CISM: Certified Information Security Manager

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99 / $24.99
Course Introduction
-
1. Course Introduction1m 2s
Domain 01 - Information Security Governance
-
1. Lesson 1: Information Security Governance Overview53s
-
2. Information Security Governance Overview Part11m 12s
-
3. Information Security Governance Overview Part22m
-
4. Information Security Governance Overview Part31m 22s
-
5. Information Security Governance Overview Part41m 32s
-
6. Information Security Governance Overview Part530s
-
7. Importance of Information Security Governance Part16m 21s
-
8. Importance of Information Security Governance Part21m 19s
-
9. Outcomes of Information Security Governance Part133s
-
10. Outcomes of Information Security Governance Part21m 26s
-
11. Outcomes of Information Security Governance Part32m 45s
-
12. Outcomes of Information Security Governance Part41m 27s
-
13. Outcomes of Information Security Governance Part51m 54s
-
14. Outcomes of Information Security Governance Part61m 28s
-
15. Lesson 2: Effective Information Security Governance31s
-
16. Business Goals and Objectives Part11m 31s
-
17. Business Goals and Objectives Part22m
-
18. Roles and Responsibilities of Senior Management Part11m 2s
-
19. Roles and Responsibilities of Senior Management Part243s
-
20. Domain Tasks Part11m 21s
-
21. Domain Tasks Part23m 16s
-
22. Business Model for Information Security Part145s
-
23. Business Model for Information Security Part21m 9s
-
24. Business Model for Information Security Part33m 16s
-
25. Business Model for Information Security Part41m 37s
-
26. Dynamic Interconnections Part134s
-
27. Dynamic Interconnections Part22m 55s
-
28. Dynamic Interconnections Part31m 55s
-
29. Dynamic Interconnections Part451s
-
30. Lesson 3: Information Security Concepts and Technologies3m 27s
-
31. Information Security Concepts and Technologies Part12m 58s
-
32. Information Security Concepts and Technologies Part23m 25s
-
33. Information Security Concepts and Technologies Part31m 50s
-
34. Technologies Part11m 41s
-
35. Technologies Part26m 12s
-
36. Lesson 4: Information Security Manager33s
-
37. Responsibilities1m 48s
-
38. Senior Management Commitment Part148s
-
39. Senior Management Commitment Part22m 27s
-
40. Obtaining Senior Management Commitment Part124s
-
41. Obtaining Senior Management Commitment Part253s
-
42. Establishing Reporting and Communication Channels Part11m 13s
-
43. Establishing Reporting and Communication Channels Part21m 7s
-
44. Lesson 5: Scope and Charter of Information Security Governance1m 55s
-
45. Assurance Process Integration and Convergence2m 24s
-
46. Convergence2m 32s
-
47. Governance and Third-Party Relationships2m 38s
-
48. Lesson 6: Information Security Governance Metrics56s
-
49. Metrics1m 39s
-
50. Effective Security Metrics Part11m 46s
-
51. Effective Security Metrics Part21m 1s
-
52. Effective Security Metrics Part31m 51s
-
53. Effective Security Metrics Part439s
-
54. Security Implementation Metrics1m 17s
-
55. Strategic Alignment Part12m 56s
-
56. Strategic Alignment Part21m 11s
-
57. Risk Management1m 14s
-
58. Value Delivery1m 2s
-
59. Resource Management Part147s
-
60. Resource Management Part241s
-
61. Performance Measurement3m 6s
-
62. Assurance Process Integration/Convergence2m 54s
-
63. Lesson 7: Information Security Strategy Overview53s
-
64. Another View of Strategy41s
-
65. Lesson 8: Creating Information Security Strategy16s
-
66. Information Security Strategy1m 22s
-
67. Common Pitfalls Part14m 38s
-
68. Common Pitfalls Part22m 19s
-
69. Objectives of the Information Security Strategy1m 33s
-
70. What is the Goal?1m 40s
-
71. Defining Objectives1m 23s
-
72. Business Linkages1m 48s
-
73. Business Case Development Part11m 44s
-
74. Business Case Development Part22m 36s
-
75. Business Case Development Part345s
-
76. Business Case Objectives57s
-
77. The Desired State1m 48s
-
78. COBIT1m 8s
-
79. COBIT Controls1m 9s
-
80. COBIT Framework48s
-
81. Capability Maturity Model1m 38s
-
82. Balanced Scorecard1m 22s
-
83. Architectural Approaches1m 3s
-
84. ISO/IEC 27001 and 270021m
-
85. Risk Objectives Part11m 39s
-
86. Risk Objectives Part23m 11s
-
87. Lesson 9: Determining Current State Of Security45s
-
88. Current Risk Part12m 37s
-
89. Current Risk Part21m 11s
-
90. BIA1m 11s
-
91. Lesson 10: Information Security Strategy Development1m 52s
-
92. The Roadmap1m 1s
-
93. Elements of a Strategy3m 27s
-
94. Strategy Resources and Constraints2m 46s
-
95. Lesson 11: Strategy Resources32s
-
96. Policies and Standards1m 1s
-
97. Definitions5m 48s
-
98. Enterprise Information Security Architectures1m 30s
-
99. Controls3m
-
100. Countermeasures55s
-
101. Technologies1m 50s
-
102. Personnel1m 54s
-
103. Organizational Structure3m 47s
-
104. Employee Roles and Responsibilities28s
-
105. Skills1m 17s
-
106. Audits1m 41s
-
107. Compliance Enforcement2m 24s
-
108. Threat Assessment1m 41s
-
109. Vulnerability Assessment2m 21s
-
110. Risk Assessment2m 19s
-
111. Insurance2m 4s
-
112. Business Impact Assessment2m 32s
-
113. Outsourced Security Providers2m 57s
-
114. Lesson 12: Strategy Constraints23s
-
115. Legal and Regulatory Requirements1m 43s
-
116. Physical Constraints2m 56s
-
117. The Security Strategy1m 36s
-
118. Lesson 13: Action Plan to Implement Strategy1m 13s
-
119. Gap Analysis Part11m 35s
-
120. Gap Analysis Part252s
-
121. Gap Analysis Part33m 1s
-
122. Policy Development Part11m 42s
-
123. Policy Development Part21m
-
124. Standards Development2m 45s
-
125. Training and Awareness35s
-
126. Action Plan Metrics1m 23s
-
127. General Metric Considerations Part123s
-
128. General Metric Considerations Part235s
-
129. General Metric Considerations Part343s
-
130. General Metric Considerations Part423s
-
131. CMM4 Statements2m
-
132. Objectives for CMM447s
-
133. Domain 01 Review44s
Domain 02 - Information Risk Management
-
1. Lesson 1: Risk Management Overview59s
-
2. Risk Management Overview1m 51s
-
3. Types of Risk Analysis7m 8s
-
4. The Importance of Risk Management2m 14s
-
5. Risk Management Outcomes1m 35s
-
6. Risk Management Strategy1m 49s
-
7. Lesson 2: Good Information Security Risk Management4m 14s
-
8. Context and Purpose3m 8s
-
9. Scope and Charter39s
-
10. Assets2m 31s
-
11. Other Risk Management Goals2m 2s
-
12. Roles and Responsibilities2m 52s
-
13. Lesson 3: Information Security Risk Management Concepts6m 6s
-
14. Technologies6m 39s
-
15. Lesson 4: Implementing Risk Management2m 8s
-
16. The Risk Management Framework2m
-
17. The External Environment1m 48s
-
18. The Internal Environment2m 7s
-
19. The Risk Management Context47s
-
20. Gap Analysis2m 21s
-
21. Other Organizational Support4m 9s
-
22. Risk Analysis1m 22s
-
23. Lesson 5: Risk Assessment1m 19s
-
24. NIST Risk Assessment Methodology3m 49s
-
25. Aggregated or Cascading Risk2m 54s
-
26. Other Risk Assessment Approaches1m 18s
-
27. Identification of Risks1m 49s
-
28. Threats1m 8s
-
29. Vulnerabilities Part12m 11s
-
30. Vulnerabilities Part24m 10s
-
31. Risks1m 36s
-
32. Analysis of Relevant Risks1m 48s
-
34. Semi -Quantitative Analysis1m 52s
-
35. Quantitative Analysis Example4m 14s
-
36. Evaluation of Risks46s
-
37. Risk Treatment Options4m 39s
-
38. Impact2m 59s
-
39. Lesson 6: Controls Countermeasures25s
-
40. Controls4m 43s
-
41. Residual Risk3m 38s
-
42. Information Resource Valuation1m 33s
-
43. Methods of Valuing Assets1m 36s
-
44. Information Asset Classification3m 32s
-
45. Determining Classification2m 5s
-
46. Impact Part13m 53s
-
47. Impact Part21m 3s
-
48. Lesson 7: Recovery Time Objectives49s
-
49. Recovery Point Objectives4m 18s
-
50. Service Delivery Objectives1m 58s
-
51. Third-Party Service Providers1m 44s
-
52. Working with Lifecycle Processes2m 8s
-
53. IT System Development2m 12s
-
54. Project Management Part147s
-
55. Project Management Part22m 10s
-
56. Lesson 8: Risk Monitoring and Communication1m 17s
-
57. Risk Monitoring and Communication38s
-
58. Other Communications1m 25s
-
59. Domain 02 Review1m 1s
Domain 03 - Information Security Program Development
-
1. Introduction31s
-
2. Lesson 1: Development of Information Security Program2m 50s
-
3. Importance of the Program52s
-
4. Outcomes of Security Program Development1m 47s
-
5. Effective Information Security Program Development4m 59s
-
6. Lesson 2: Information Security Program Objectives10s
-
7. Cross Organizational Responsibilities1m 55s
-
8. Program Objectives Part12m 23s
-
9. Program Objectives Part21m 18s
-
10. Defining Objectives Part12m 11s
-
11. Defining Objectives Part21m 8s
-
12. Lesson 3: Information Security Program Development Concepts Part14m 2s
-
13. Information Security Program Development Concepts Part25m 39s
-
14. Technology Resources2m 44s
-
15. Information Security Manager1m 25s
-
16. Lesson 4: Scope and Charter of Information Security Program Development30s
-
17. Assurance Function Integration1m 35s
-
18. Challenges in Developing Information Security Program1m 54s
-
19. Pitfalls2m 48s
-
20. Objectives of the Security Program2m 6s
-
21. Program Goals2m 52s
-
22. The Steps of the Security Program1m 46s
-
23. Defining the Roadmap Part11m 38s
-
24. Defining the Roadmap Part258s
-
25. Elements of the Roadmap Part11m 18s
-
26. Elements of the Roadmap Part234s
-
27. Elements of the Roadmap Part31m 57s
-
28. Elements of the Roadmap Part41m 17s
-
29. Elements of the Roadmap Part518s
-
30. Gap Analysis44s
-
31. Lesson 5: Information Security Management Framework15s
-
32. Security Management Framework4m 55s
-
33. COBIT 55m 59s
-
34. ISO/IEC 270014m 30s
-
35. Lesson 6: Information Security Framework Components13s
-
36. Operational Components Part11m 56s
-
37. Operational Components Part23m 11s
-
38. Management Components1m 31s
-
39. Administrative Components3m 30s
-
40. Educational and Informational Components1m 26s
-
41. Lesson 7: Information Security Program Resources1m 32s
-
42. Resources3m 27s
-
43. Documentation54s
-
44. Enterprise Architecture Part14m 29s
-
45. Enterprise Architecture Part21m 54s
-
46. Enterprise Architecture Part31m 11s
-
47. Controls as Strategy Implementation Resources Part13m 42s
-
48. Controls as Strategy Implementation Resources Part22m 20s
-
49. Controls as Strategy Implementation Resources Part34m 35s
-
50. Controls as Strategy Implementation Resources Part42m 19s
-
51. Common Control Practices1m 41s
-
52. Countermeasures37s
-
53. Technologies Part11m 13s
-
54. Technologies Part21m 52s
-
55. Technologies Part31m 39s
-
56. Technologies Part45m 38s
-
57. Personnel Part12m
-
58. Personnel Part22m 56s
-
59. Security Awareness1m 28s
-
60. Awareness Topics5m 18s
-
61. Formal Audits1m 16s
-
62. Compliance Enforcement1m 3s
-
63. Project Risk Analysis3m 9s
-
64. Other Actions2m 58s
-
65. Other Organizational Support1m 21s
-
66. Program Budgeting Part11m 3s
-
67. Program Budgeting Part22m 19s
-
68. Lesson 8: Implementing an Information Security Program13s
-
69. Policy Compliance2m 38s
-
70. Standards Compliance2m 44s
-
71. Training and Education1m 43s
-
72. ISACA Control Objectives3m 52s
-
73. Third-party Service Providers Part11m 8s
-
74. Third-party Service Providers Part24m 22s
-
75. Integration into Lifecycle Processes2m 14s
-
76. Monitoring and Communication3m 33s
-
78. The Plan of Action Part11m 17s
-
79. The Plan of Action Part21m 36s
-
80. Lesson 9: Information Infrastructure and Architecture53s
-
81. Managing Complexity Part14m 42s
-
82. Managing Complexity Part21m 45s
-
83. Objectives of Information Security Architectures Part11m 30s
-
84. Objectives of Information Security Architectures Part21m 15s
-
85. Physical and Environmental Controls3m 32s
-
86. Lesson 10: Information Security Program3m 3s
-
87. Information Security Program Deployment Metrics2m 27s
-
88. Metrics2m 2s
-
89. Strategic Alignment53s
-
90. Risk Management1m 41s
-
91. Value Delivery35s
-
92. Resource Management1m 23s
-
93. Assurance Process Integration27s
-
94. Performance Measurement41s
-
95. Security Baselines38s
-
96. Lesson 11: Security Program Services and Operational Activities48s
-
97. IS Liaison Responsibilities Part110m 17s
-
98. IS Liaison Responsibilities Part22m 28s
-
99. Cross-Organizational Responsibilities1m 34s
-
100. Security Reviews and Audits Part13m 27s
-
101. Security Reviews and Audits Part21m 38s
-
102. Management of Security Technology1m 25s
-
103. Due Diligence Part14m 10s
-
104. Due Diligence Part21m 36s
-
105. Compliance Monitoring and Enforcement Part12m 2s
-
106. Compliance Monitoring and Enforcement Part21m 46s
-
107. Assessment of Risk and Impact Part12m 17s
-
108. Assessment of Risk and Impact Part21m 28s
-
109. Outsourcing and Service Providers2m 33s
-
110. Cloud Computing Part11m 37s
-
111. Cloud Computing Part21m 54s
-
112. Cloud Computing Part32m 23s
-
113. Integration with IT Processes42s
-
114. Domain 03 Review1m 13s
Domain 04 - Information Security Incident Management
-
1. Lesson 1: Incident Management Overview Part147s
-
2. Incident Management Overview Part23m 8s
-
3. Incident Management Overview Part33m 45s
-
4. Types of Events Part12m 44s
-
5. Types of Events Part23m 20s
-
6. Goals of Incident Management Part14m 45s
-
7. Goals of Incident Management Part26m 31s
-
8. Goals of Incident Management Part33m 26s
-
9. Lesson 2: Incident Response Procedures Part123s
-
10. Incident Response Procedures Part23m 40s
-
11. Importance of Incident Management8m 1s
-
12. Outcomes of Incident Management3m 50s
-
13. Incident Management1m 35s
-
14. Concepts Part13m 44s
-
15. Concepts Part21m 35s
-
16. Concepts Part31m 34s
-
17. Incident Management Systems Part14m 2s
-
18. Incident Management Systems Part253s
-
19. Lesson 3: Incident Management Organization2m 31s
-
20. Responsibilities Part13m 44s
-
21. Responsibilities Part22m 58s
-
22. Responsibilities Part35m 10s
-
23. Senior Management Commitment1m 2s
-
24. Lesson 4: Incident Management Resources25s
-
25. Policies and Standards36s
-
26. Incident Response Technology Concepts11m 12s
-
27. Personnel3m 11s
-
28. Roles and Responsibilities (eNotes)8m 24s
-
29. Skills8m 9s
-
30. Awareness and Education1m 20s
-
31. Audits2m 49s
-
32. Lesson 5: Incident Management Objectives17s
-
33. Defining Objectives48s
-
34. The Desired State3m 29s
-
35. Strategic Alignment6m 42s
-
36. Other Concerns2m 33s
-
37. Lesson 6: Incident Management Metrics and Indicators5m 14s
-
38. Implementation of the Security Program Management3m 1s
-
39. Management Metrics and Monitoring Part11m 35s
-
40. Management Metrics and Monitoring Part22m 48s
-
41. Other Security Monitoring Efforts4m 24s
-
42. Lesson 7: Current State of Incident Response Capability11s
-
43. Threats4m 39s
-
44. Vulnerabilities6m 15s
-
45. Lesson 8: Developing an Incident Response Plan44s
-
46. Elements of an Incident Response Plan8m 19s
-
47. Gap Analysis3m 5s
-
48. BIA Part15m 5s
-
49. BIA Part22m 48s
-
50. Escalation Process for Effective IM2m 45s
-
51. Help Desk Processes for Identifying Security Incidents1m 27s
-
52. Incident Management and Response Teams2m 10s
-
53. Organizing, Training, and Equipping the Response Staff1m 55s
-
54. Incident Notification Process55s
-
55. Challenges in making an Incident Management Plan2m 18s
-
56. Lesson 9: BCP/DRP7m 49s
-
57. Goals of Recovery Operations Part12m 2s
-
58. Goals of Recovery Operations Part21m 57s
-
59. Choosing a Site Selection Part15m 37s
-
60. Choosing a Site Selection Part21m 18s
-
61. Implementing the Strategy3m 58s
-
62. Incident Management Response Teams2m 10s
-
63. Network Service High-availability4m 17s
-
64. Storage High-availability4m 1s
-
65. Risk Transference1m 27s
-
66. Other Response Recovery Plan Options1m 29s
-
67. Lesson 10: Testing Response and Recovery Plans2m 17s
-
68. Periodic Testing1m 17s
-
69. Analyzing Test Results Part12m 6s
-
70. Analyzing Test Results Part23m 39s
-
71. Measuring the Test Results58s
-
72. Lesson 11: Executing the Plan1m 56s
-
73. Updating the Plan1m 15s
-
74. Intrusion Detection Policies1m 38s
-
75. Who to Notify about an Incident1m 52s
-
76. Recovery Operations1m 53s
-
77. Other Recovery Operations1m 57s
-
78. Forensic Investigation3m 5s
-
79. Hacker / Penetration Methodology11m 50s
-
80. Domain 04 Review1m 15s
-
81. Course Closure34s