Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Information Security Manager (CISM)
New section
1. CISM Course Introduction (2:14)
1. CISM Course Introduction (2:14)
10. Due Care and Due Diligence (7:27)
11. Determine compliance requirements (8:38)
12. Understand legal and regulatory issues (2:54)
13. Risk Management (10:51)
14. Qualitative vs Quantitively Assessment (8:22)
15. Risks Formula (11:40)
16. Risk Management Strategies (10:12)
17. Security Controls (6:29)
18. Nist 800-37 (2:18)
19. Risk Register (1:17)
2. CISM Certification (2:45)
20. Security Policy Framework (24:53)
21. Resources CIS (4:17)
22. The Relationship Between Security Document Types (3:42)
23. Identify, analyze, and prioritize Business Continuity (BC) requirements (8:17)
24. BCP Phases (12:00)
25. Business Impact Analysis - BIA (10:41)
26. NIST SP 800-34 (8:06)
27. MTD-RTO-RPO- (11:29)
28. Business Continuity Controls (9:41)
29. High availability and Fault Tolerance (11:28)
3. CISM Exam (4:38)
30. Incident Management (5:24)
31. Incident Report (5:33)
32. Backup (5:59)
33. Alternative Sites (8:09)
4. CISM Course Outline (4:14)
5. CISM vs CISSP (2:49)
6.Evaluate and apply security governance principles (8:11)
7.NIST 800-100 (7:28)
8.Security Governance – Requirements (7:28)
9.The Organizational Culture-s (11:06)
Teach online with
22. The Relationship Between Security Document Types
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock