Companies Home Search Profile

Certified Information Security Manager (CISM) Cert Prep (2022): 1 Information Security Governance

Focused View

Mike Chapple

1:48:52

161 View
  • 01.01-welcome.mp4
    00:42
  • 01.02-what_you_need_to_know.mp4
    00:40
  • 01.03-study_resources.mp4
    01:23
  • 02.01-the_goals_of_information_security.mp4
    02:11
  • 02.02-designing_an_information_security_strategy.mp4
    03:44
  • 02.03-aligning_security_with_the_business.mp4
    03:24
  • 02.04-strategic_influences.mp4
    02:35
  • 02.05-organizational_processes.mp4
    03:13
  • 02.06-security_roles_and_responsibilities.mp4
    02:30
  • 03.01-control_frameworks.mp4
    07:25
  • 03.02-developing_security_baselines.mp4
    04:00
  • 03.03-leveraging_industry_standards.mp4
    03:43
  • 03.04-customizing_security_standards.mp4
    02:14
  • 04.01-developing_a_security_budget.mp4
    03:13
  • 04.02-capital_vs._operational_expenses.mp4
    02:40
  • 04.03-budget_monitoring_and_reporting.mp4
    01:50
  • 05.01-information_security_governance.mp4
    02:31
  • 05.02-security_governance_frameworks.mp4
    01:56
  • 06.01-security_policy_framework.mp4
    04:33
  • 06.02-security_policies.mp4
    04:10
  • 07.01-understanding_data_security.mp4
    03:24
  • 07.02-data_security_policies.mp4
    05:02
  • 07.03-data_security_roles.mp4
    04:11
  • 07.04-data_privacy.mp4
    04:01
  • 07.05-limiting_data_collection.mp4
    02:50
  • 07.06-privileged_access_management.mp4
    02:31
  • 08.01-organizational_structure.mp4
    02:20
  • 08.02-obtaining_leadership_support.mp4
    02:25
  • 09.01-collecting_security_process_data.mp4
    03:19
  • 09.02-management_review_and_approval.mp4
    02:52
  • 09.03-security_metrics.mp4
    03:35
  • 09.04-audits_and_assessments.mp4
    05:14
  • 09.05-control_management.mp4
    02:31
  • 10.01-need_to_know_and_least_privilege.mp4
    02:28
  • 10.02-separation_of_duties_and_responsibilities.mp4
    02:56
  • 11.01-continuing_your_studies.mp4
    00:36
  • Description


    Prepare for the first domain of the Certified Information Security Manager (CISM) exam: Information Security Governance. CISM certification validates your expertise in information security. A key part of that is governance, which ensures your team's work is aligned with business objectives and external requirements. This course covers all the material in the domain, including implementing an information security strategy, developing a governance framework, and integrating that framework into corporate governance practices. Instructor Mike Chapple also covers developing policies, business cases, and other key components of a security governance program.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Mike Chapple
    Mike Chapple
    Instructor's Courses
    Cybersecurity and analytics educator and leader with over 20 years of experience in government, the private sector and higher education. Author of over 30 books, including best-selling study guides from Wiley covering the CISSP, Security+, CISM, CySA+, CIPP/US, and PenTest+ exams. Creator of over 100 cybersecurity and business analytics video courses on LinkedIn Learning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 36
    • duration 1:48:52
    • Release Date 2023/01/31