Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CISM Certification: CISM Domain 2 Video Boot Camp
Training Overview
Description of Training
Video Overview (1:09)
Introduction
Introduction (0:53)
Introduction to this course! (1:35)
Why you should want to get CISM certified (4:22)
CISM Domain 2: Information Risk Management.
CISM Domain 2 - What we will be covering (3:01)
Risk Identification (11:20)
Risk Management - Assessment Part 1 (8:10)
Risk Management - Assessment Part 2 (14:11)
Risk response and mitigation & Risk and Control Monitoring and Reporting (5:47)
Attackers, Vishing, and Phishing- Part 1 (10:39)
Attackers, Vishing and Phishing- Part 2 (10:58)
OWASP part 1 (7:04)
OWASP part 2 (7:25)
OWASP part 3 (8:18)
OWASP part 4 (8:26)
Networking basics and definitions (15:43)
SIEM (Security Information and Event Management) (4:08)
The OSI model - Part 1 (12:57)
The OSI model - Part 2 (11:19)
The TCP/IP model (8:39)
IP addresses, MAC addresses, and port numbers - Part 1 (11:23)
IP addresses, MAC addresses, and port numbers - Part 2 (7:12)
IP addresses, MAC addresses, and port numbers - Part 3 (14:48)
IP addresses, MAC addresses, and port numbers - Part 4 (6:57)
IP support protocols - Part 1 (11:45)
IP support protocols - Part 2 (16:13)
Cable types (14:28)
LAN topologies (14:25)
Layer 1 to 3 networking devices (14:50)
Firewalls - Part 1 (9:12)
Firewalls - Part 2 (5:36)
Intrusion detection and prevention systems (12:22)
Network authentication protocols (11:59)
WIFI - Part 1 (9:07)
WiFi - Part 2 (14:28)
Bluetooth (4:26)
Honeynets and Honeypots (3:00)
Secure communications - Part 1 (9:01)
Secure Communications - Part 2 (9:16)
Secure Communications - Part 3 (10:41)
Mobile device security (12:33)
Application positive-listing (3:47)
Virtualization, Cloud, and Distributed Computing - Part 1 (14:12)
Virtualization, Cloud, and Distributed Computing - Part 2 (6:07)
Virtualization, Cloud, and Distributed Computing - Part 3 (5:44)
Virtualization, Cloud, and Distributed Computing - Part 4 (5:00)
Virtualization, Cloud, and Distributed Computing - Part 5 (9:46)
Software vulnerabilities and Attacks (5:17)
System vulnerabilities, threats, and countermeasures (8:42)
IOT (Internet Of Things) (6:03)
Wireless networks (7:46)
CISM Domain 2 - What we covered (1:46)
CISM Domain 2 links
How to study for the CISM certification and how to reach your goals
How to reach your goal, in this case passing the CISM exam! (16:30)
How to approach studying for the CISM exam and study plans (8:39)
Why you should want to get CISM certified (4:22)
The exam and life after it
The CISM exam itself, how to mentally and physically prepare for it (9:56)
Life after passing the CISM certification and being being endorsed (4:57)
CPE resources
I failed, now what should I do? (5:00)
Bonus lectures
Bonus Lecture (1:45)
Audio Version of the Training
Audio Download
Networking basics and definitions
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock