Companies Home Search Profile

Certified Information Security Manager (CISM - ISACA)

Focused View

Hemang Doshi

11:38:00

114 View
  • 1 - 11A Information Security Governance.mp4
    06:38
  • 2 - 11B Governance Framework.mp4
    04:04
  • 3 - 11C QAE 1 Information Security Governance.mp4
    07:04
  • 3 - cism flashcards importance of information security governance.zip
  • 4 - 14 Retention of Business Records.mp4
    06:11
  • 4 - cism flashcards retention of business records.zip
  • 5 - 15 Organization structure.mp4
    04:39
  • 6 - 15A Centralized and Decentralized Functions.mp4
    04:15
  • 7 - 16A Information security roles and responsibilities.mp4
    06:36
  • 8 - 16B Key Aspects Information security roles and responsibilities.mp4
    08:29
  • 9 - 16C QAE 1 Information security roles and responsibilities.mp4
    07:20
  • 9 - cism flashcards information security roles and responsibilities.zip
  • 10 - 17 Maturity model.mp4
    06:13
  • 10 - Practice Questions Governance Risk and Compliance.html
  • 10 - cism flashcards maturity model.zip
  • 11 - 18A Information security governance metrics.mp4
    04:34
  • 12 - 18B QAE Information security governance metrics.mp4
    05:35
  • 12 - cism flashcards information security governance metrics.zip
  • 13 - 19A Information security strategy and plan.mp4
    03:01
  • 14 - 19B Key Aspects Information security strategy and plan.mp4
    05:46
  • 15 - 19C QAE Information security strategy and plan.mp4
    07:08
  • 15 - cism flashcards information security strategy and plan.zip
  • 16 - 113 Enterprise information security architecture.mp4
    04:28
  • 16 - cism flashcards enterprise information security architecture.zip
  • 17 - 114 Awareness and education.mp4
    02:10
  • 17 - cism flashcards awareness and education.zip
  • 18 - 115 Governance Risk and Compliance.mp4
    04:38
  • 18 - cism flashcards governance risk management and compliance grc.zip
  • 19 - 116A Senior management commitment.mp4
    02:25
  • 20 - 116B Key Aspects Senior management commitment.mp4
    02:13
  • 21 - 116C QAE 1 Senior management commitment.mp4
    06:48
  • 21 - cism flashcards senior management commitment.zip
  • 22 - 117A Business Case and Feasibility Analysis.mp4
    02:47
  • 23 - 117B Key Aspects Business Case and Feasibility Analysis.mp4
    02:02
  • 24 - 117C QAE 1 Business Case and Feasibility Analysis.mp4
    06:18
  • 24 - cism flashcards business case and feasibility study.zip
  • 25 - 118A Governance of thirdparty relationships.mp4
    :
  • 26 - 118B Key Aspects Governance of thirdparty relationships.mp4
    02:30
  • 27 - 118C QAE 1 Governance of thirdparty relationships.mp4
    06:17
  • 28 - 21A ISACAs Thinking Hat.mp4
    09:44
  • 29 - 21B Risk Management Overview.mp4
    07:51
  • 30 - 22A Risk Management Strategy.mp4
    07:20
  • 31 - 22B Risk Capacity Appetite and Tolerance.mp4
    04:38
  • 32 - 24A Risk Assessment.mp4
    06:38
  • 33 - 24B Risk Analysis Methodologies.mp4
    14:09
  • 33 - cism flashcards risk analysis.zip
  • 34 - 24C QAE 1 Risk Assessment.mp4
    05:24
  • 34 - cism flashcards risk assessment.zip
  • 34 - cism flashcards risk treatment risk response options.zip
  • 35 - 25 Information asset classification.mp4
    08:44
  • 36 - 26A Asset Valuation.mp4
    02:39
  • 37 - 26B QAE Asset Valuation.mp4
    08:37
  • 38 - 27A RTO & RPO.mp4
    06:19
  • 39 - 27B SDO MTO AIW.mp4
    08:03
  • 40 - 28 Outsourcing and Third Party Service Provider.mp4
    10:07
  • 41 - 210A Change Management.mp4
    04:02
  • 42 - 210B QAE Change Management.mp4
    09:05
  • 42 - cism flashcards change management.zip
  • 43 - 211A Patch Management.mp4
    03:35
  • 44 - 211B QAE Patch Management.mp4
    06:51
  • 44 - cism flashcards patch management.zip
  • 45 - 212A Security Baseline Control.mp4
    04:29
  • 46 - 212B QAE Security Baseline Control.mp4
    04:28
  • 47 - Flashcards Understanding the Risk.html
  • 48 - Chapter 31A Defense in Depth.mp4
    04:02
  • 49 - Chapter 31B Information Security Program Development Management.mp4
    06:31
  • 50 - 32 Information Security Program Objective.mp4
    05:53
  • 51 - 33A Information Security Framework Components.mp4
    07:02
  • 52 - 33B QAE Information Security Framework Components.mp4
    04:53
  • 53 - 34A Key Aspects Information Security Program Road Map.mp4
    03:30
  • 54 - Chapter 34B QAE Information Security Program Road Map Copy.mp4
    05:08
  • 55 - 35A Information Security Policy Standard and Procedures.mp4
    05:03
  • 56 - 35B QAE Information Security Policy Standard and Procedures.mp4
    06:24
  • 57 - 36 Security Budget.mp4
    04:01
  • 58 - 37A Key Aspects Security Program Management and Administrative Activities.mp4
    04:38
  • 59 - 37B QAE 1 Security Program Management and Administrative Activities.mp4
    05:29
  • 60 - 38 Privacy Laws.mp4
    12:14
  • 61 - 39 Information Security Architecture.mp4
    05:31
  • 62 - 310A Architecture Implementation.mp4
    05:03
  • 63 - 310B QAE Architecture Implementation.mp4
    06:18
  • 64 - 311A Identity & Access Control.mp4
    05:03
  • 65 - 311B Key Aspects Identity & Access Control.mp4
    27:37
  • 66 - 311C QAE Identity & Access Control.mp4
    05:38
  • 67 - 312 Biometrics.mp4
    12:28
  • 68 - 313 Factor of Authentication.mp4
    08:08
  • 69 - 314 Wireless Networks.mp4
    08:11
  • 70 - 315 Different Attack Methods.mp4
    21:10
  • 71 - 316 Cloud computing.mp4
    05:05
  • 72 - 317A Fail Open Fail Close.mp4
    03:56
  • 73 - 317B Key Aspects Controls and Countermeasures.mp4
    03:34
  • 74 - 317C QAE 1 Controls and Countermeasures.mp4
    05:57
  • 75 - 318 Vulnerability Assessment & Penetration Testing.mp4
    07:59
  • 76 - 319A Key Aspects Security Program Metrics and Monitoring.mp4
    03:15
  • 77 - 319B QAE 1 Security Program Metrics and Monitoring.mp4
    05:42
  • 78 - CISM Flashcards Domain 3.html
  • 79 - 41A Firewall Types.mp4
    05:20
  • 80 - 41B Firewall Implementation.mp4
    02:37
  • 81 - 41C Proxy Demilitarized Zone.mp4
    01:48
  • 82 - 42A Intrusion Detection System IDS and Intrusion Prevention System IPS.mp4
    06:34
  • 83 - 42B Key Aspects IDS and IPS.mp4
    06:43
  • 84 - 43 Digital Signature.mp4
    08:36
  • 85 - 44 Elements of PKI.mp4
    08:10
  • 86 - 45 Asymmetric Encryption.mp4
    17:31
  • 87 - 46A Phases of Incident Management Life Cycle.mp4
    08:21
  • 88 - 46B SDOMTOAIW.mp4
    05:37
  • 89 - 46C Key Aspects Incident Management Overview.mp4
    02:44
  • 90 - 46D QAE 1 Incident Management Overview.mp4
    06:47
  • 91 - 47A Incident Response Procedure.mp4
    12:32
  • 92 - 47B QAE Incident Response Procedure.mp4
    02:01
  • 93 - 48A Key Aspects Developing Incident Response Plan.mp4
    04:55
  • 94 - 48B QAE Developing Incident Response Plan.mp4
    06:29
  • 95 - 49A Business Continuity Plan.mp4
    27:23
  • 96 - 49B Disaster Recovery Plan.mp4
    26:19
  • 97 - 49C Business Impact Analysis.mp4
    12:36
  • 98 - 410A Testing Incident Response Plan BCP and DRP.mp4
    04:35
  • 99 - 410B Key Aspects Testing Incident Response Plan BCP and DRP.mp4
    03:12
  • 100 - 410C QAE Testing Incident Response Plan BCP and DRP.mp4
    08:31
  • 101 - 411 Executing Response and Recovery Plan.mp4
    06:18
  • 102 - 412A Evidence Collection & Forensics.mp4
    13:00
  • 103 - 412B Key Aspects Post Incident Activities and Investigation.mp4
    05:21
  • 104 - 412C QAE 1 Post Incident Activities and Investigation.mp4
    05:45
  • 105 - CISM Flashcards Domain 4.html
  • Description


    CISM by Hemang Doshi

    What You'll Learn?


    • Certified Information Security Manager ( ISACA - CISM) Lectures
    • This course contains all the 4 domains of CISM Review Manual
    • Candidate will able to understand practical aspects of Information Security requirements of the organizations
    • Candidate will able to confidently attempt and pass the CISM exam

    Who is this for?


  • Information Security Professionals
  • IT Auditors
  • Risk Manager
  • What You Need to Know?


  • No prior knowledge or experience is required. We will teach you everything from basics to pass the CISM Exam.
  • More details


    Description

    This course is designed on the basis of official resources of ISACA. It covers all the 4 domains of CISM Review Manual. Topics are arranged segment wise and aligned with latest CISM Review Manual.


    Course is designed specifically for candidates from non-technical background. Video contents are designed after considering three major aspects:


    (1) Whether content has capability to engage the audience throughout?

    (2) Whether content is able to convey the meaning of CISM Review Manual (CRM) in a effective manner.

    (3) Whether video has capability to make audience understand and retain the key aspects for a longer duration.


    Features of this course are as follow:


    • This course is designed on the basis of official resources of ISACA.


    • Course is designed specifically for candidates from non-technical background.


    • Topics are arranged segment wise and aligned with latest CISM Review Manual.

    • Exam oriented practice questions and practical example for CISM aspirants.


    • Flashcards based learning mode.


    • Use of smartarts for easy learning


    • More than 700 plus practice questions


    Please use this course as a supplement to ISACA's resources. This course will help you to decipher the technicities used in official resources. This course is specfically designed for the candidates from non IT background. We have used simple and plain English for the  benefits of the candidates from non - English speaking countries.



    Who this course is for:

    • Information Security Professionals
    • IT Auditors
    • Risk Manager

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Hemang Doshi
    Hemang Doshi
    Instructor's Courses
    Hemang Doshi15 years of experience in field of internal audit, risk management, information security audit, third party risk managementHemang has authored books for:CISA Exam – Study GuideDISA (ICAI) – Study GuideEnterprise Information System (CA Inter – Paper 7)Hemang is founder of website cisaexamstudy (a dedicated website for CISA studies) & criscsexamstudy (a dedicated website for CRISC studies)
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 102
    • duration 11:38:00
    • Release Date 2022/11/22

    Courses related to Cyber Security