments (5)

Add Comment

Please post your comments about CISM Exams. Don't share your email address asking for CISM braindumps or CISM exam pdf files.

  • ROWLAND
  • United Arab Emirates
  • Dec 01, 2024

Wow! The course does not leave anyone behind thinking of what to do to understand these concepts. The instructor has considered all my colleagues without favor. I strongly believe we all will be scored highly.

  • {milo}
  • Canada
  • Nov 13, 2024

great! I have just helped my boss to protect his computer from other devices accessing his data whenever he connects to a WLAN network and now the issue is sorted.

  • Anirudth Noli
  • United States
  • Oct 26, 2024

I think the instructor should try to be audible enough in his speech. Sometimes it is hard to get some terms. I know that is a little adjustment to be made within no time. Still, in general the course is very helpful. Thanks!

  • Jalil
  • Germany
  • Oct 07, 2024

these course has enlightened me with so many concepts that I have always desired to know in my life as a computer scientist. I fully recommend this course to anyone out there.

  • garfild
  • Puerto Rico
  • Sep 20, 2024

CIA. I was ignorant about the meaning of this abbreviated text before. once I was thinking about the FBI agents learning the course but later realized that these are information security triads!

Add Comment

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.