Companies Home Search Profile

Certified Information Security Manager (CISM)

Focused View

13:50:47

15 View
  • 001. Course Overview.mp4
    05:33
  • 002. Enterprise Governance.mp4
    25:15
  • 003. Organizational Culture.mp4
    16:29
  • 004. Legal Regulatory and Contractual Requirements.mp4
    20:51
  • 005. Organizational Structures Roles and Responsibilities.mp4
    24:02
  • 006. Information Security Strategy Development.mp4
    21:48
  • 007. Information Governance Frameworks and Standards.mp4
    20:50
  • 008. Strategic Planning.mp4
    17:04
  • 009. Information Security Governance - Key Points.mp4
    18:25
  • 001. Information Security Risk Assessment.mp4
    19:25
  • 002. Emerging Risk and Threat Landscape.mp4
    22:32
  • 003. Vulnerability and Control Deficiency Analysis.mp4
    16:32
  • 004. Risk Assessment and Analysis - Background.mp4
    24:15
  • 005. Risk Assessment and Analysis - Scenarios.mp4
    18:11
  • 006. Risk Assessment and Analysis - Process.mp4
    16:04
  • 007. Risk Assessment and Analysis - Methodologies.mp4
    21:48
  • 008. Risk Assessment and Analysis - Analysis.mp4
    22:38
  • 009. Risk Treatment and Risk Response Options.mp4
    12:45
  • 010. Risk and Control Ownership.mp4
    05:48
  • 011. Risk Monitoring and Reporting.mp4
    08:04
  • 012. Information Security Risk Management - Key Points.mp4
    21:41
  • 001. Information Security Program Overview.mp4
    21:41
  • 002. Information Security Program Resources.mp4
    11:06
  • 003. Information Asset Identification and Classification.mp4
    17:15
  • 004. Standards and Frameworks for Information Security.mp4
    21:03
  • 005. Information Security Policies Procedures and Guidelines.mp4
    10:24
  • 006. Information Security Program Metrics.mp4
    09:19
  • 007. Information Security Control Design and Selection.mp4
    10:24
  • 008. Control Implementation Integration Testing and Evaluation.mp4
    17:40
  • 009. Information Security Awareness and Training.mp4
    08:13
  • 010. Integration with IT Operations - SDLC and DevOps.mp4
    15:41
  • 011. Integration with IT Operations - ITSM.mp4
    20:05
  • 012. Integration with IT Operations - Cloud.mp4
    21:36
  • 013. Management of External Services.mp4
    19:25
  • 014. Information Security Program Communications and Reporting.mp4
    22:11
  • 015. Information Security Program - Key Points.mp4
    16:41
  • 001. Incident Management Readiness.mp4
    20:37
  • 002. Incident Response Plan.mp4
    12:23
  • 003. Business Impact Analysis (BIA).mp4
    16:00
  • 004. Spotlight on BIA Derived Objectives.mp4
    22:39
  • 005. Business Continuity Plan (BCP).mp4
    22:24
  • 006. Disaster Recovery Plan (DRP).mp4
    17:36
  • 007. Incident Classification and Categorization.mp4
    18:01
  • 008. Incident Management Training Testing and Evaluation.mp4
    15:55
  • 009. Incident Management Tools and Techniques.mp4
    12:48
  • 010. Evaluation Containment Communication and Recovery.mp4
    15:33
  • 011. Post-incident Review Practices.mp4
    11:45
  • 012. Incident Management - Key Points.mp4
    22:22
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    We created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
    • language english
    • Training sessions 48
    • duration 13:50:47
    • English subtitles has
    • Release Date 2024/04/29