Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CISM Certification: CISM Domain 3 Video Boot Camp
Training Overview
Description of Training
Video Overview (1:09)
Introduction
Introduction (0:55)
Introduction to this course! (1:39)
Why you should want to get CISM certified (4:22)
Domain 3 Information Security Program Development and Management
CISM Domain 3 - What we will be covering (3:10)
The information life cycle (5:29)
Secure design principles (19:56)
Secure system design concepts (6:47)
Asset tracking and hardware hardening (8:01)
DevOps and DevSecOps (2:40)
Configuration Management (5:20)
Patch Management (7:00)
Change management (7:26)
Security evaluation models (5:10)
Security Assessments (5:01)
Security Audits (9:12)
Security Audit Logs (7:43)
Vulnerability scanners (2:46)
Penetration testing (11:35)
Penetration testing tools (9:18)
Social Engineering attacks (7:36)
Maturity Models - Part 1 (10:34)
Maturity Models - Part 2 (10:21)
Access control (7:22)
Introduction to Access Control (5:00)
IAAA Part 1 - Identification, Authentication, Authorization, and Accountability (8:51)
Type 1 authentication (12:50)
Type 2 authentication (8:19)
Type 3 authentication (8:33)
Authorization (12:13)
Accountability (2:25)
Access control systems (10:31)
Identity and access provisioning (9:05)
Introduction to Cryptography- Part 1 (8:26)
Introduction to Cryptography- Part 2 (4:45)
The history of Cryptography- Part 1 (6:55)
The history of Cryptography- Part 2 (7:21)
The encryption we use today (3:48)
Symmetric encryption- Part 1 (6:55)
Symmetric encryption- Part 2 (9:32)
Asymmetric encryption- Part 1 (9:25)
Asymmetric encryption- Part 2 (4:39)
Hashing- Part 1 (6:45)
Hashing- Part 2 (8:37)
Attacks on our cryptography- Part 1 (7:08)
Attacks on our cryptography- Part 2 (6:18)
Attacks on our cryptography- Part 3 (11:00)
Digital signatures (11:07)
MAC, HMAC, SSL, and TLS (4:16)
Software Testing 1 (5:34)
Software testing 2 (9:33)
Buying software from other companies (13:05)
Designing security into our software (8:50)
Software development methodologies part 1 (8:43)
Software development methodologies part 2 (7:50)
Software development methodologies part 3 (9:57)
Software development methodologies part 4 (5:53)
Physical security- Part 1 (5:50)
Physical security- Part 2 (11:38)
Physical security- Part 3 (7:46)
Physical security- Part 4 (11:24)
Physical security- Part 5 (11:27)
Physical security- Part 6 (6:43)
Site Selection -Part 1 (9:22)
Site Selection -Part 2 (11:12)
Electricity (8:58)
Fire suppression and hot and cold aisles (11:17)
Heat, Flame, Particle, and Smoke Detectors (3:18)
Fire suppression- Part 1 (9:14)
Fire suppression- Part 2 (6:56)
Backups (12:45)
RAID (Redundant Array of Independent Disks) (7:21)
Redundancy (10:18)
Media storage (6:20)
3rd party software, Acquisitions, and Divesture security (6:39)
CISM Domain 3 - What we covered (2:14)
CISM Domain 3 links
How to study for the CISM certification and how to reach your goals
How to reach your goal, in this case passing the CISM exam! (16:30)
How to approach studying for the CISM exam and study plans (8:39)
Why you should want to get CISM certified (4:22)
The exam and life after it
The CISM exam itself, how to mentally and physically prepare for it (9:56)
Life after passing the CISM certification and being being endorsed (4:57)
CPE resources
I failed, now what should I do (5:00)
Bonus Lecture
Bonus Lecture (1:45)
Audio Version of the Training
Audio Lesson
Introduction to Access Control
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock