CISM: Certified Information Security Manager

CISM: Certified Information Security Manager

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Course Introduction

  • 1. Course Introduction
    1m 2s

Domain 01 - Information Security Governance

  • 1. Lesson 1: Information Security Governance Overview
    53s
  • 2. Information Security Governance Overview Part1
    1m 12s
  • 3. Information Security Governance Overview Part2
    2m
  • 4. Information Security Governance Overview Part3
    1m 22s
  • 5. Information Security Governance Overview Part4
    1m 32s
  • 6. Information Security Governance Overview Part5
    30s
  • 7. Importance of Information Security Governance Part1
    6m 21s
  • 8. Importance of Information Security Governance Part2
    1m 19s
  • 9. Outcomes of Information Security Governance Part1
    33s
  • 10. Outcomes of Information Security Governance Part2
    1m 26s
  • 11. Outcomes of Information Security Governance Part3
    2m 45s
  • 12. Outcomes of Information Security Governance Part4
    1m 27s
  • 13. Outcomes of Information Security Governance Part5
    1m 54s
  • 14. Outcomes of Information Security Governance Part6
    1m 28s
  • 15. Lesson 2: Effective Information Security Governance
    31s
  • 16. Business Goals and Objectives Part1
    1m 31s
  • 17. Business Goals and Objectives Part2
    2m
  • 18. Roles and Responsibilities of Senior Management Part1
    1m 2s
  • 19. Roles and Responsibilities of Senior Management Part2
    43s
  • 20. Domain Tasks Part1
    1m 21s
  • 21. Domain Tasks Part2
    3m 16s
  • 22. Business Model for Information Security Part1
    45s
  • 23. Business Model for Information Security Part2
    1m 9s
  • 24. Business Model for Information Security Part3
    3m 16s
  • 25. Business Model for Information Security Part4
    1m 37s
  • 26. Dynamic Interconnections Part1
    34s
  • 27. Dynamic Interconnections Part2
    2m 55s
  • 28. Dynamic Interconnections Part3
    1m 55s
  • 29. Dynamic Interconnections Part4
    51s
  • 30. Lesson 3: Information Security Concepts and Technologies
    3m 27s
  • 31. Information Security Concepts and Technologies Part1
    2m 58s
  • 32. Information Security Concepts and Technologies Part2
    3m 25s
  • 33. Information Security Concepts and Technologies Part3
    1m 50s
  • 34. Technologies Part1
    1m 41s
  • 35. Technologies Part2
    6m 12s
  • 36. Lesson 4: Information Security Manager
    33s
  • 37. Responsibilities
    1m 48s
  • 38. Senior Management Commitment Part1
    48s
  • 39. Senior Management Commitment Part2
    2m 27s
  • 40. Obtaining Senior Management Commitment Part1
    24s
  • 41. Obtaining Senior Management Commitment Part2
    53s
  • 42. Establishing Reporting and Communication Channels Part1
    1m 13s
  • 43. Establishing Reporting and Communication Channels Part2
    1m 7s
  • 44. Lesson 5: Scope and Charter of Information Security Governance
    1m 55s
  • 45. Assurance Process Integration and Convergence
    2m 24s
  • 46. Convergence
    2m 32s
  • 47. Governance and Third-Party Relationships
    2m 38s
  • 48. Lesson 6: Information Security Governance Metrics
    56s
  • 49. Metrics
    1m 39s
  • 50. Effective Security Metrics Part1
    1m 46s
  • 51. Effective Security Metrics Part2
    1m 1s
  • 52. Effective Security Metrics Part3
    1m 51s
  • 53. Effective Security Metrics Part4
    39s
  • 54. Security Implementation Metrics
    1m 17s
  • 55. Strategic Alignment Part1
    2m 56s
  • 56. Strategic Alignment Part2
    1m 11s
  • 57. Risk Management
    1m 14s
  • 58. Value Delivery
    1m 2s
  • 59. Resource Management Part1
    47s
  • 60. Resource Management Part2
    41s
  • 61. Performance Measurement
    3m 6s
  • 62. Assurance Process Integration/Convergence
    2m 54s
  • 63. Lesson 7: Information Security Strategy Overview
    53s
  • 64. Another View of Strategy
    41s
  • 65. Lesson 8: Creating Information Security Strategy
    16s
  • 66. Information Security Strategy
    1m 22s
  • 67. Common Pitfalls Part1
    4m 38s
  • 68. Common Pitfalls Part2
    2m 19s
  • 69. Objectives of the Information Security Strategy
    1m 33s
  • 70. What is the Goal?
    1m 40s
  • 71. Defining Objectives
    1m 23s
  • 72. Business Linkages
    1m 48s
  • 73. Business Case Development Part1
    1m 44s
  • 74. Business Case Development Part2
    2m 36s
  • 75. Business Case Development Part3
    45s
  • 76. Business Case Objectives
    57s
  • 77. The Desired State
    1m 48s
  • 78. COBIT
    1m 8s
  • 79. COBIT Controls
    1m 9s
  • 80. COBIT Framework
    48s
  • 81. Capability Maturity Model
    1m 38s
  • 82. Balanced Scorecard
    1m 22s
  • 83. Architectural Approaches
    1m 3s
  • 84. ISO/IEC 27001 and 27002
    1m
  • 85. Risk Objectives Part1
    1m 39s
  • 86. Risk Objectives Part2
    3m 11s
  • 87. Lesson 9: Determining Current State Of Security
    45s
  • 88. Current Risk Part1
    2m 37s
  • 89. Current Risk Part2
    1m 11s
  • 90. BIA
    1m 11s
  • 91. Lesson 10: Information Security Strategy Development
    1m 52s
  • 92. The Roadmap
    1m 1s
  • 93. Elements of a Strategy
    3m 27s
  • 94. Strategy Resources and Constraints
    2m 46s
  • 95. Lesson 11: Strategy Resources
    32s
  • 96. Policies and Standards
    1m 1s
  • 97. Definitions
    5m 48s
  • 98. Enterprise Information Security Architectures
    1m 30s
  • 99. Controls
    3m
  • 100. Countermeasures
    55s
  • 101. Technologies
    1m 50s
  • 102. Personnel
    1m 54s
  • 103. Organizational Structure
    3m 47s
  • 104. Employee Roles and Responsibilities
    28s
  • 105. Skills
    1m 17s
  • 106. Audits
    1m 41s
  • 107. Compliance Enforcement
    2m 24s
  • 108. Threat Assessment
    1m 41s
  • 109. Vulnerability Assessment
    2m 21s
  • 110. Risk Assessment
    2m 19s
  • 111. Insurance
    2m 4s
  • 112. Business Impact Assessment
    2m 32s
  • 113. Outsourced Security Providers
    2m 57s
  • 114. Lesson 12: Strategy Constraints
    23s
  • 115. Legal and Regulatory Requirements
    1m 43s
  • 116. Physical Constraints
    2m 56s
  • 117. The Security Strategy
    1m 36s
  • 118. Lesson 13: Action Plan to Implement Strategy
    1m 13s
  • 119. Gap Analysis Part1
    1m 35s
  • 120. Gap Analysis Part2
    52s
  • 121. Gap Analysis Part3
    3m 1s
  • 122. Policy Development Part1
    1m 42s
  • 123. Policy Development Part2
    1m
  • 124. Standards Development
    2m 45s
  • 125. Training and Awareness
    35s
  • 126. Action Plan Metrics
    1m 23s
  • 127. General Metric Considerations Part1
    23s
  • 128. General Metric Considerations Part2
    35s
  • 129. General Metric Considerations Part3
    43s
  • 130. General Metric Considerations Part4
    23s
  • 131. CMM4 Statements
    2m
  • 132. Objectives for CMM4
    47s
  • 133. Domain 01 Review
    44s

Domain 02 - Information Risk Management

  • 1. Lesson 1: Risk Management Overview
    59s
  • 2. Risk Management Overview
    1m 51s
  • 3. Types of Risk Analysis
    7m 8s
  • 4. The Importance of Risk Management
    2m 14s
  • 5. Risk Management Outcomes
    1m 35s
  • 6. Risk Management Strategy
    1m 49s
  • 7. Lesson 2: Good Information Security Risk Management
    4m 14s
  • 8. Context and Purpose
    3m 8s
  • 9. Scope and Charter
    39s
  • 10. Assets
    2m 31s
  • 11. Other Risk Management Goals
    2m 2s
  • 12. Roles and Responsibilities
    2m 52s
  • 13. Lesson 3: Information Security Risk Management Concepts
    6m 6s
  • 14. Technologies
    6m 39s
  • 15. Lesson 4: Implementing Risk Management
    2m 8s
  • 16. The Risk Management Framework
    2m
  • 17. The External Environment
    1m 48s
  • 18. The Internal Environment
    2m 7s
  • 19. The Risk Management Context
    47s
  • 20. Gap Analysis
    2m 21s
  • 21. Other Organizational Support
    4m 9s
  • 22. Risk Analysis
    1m 22s
  • 23. Lesson 5: Risk Assessment
    1m 19s
  • 24. NIST Risk Assessment Methodology
    3m 49s
  • 25. Aggregated or Cascading Risk
    2m 54s
  • 26. Other Risk Assessment Approaches
    1m 18s
  • 27. Identification of Risks
    1m 49s
  • 28. Threats
    1m 8s
  • 29. Vulnerabilities Part1
    2m 11s
  • 30. Vulnerabilities Part2
    4m 10s
  • 31. Risks
    1m 36s
  • 32. Analysis of Relevant Risks
    1m 48s
  • 34. Semi -Quantitative Analysis
    1m 52s
  • 35. Quantitative Analysis Example
    4m 14s
  • 36. Evaluation of Risks
    46s
  • 37. Risk Treatment Options
    4m 39s
  • 38. Impact
    2m 59s
  • 39. Lesson 6: Controls Countermeasures
    25s
  • 40. Controls
    4m 43s
  • 41. Residual Risk
    3m 38s
  • 42. Information Resource Valuation
    1m 33s
  • 43. Methods of Valuing Assets
    1m 36s
  • 44. Information Asset Classification
    3m 32s
  • 45. Determining Classification
    2m 5s
  • 46. Impact Part1
    3m 53s
  • 47. Impact Part2
    1m 3s
  • 48. Lesson 7: Recovery Time Objectives
    49s
  • 49. Recovery Point Objectives
    4m 18s
  • 50. Service Delivery Objectives
    1m 58s
  • 51. Third-Party Service Providers
    1m 44s
  • 52. Working with Lifecycle Processes
    2m 8s
  • 53. IT System Development
    2m 12s
  • 54. Project Management Part1
    47s
  • 55. Project Management Part2
    2m 10s
  • 56. Lesson 8: Risk Monitoring and Communication
    1m 17s
  • 57. Risk Monitoring and Communication
    38s
  • 58. Other Communications
    1m 25s
  • 59. Domain 02 Review
    1m 1s

Domain 03 - Information Security Program Development

  • 1. Introduction
    31s
  • 2. Lesson 1: Development of Information Security Program
    2m 50s
  • 3. Importance of the Program
    52s
  • 4. Outcomes of Security Program Development
    1m 47s
  • 5. Effective Information Security Program Development
    4m 59s
  • 6. Lesson 2: Information Security Program Objectives
    10s
  • 7. Cross Organizational Responsibilities
    1m 55s
  • 8. Program Objectives Part1
    2m 23s
  • 9. Program Objectives Part2
    1m 18s
  • 10. Defining Objectives Part1
    2m 11s
  • 11. Defining Objectives Part2
    1m 8s
  • 12. Lesson 3: Information Security Program Development Concepts Part1
    4m 2s
  • 13. Information Security Program Development Concepts Part2
    5m 39s
  • 14. Technology Resources
    2m 44s
  • 15. Information Security Manager
    1m 25s
  • 16. Lesson 4: Scope and Charter of Information Security Program Development
    30s
  • 17. Assurance Function Integration
    1m 35s
  • 18. Challenges in Developing Information Security Program
    1m 54s
  • 19. Pitfalls
    2m 48s
  • 20. Objectives of the Security Program
    2m 6s
  • 21. Program Goals
    2m 52s
  • 22. The Steps of the Security Program
    1m 46s
  • 23. Defining the Roadmap Part1
    1m 38s
  • 24. Defining the Roadmap Part2
    58s
  • 25. Elements of the Roadmap Part1
    1m 18s
  • 26. Elements of the Roadmap Part2
    34s
  • 27. Elements of the Roadmap Part3
    1m 57s
  • 28. Elements of the Roadmap Part4
    1m 17s
  • 29. Elements of the Roadmap Part5
    18s
  • 30. Gap Analysis
    44s
  • 31. Lesson 5: Information Security Management Framework
    15s
  • 32. Security Management Framework
    4m 55s
  • 33. COBIT 5
    5m 59s
  • 34. ISO/IEC 27001
    4m 30s
  • 35. Lesson 6: Information Security Framework Components
    13s
  • 36. Operational Components Part1
    1m 56s
  • 37. Operational Components Part2
    3m 11s
  • 38. Management Components
    1m 31s
  • 39. Administrative Components
    3m 30s
  • 40. Educational and Informational Components
    1m 26s
  • 41. Lesson 7: Information Security Program Resources
    1m 32s
  • 42. Resources
    3m 27s
  • 43. Documentation
    54s
  • 44. Enterprise Architecture Part1
    4m 29s
  • 45. Enterprise Architecture Part2
    1m 54s
  • 46. Enterprise Architecture Part3
    1m 11s
  • 47. Controls as Strategy Implementation Resources Part1
    3m 42s
  • 48. Controls as Strategy Implementation Resources Part2
    2m 20s
  • 49. Controls as Strategy Implementation Resources Part3
    4m 35s
  • 50. Controls as Strategy Implementation Resources Part4
    2m 19s
  • 51. Common Control Practices
    1m 41s
  • 52. Countermeasures
    37s
  • 53. Technologies Part1
    1m 13s
  • 54. Technologies Part2
    1m 52s
  • 55. Technologies Part3
    1m 39s
  • 56. Technologies Part4
    5m 38s
  • 57. Personnel Part1
    2m
  • 58. Personnel Part2
    2m 56s
  • 59. Security Awareness
    1m 28s
  • 60. Awareness Topics
    5m 18s
  • 61. Formal Audits
    1m 16s
  • 62. Compliance Enforcement
    1m 3s
  • 63. Project Risk Analysis
    3m 9s
  • 64. Other Actions
    2m 58s
  • 65. Other Organizational Support
    1m 21s
  • 66. Program Budgeting Part1
    1m 3s
  • 67. Program Budgeting Part2
    2m 19s
  • 68. Lesson 8: Implementing an Information Security Program
    13s
  • 69. Policy Compliance
    2m 38s
  • 70. Standards Compliance
    2m 44s
  • 71. Training and Education
    1m 43s
  • 72. ISACA Control Objectives
    3m 52s
  • 73. Third-party Service Providers Part1
    1m 8s
  • 74. Third-party Service Providers Part2
    4m 22s
  • 75. Integration into Lifecycle Processes
    2m 14s
  • 76. Monitoring and Communication
    3m 33s
  • 78. The Plan of Action Part1
    1m 17s
  • 79. The Plan of Action Part2
    1m 36s
  • 80. Lesson 9: Information Infrastructure and Architecture
    53s
  • 81. Managing Complexity Part1
    4m 42s
  • 82. Managing Complexity Part2
    1m 45s
  • 83. Objectives of Information Security Architectures Part1
    1m 30s
  • 84. Objectives of Information Security Architectures Part2
    1m 15s
  • 85. Physical and Environmental Controls
    3m 32s
  • 86. Lesson 10: Information Security Program
    3m 3s
  • 87. Information Security Program Deployment Metrics
    2m 27s
  • 88. Metrics
    2m 2s
  • 89. Strategic Alignment
    53s
  • 90. Risk Management
    1m 41s
  • 91. Value Delivery
    35s
  • 92. Resource Management
    1m 23s
  • 93. Assurance Process Integration
    27s
  • 94. Performance Measurement
    41s
  • 95. Security Baselines
    38s
  • 96. Lesson 11: Security Program Services and Operational Activities
    48s
  • 97. IS Liaison Responsibilities Part1
    10m 17s
  • 98. IS Liaison Responsibilities Part2
    2m 28s
  • 99. Cross-Organizational Responsibilities
    1m 34s
  • 100. Security Reviews and Audits Part1
    3m 27s
  • 101. Security Reviews and Audits Part2
    1m 38s
  • 102. Management of Security Technology
    1m 25s
  • 103. Due Diligence Part1
    4m 10s
  • 104. Due Diligence Part2
    1m 36s
  • 105. Compliance Monitoring and Enforcement Part1
    2m 2s
  • 106. Compliance Monitoring and Enforcement Part2
    1m 46s
  • 107. Assessment of Risk and Impact Part1
    2m 17s
  • 108. Assessment of Risk and Impact Part2
    1m 28s
  • 109. Outsourcing and Service Providers
    2m 33s
  • 110. Cloud Computing Part1
    1m 37s
  • 111. Cloud Computing Part2
    1m 54s
  • 112. Cloud Computing Part3
    2m 23s
  • 113. Integration with IT Processes
    42s
  • 114. Domain 03 Review
    1m 13s

Domain 04 - Information Security Incident Management

  • 1. Lesson 1: Incident Management Overview Part1
    47s
  • 2. Incident Management Overview Part2
    3m 8s
  • 3. Incident Management Overview Part3
    3m 45s
  • 4. Types of Events Part1
    2m 44s
  • 5. Types of Events Part2
    3m 20s
  • 6. Goals of Incident Management Part1
    4m 45s
  • 7. Goals of Incident Management Part2
    6m 31s
  • 8. Goals of Incident Management Part3
    3m 26s
  • 9. Lesson 2: Incident Response Procedures Part1
    23s
  • 10. Incident Response Procedures Part2
    3m 40s
  • 11. Importance of Incident Management
    8m 1s
  • 12. Outcomes of Incident Management
    3m 50s
  • 13. Incident Management
    1m 35s
  • 14. Concepts Part1
    3m 44s
  • 15. Concepts Part2
    1m 35s
  • 16. Concepts Part3
    1m 34s
  • 17. Incident Management Systems Part1
    4m 2s
  • 18. Incident Management Systems Part2
    53s
  • 19. Lesson 3: Incident Management Organization
    2m 31s
  • 20. Responsibilities Part1
    3m 44s
  • 21. Responsibilities Part2
    2m 58s
  • 22. Responsibilities Part3
    5m 10s
  • 23. Senior Management Commitment
    1m 2s
  • 24. Lesson 4: Incident Management Resources
    25s
  • 25. Policies and Standards
    36s
  • 26. Incident Response Technology Concepts
    11m 12s
  • 27. Personnel
    3m 11s
  • 28. Roles and Responsibilities (eNotes)
    8m 24s
  • 29. Skills
    8m 9s
  • 30. Awareness and Education
    1m 20s
  • 31. Audits
    2m 49s
  • 32. Lesson 5: Incident Management Objectives
    17s
  • 33. Defining Objectives
    48s
  • 34. The Desired State
    3m 29s
  • 35. Strategic Alignment
    6m 42s
  • 36. Other Concerns
    2m 33s
  • 37. Lesson 6: Incident Management Metrics and Indicators
    5m 14s
  • 38. Implementation of the Security Program Management
    3m 1s
  • 39. Management Metrics and Monitoring Part1
    1m 35s
  • 40. Management Metrics and Monitoring Part2
    2m 48s
  • 41. Other Security Monitoring Efforts
    4m 24s
  • 42. Lesson 7: Current State of Incident Response Capability
    11s
  • 43. Threats
    4m 39s
  • 44. Vulnerabilities
    6m 15s
  • 45. Lesson 8: Developing an Incident Response Plan
    44s
  • 46. Elements of an Incident Response Plan
    8m 19s
  • 47. Gap Analysis
    3m 5s
  • 48. BIA Part1
    5m 5s
  • 49. BIA Part2
    2m 48s
  • 50. Escalation Process for Effective IM
    2m 45s
  • 51. Help Desk Processes for Identifying Security Incidents
    1m 27s
  • 52. Incident Management and Response Teams
    2m 10s
  • 53. Organizing, Training, and Equipping the Response Staff
    1m 55s
  • 54. Incident Notification Process
    55s
  • 55. Challenges in making an Incident Management Plan
    2m 18s
  • 56. Lesson 9: BCP/DRP
    7m 49s
  • 57. Goals of Recovery Operations Part1
    2m 2s
  • 58. Goals of Recovery Operations Part2
    1m 57s
  • 59. Choosing a Site Selection Part1
    5m 37s
  • 60. Choosing a Site Selection Part2
    1m 18s
  • 61. Implementing the Strategy
    3m 58s
  • 62. Incident Management Response Teams
    2m 10s
  • 63. Network Service High-availability
    4m 17s
  • 64. Storage High-availability
    4m 1s
  • 65. Risk Transference
    1m 27s
  • 66. Other Response Recovery Plan Options
    1m 29s
  • 67. Lesson 10: Testing Response and Recovery Plans
    2m 17s
  • 68. Periodic Testing
    1m 17s
  • 69. Analyzing Test Results Part1
    2m 6s
  • 70. Analyzing Test Results Part2
    3m 39s
  • 71. Measuring the Test Results
    58s
  • 72. Lesson 11: Executing the Plan
    1m 56s
  • 73. Updating the Plan
    1m 15s
  • 74. Intrusion Detection Policies
    1m 38s
  • 75. Who to Notify about an Incident
    1m 52s
  • 76. Recovery Operations
    1m 53s
  • 77. Other Recovery Operations
    1m 57s
  • 78. Forensic Investigation
    3m 5s
  • 79. Hacker / Penetration Methodology
    11m 50s
  • 80. Domain 04 Review
    1m 15s
  • 81. Course Closure
    34s