Autoplay
Autocomplete
Previous Lesson
Complete and Continue
ISACA Certified Information Systems Manager - CISM
Training Overview
Description of Training
Introduction to CISM Certification
Introduction (1:45)
Your Instructor (2:22)
ISACA (2:04)
CISM Certificate (2:49)
Student materials
Domain 1 - Information Security Governance
Understanding information security governance (8:09)
Roles and responsibilities of information security governance (3:02)
CISO JD (4:02)
Establishing an Information Steering Committee ISSC (3:27)
Policies and Procedures (8:58)
IS Policy Sample (7:34)
Policy Template Resources (1:35)
Compliance and Legal Requirements (3:04)
ISO 27001 Standards (8:56)
PCI-DSS (9:31)
Mapping between standards (2:47)
NIST 800-53 (2:39)
SP NIST 800-53 (4:03)
HIPAA (3:03)
Governance using AI Part 1 (9:24)
Governance using AI Part 2 (5:06)
Awareness and Education (7:48)
Domain 2 - Risk Management
Risk Management (10:49)
Qualitative vs Quantitively Assessment (8:21)
Risk Formula (11:38)
Security Controls (6:23)
NIST 800-37 (2:15)
Risk Register (1:13)
Domain 3 - Information Security Program Development
Resources CIS (4:17)
Security Policy Framework (24:53)
The Relationship Between Security Document Types (3:42)
Identify, analyze, and prioritize Business Continuity (BC) requirements (8:17)
BCP Phases (12:00)
Business Impact Analysis - BIA (10:41)
NIST SP 800-34 (8:07)
MTD-RTO-RPO (11:29)
Business Continuity Controls (9:41)
High availability and Fault Tolerance (11:28)
Domain 4 - Information Security Incident Management
Incident Report (5:33)
Incident Management (5:24)
Backup (5:59)
Alternative Sites (8:09)
Audio Version of Training
Audio Download
Business Impact Analysis - BIA
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock