Companies Home Search Profile

The Pearson Complete Course for CISM Certification

Focused View

18:15:37

223 View
  • 001. Introduction.mp4
    06:45
  • 001. Learning objectives.mp4
    00:40
  • 002. 1.1 Information and Cybersecurity Fundamentals.mp4
    14:30
  • 003. 1.2 Information Security Governance.mp4
    13:07
  • 004. 1.3 Governance Roles and Responsibilities.mp4
    18:27
  • 005. 1.4 Governance Documents.mp4
    10:35
  • 006. 1.5 Regulatory and Compliance Requirements.mp4
    14:10
  • 007. 1.6 Organizational and Professional Ethics.mp4
    13:22
  • 008. 1.7 Lesson 1 Review and Quiz.mp4
    15:08
  • 001. Learning objectives.mp4
    00:36
  • 002. 2.1 Strategy Development.mp4
    16:01
  • 003. 2.2 Information Security Governance Frameworks.mp4
    12:14
  • 004. 2.3 Building a Business Case.mp4
    11:10
  • 005. 2.4 Metrics and Indicators.mp4
    10:08
  • 006. 2.5 Audit and Assurance.mp4
    17:32
  • 007. 2.6 Lesson 2 Review and Quiz.mp4
    15:42
  • 008. In the Boardroom Information Security Strategy.mp4
    02:55
  • 001. Learning objectives.mp4
    00:30
  • 002. 3.1 Risk Concepts.mp4
    07:01
  • 003. 3.2 Vulnerability Identification.mp4
    14:13
  • 004. 3.3 Penetration Testing.mp4
    16:58
  • 005. 3.4 Threat Actors and Attributes.mp4
    14:09
  • 006. 3.5 Threat Modeling.mp4
    14:15
  • 007. 3.6 Lesson 3 Review and Quiz.mp4
    14:33
  • 001. Learning objectives.mp4
    00:31
  • 002. 4.1 Risk Governance.mp4
    12:09
  • 003. 4.2 Risk Assessment.mp4
    08:41
  • 004. 4.3 Risk Analysis.mp4
    16:50
  • 005. 4.4 Risk Response.mp4
    14:00
  • 006. 4.5 Risk Monitoring.mp4
    09:19
  • 007. 4.6 Lesson 4 Review and Quiz.mp4
    14:25
  • 008. In the Boardroom Information Risk Assessment.mp4
    03:55
  • 001. Learning objectives.mp4
    00:37
  • 002. 5.1 InfoSec Program Ecosystem.mp4
    15:34
  • 003. 5.2 Information Security Frameworks and Benchmarks.mp4
    12:44
  • 004. 5.3 Information Security Metrics.mp4
    11:39
  • 005. 5.4 SETA Principles and Practices.mp4
    17:45
  • 006. 5.5 Lesson 5 Review and Quiz.mp4
    14:17
  • 001. Learning objectives.mp4
    00:47
  • 002. 6.1 Asset Classification.mp4
    18:18
  • 003. 6.2 Controls and Countermeasures.mp4
    13:10
  • 004. 6.3 Control Baselines.mp4
    10:29
  • 005. 6.4 Configuration Management.mp4
    10:20
  • 006. 6.5 Change Control.mp4
    10:39
  • 007. 6.6 Vulnerability and Patch Management.mp4
    14:07
  • 008. 6.7 SDLC and Collaboration.mp4
    13:50
  • 009. 6.8 Cloud Computing.mp4
    16:09
  • 010. 6.9 Vendor and Supply Chain Management.mp4
    12:54
  • 011. 6.10 Lesson 6 Review and Quiz.mp4
    18:25
  • 001. Learning objectives.mp4
    00:56
  • 002. 7.1 Secure Design Principles.mp4
    10:32
  • 003. 7.2 Security Zones.mp4
    10:48
  • 004. 7.3 Wireless Connectivity.mp4
    15:43
  • 005. 7.4 Firewalls.mp4
    17:43
  • 006. 7.5 Network Access Control.mp4
    16:29
  • 007. 7.6 Access Control Management.mp4
    21:18
  • 008. 7.7 Cryptographic Primer.mp4
    13:38
  • 009. 7.8 Encryption.mp4
    17:41
  • 010. 7.9 Hashing and Digital Signatures.mp4
    16:57
  • 011. 7.10 PKI and Digital Certificates.mp4
    14:00
  • 012. 7.11 Secure Protocols.mp4
    10:43
  • 013. 7.12 Site and Building Security.mp4
    15:07
  • 014. 7.13 Lesson 7 Review and Quiz.mp4
    17:00
  • 015. In the Boardroom Secure Design and Implementation.mp4
    03:27
  • 001. Learning objectives.mp4
    00:38
  • 002. 8.1 Incident Management Planning.mp4
    15:18
  • 003. 8.2 Business Impact Analysis.mp4
    15:45
  • 004. 8.3 Resiliency Concepts.mp4
    13:56
  • 005. 8.4 Backup and Recovery.mp4
    11:36
  • 006. 8.5 Security Incident Response Planning.mp4
    13:43
  • 007. 8.6 Disaster Recovery and Business Continuity Planning.mp4
    15:16
  • 008. 8.7 Plan Readiness.mp4
    16:21
  • 009. 8.8 Lesson 8 Review and Quiz.mp4
    15:48
  • 001. Learning objectives.mp4
    00:33
  • 002. 9.1 Malware.mp4
    12:37
  • 003. 9.2 Social Engineering.mp4
    17:31
  • 004. 9.3 Digital Infrastructure Attacks.mp4
    12:53
  • 005. 9.4 Validation Attacks.mp4
    16:52
  • 006. 9.5 Environmental Impact.mp4
    11:23
  • 007. 9.6 Lesson 9 Review and Quiz.mp4
    15:18
  • 001. Learning objectives.mp4
    00:39
  • 002. 10.1 Incident Response.mp4
    14:15
  • 003. 10.2 Detection and Response Tools.mp4
    14:10
  • 004. 10.3 Evidence Handling.mp4
    15:28
  • 005. 10.4 Forensic Examination.mp4
    15:31
  • 006. 10.5 Disclosure and Notification.mp4
    12:57
  • 007. 10.6 Lesson 10 Review and Quiz.mp4
    12:53
  • 008. In the Boardroom Incident Detection and Response.mp4
    03:36
  • 001. Learning objectives.mp4
    00:24
  • 002. 11.1 Test Taking Strategies.mp4
    09:45
  • 003. 11.2 Test Day Expectations and Requirements.mp4
    10:15
  • 004. 11.3 The Certification Process.mp4
    04:18
  • 001. Module introduction.mp4
    01:26
  • 001. Module introduction.mp4
    01:10
  • 001. Module introduction.mp4
    01:44
  • 001. Module introduction.mp4
    01:46
  • 001. Module introduction.mp4
    00:32
  • 001. Summary.mp4
    01:03
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 98
    • duration 18:15:37
    • English subtitles has
    • Release Date 2023/05/04