Companies Home Search Profile

Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program

Focused View

Mike Chapple

5:25:08

236 View
  • 01 - Information security program.mp4
    00:56
  • 02 - What you need to know.mp4
    00:40
  • 03 - Study resources.mp4
    01:23
  • 01 - Scope and charter.mp4
    03:32
  • 02 - Alignment of security and business objectives.mp4
    02:55
  • 03 - Building a security team.mp4
    03:16
  • 04 - Conducting a gap analysis.mp4
    03:12
  • 01 - Improving personnel security.mp4
    02:51
  • 02 - Security in the hiring process.mp4
    03:30
  • 03 - Employee termination process.mp4
    02:38
  • 04 - Employee privacy.mp4
    01:57
  • 05 - Social networking.mp4
    02:56
  • 01 - What is the cloud.mp4
    03:53
  • 02 - Cloud computing roles.mp4
    02:35
  • 03 - Drivers for cloud computing.mp4
    03:17
  • 04 - Virtualization.mp4
    04:48
  • 05 - Cloud activities and the Cloud Reference Architecture.mp4
    02:48
  • 06 - Cloud deployment models.mp4
    02:45
  • 07 - Cloud service categories.mp4
    04:47
  • 08 - Security and privacy concerns in the cloud.mp4
    02:51
  • 01 - Operating system security.mp4
    08:44
  • 02 - Malware prevention.mp4
    06:12
  • 03 - Application management.mp4
    05:23
  • 04 - Host-based network security controls.mp4
    07:44
  • 05 - File integrity monitoring.mp4
    04:49
  • 06 - Data loss prevention.mp4
    05:17
  • 07 - Data encryption.mp4
    05:23
  • 08 - Hardware and firmware security.mp4
    04:38
  • 01 - Mobile device security.mp4
    03:03
  • 02 - Mobile device management.mp4
    06:28
  • 03 - Mobile device tracking.mp4
    03:05
  • 04 - Mobile application security.mp4
    03:54
  • 05 - Mobile security enforcement.mp4
    03:54
  • 06 - Bring your own device (BYOD).mp4
    04:35
  • 07 - Mobile deployment models.mp4
    02:54
  • 01 - Understanding encryption.mp4
    02:49
  • 02 - Symmetric and asymmetric cryptography.mp4
    04:18
  • 03 - Goals of cryptography.mp4
    03:47
  • 04 - Choosing encryption algorithms.mp4
    03:27
  • 05 - The cryptographic lifecycle.mp4
    02:34
  • 06 - Key exchange.mp4
    02:49
  • 07 - Diffie-Hellman.mp4
    04:33
  • 08 - Key escrow.mp4
    02:58
  • 09 - Key stretching.mp4
    01:43
  • 10 - Trust models.mp4
    02:52
  • 11 - PKI and digital certificates.mp4
    04:05
  • 12 - Hash functions.mp4
    07:38
  • 13 - Digital signatures.mp4
    03:51
  • 14 - TLS and SSL.mp4
    05:04
  • 15 - IPsec.mp4
    02:49
  • 16 - Securing common protocols.mp4
    07:58
  • 01 - Site and facility design.mp4
    02:47
  • 02 - Data center environmental controls.mp4
    03:52
  • 03 - Physical access control.mp4
    04:56
  • 04 - Visitor management.mp4
    01:30
  • 05 - Physical security personnel.mp4
    02:12
  • 01 - Routers, switches, and bridges.mp4
    03:06
  • 02 - Firewalls.mp4
    06:07
  • 03 - VPNs and VPN concentrators.mp4
    04:29
  • 04 - Network intrusion detection and prevention.mp4
    05:01
  • 05 - Unified threat management.mp4
    01:57
  • 06 - VLANs and network segmentation.mp4
    01:36
  • 07 - Network access control.mp4
    04:30
  • 08 - Remote network access.mp4
    04:59
  • 01 - Identification, authentication, and authorization.mp4
    03:34
  • 02 - Usernames and access cards.mp4
    03:23
  • 03 - Authentication factors.mp4
    04:35
  • 04 - Biometrics.mp4
    02:42
  • 05 - Multi-factor authentication.mp4
    02:35
  • 06 - Something you have.mp4
    04:24
  • 07 - Understanding account and privilege management.mp4
    03:08
  • 08 - Account types.mp4
    03:52
  • 09 - Account policies.mp4
    03:31
  • 10 - Account monitoring.mp4
    03:17
  • 11 - Privileged access management.mp4
    02:31
  • 12 - Provisioning and deprovisioning.mp4
    03:47
  • 01 - Change management.mp4
    02:21
  • 02 - Configuration management.mp4
    02:31
  • 03 - Physical asset management.mp4
    03:09
  • 01 - Personnel safety.mp4
    02:09
  • 02 - Emergency management.mp4
    02:00
  • 01 - Software platforms.mp4
    02:07
  • 02 - Development methodologies.mp4
    06:35
  • 03 - Maturity models.mp4
    03:36
  • 04 - Operation, maintenance, and change management.mp4
    03:38
  • 05 - Code review.mp4
    02:40
  • 06 - Software testing.mp4
    02:44
  • 07 - Code security tests.mp4
    02:15
  • 08 - Third-party code.mp4
    03:38
  • 01 - Continuing your studies.mp4
    00:36
  • Description


    Prepare to pass the Certified Information Security Manager (CISM) exam. In this course, Mike Chapple details how to best set up, define, and manage an information security program in an organization—concepts that can help you ace the questions in the Information Security Program exam domain. Mike helps you grasp the role of a manager in an information security program and goes over a wide variety of technical, physical, and administrative controls used to safeguard information and systems. Learn how to build your security team and maintain security in the hiring process; approach cloud storage security; secure mobile devices; work with firewalls, VPNs, and VPN concentrators; maintain employee safety; and much more.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Mike Chapple
    Mike Chapple
    Instructor's Courses
    Cybersecurity and analytics educator and leader with over 20 years of experience in government, the private sector and higher education. Author of over 30 books, including best-selling study guides from Wiley covering the CISSP, Security+, CISM, CySA+, CIPP/US, and PenTest+ exams. Creator of over 100 cybersecurity and business analytics video courses on LinkedIn Learning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 90
    • duration 5:25:08
    • Release Date 2023/01/04