2 sonuçtan 1 ile 2 arası
  1. #1
    Üye missyou - ait Kullanıcı Resmi (Avatar)
    Üyelik tarihi
    20.08.2016
    Mesajlar
    144.947
    Konular
    0
    Bölümü
    Bilgisayar
    Cinsiyet
    Kadın
    Tecrübe Puanı
    153

    Certified Information Security Manager (Cism - Isaca)





    Certified Information Security Manager (Cism - Isaca)
    Last updated 10/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.24 GB | Duration: 11h 41m

    CISM by Hemang Doshi

    What you'll learn
    Certified Information Security Manager ( ISACA - CISM) Lectures
    This course contains all the 4 domains of CISM Review Manual
    Candidate will able to understand practical aspects of Information Security requirements of the organizations
    Candidate will able to confidently attempt and pass the CISM exam
    Requirements
    No prior knowledge or experience is required. We will teach you everything from basics to pass the CISM Exam.
    Description
    This course is designed on the basis of official resources of ISACA. It covers all the 4 domains of CISM Review Manual. Topics are arranged segment wise and aligned with latest CISM Review Manual.Course is designed specifically for candidates from non-technical background.*Video*contents are designed after considering three major aspects1) Whether content has capability to engage the audience throughout?(2) Whether content is able to convey the meaning of CISM Review Manual (CRM) in a effective manner.(3) Whether video has capability to make audience understand and retain the key aspects for a longer duration.Features of this course are as follow:This course is designed on the basis of official resources of ISACA.Course is designed specifically for candidates from non-technical background.Topics are arranged segment wise and aligned with latest CISM Review Manual. Exam oriented practice questions and practical example for CISM aspirants.Flashcards based learning mode.Use of smartarts for easy learningMore than 700 plus practice questions Please use this course as a supplement to ISACA's resources. This course will help you to decipher the technicities used in official resources. This course is specfically designed for the candidates from non IT background. We have used simple and plain English for the benefits of the candidates from non - English speaking countries.
    Overview
    Section 1: Domain 1 - Information Security Governance
    Lecture 1 1.1A - Information Security Governance
    Lecture 2 1.1B - Governance Framework
    Lecture 3 1.1C - QAE 1 - Information Security Governance
    Lecture 4 1.4 - Retention of Business Records
    Lecture 5 1.5 - Organization structure
    Lecture 6 1.5A - Centralized and Decentralized Functions
    Lecture 7 1.6A - Information security roles and responsibilities
    Lecture 8 1.6B - Key Aspects - Information security roles and responsibilities
    Lecture 9 1.6C - QAE 1 - Information security roles and responsibilities
    Lecture 10 1.7 - Maturity model
    Lecture 11 1.8A - Information security governance metrics
    Lecture 12 1.8B -QAE - Information security governance metrics
    Lecture 13 1.9A - Information security strategy and plan
    Lecture 14 1.9B - Key Aspects - Information security strategy and plan
    Lecture 15 1.9C - QAE - Information security strategy and plan
    Lecture 16 1.13 - Enterprise information security architecture
    Lecture 17 1.14 - Awareness and education
    Lecture 18 1.15 - Governance, Risk and Compliance
    Lecture 19 1.16A - Senior management commitment
    Lecture 20 1.16B - Key Aspects - Senior management commitment
    Lecture 21 1.16C - QAE 1 - Senior management commitment
    Lecture 22 1.17A - Business Case and Feasibility Analysis
    Lecture 23 1.17B - Key Aspects - Business Case and Feasibility Analysis
    Lecture 24 1.17C - QAE 1 - Business Case and Feasibility Analysis
    Lecture 25 1.18A - Governance of third-party relationships
    Lecture 26 1.18B - Key Aspects - Governance of third-party relationships
    Lecture 27 1.18C - QAE 1 - Governance of third-party relationships
    Section 2: Domain 2 - Information Risk Management
    Lecture 28 2.1A - ISACA's Thinking Hat
    Lecture 29 2.1B - Risk Management Overview
    Lecture 30 2.2A - Risk Management Strategy
    Lecture 31 2.2B - Risk Capacity, Appetite and Tolerance
    Lecture 32 2.4A - Risk Assessment
    Lecture 33 2.4B - Risk Analysis Methodologies
    Lecture 34 2.4C - QAE 1 - Risk Assessment
    Lecture 35 2.5 - Information asset classification
    Lecture 36 2.6A - Asset Valuation
    Lecture 37 2.6B -QAE - Asset Valuation
    Lecture 38 2.7A - RTO & RPO
    Lecture 39 2.7B - SDO MTO AIW
    Lecture 40 2.8 - Outsourcing and Third Party Service Provider
    Lecture 41 2.10A - Change Management
    Lecture 42 2.10B - QAE - Change Management
    Lecture 43 2.11A - Patch Management
    Lecture 44 2.11B - QAE - Patch Management
    Lecture 45 2.12A - Security Baseline Control
    Lecture 46 2.12B - QAE - Security Baseline Control
    Lecture 47 Flashcards - Understanding the Risk
    Section 3: Domain 3 - Information Security Program
    Lecture 48 Chapter 3.1A - Defense in Depth
    Lecture 49 Chapter 3.1B - Information Security Program Development Management
    Lecture 50 3.2 - Information Security Program Objective
    Lecture 51 3.3A - Information Security Framework Components
    Lecture 52 3.3B - QAE - Information Security Framework Components
    Lecture 53 3.4A - Key Aspects - Information Security Program Road Map
    Lecture 54 Chapter 3.4B - QAE - Information Security Program Road Map - Copy
    Lecture 55 3.5A - Information Security Policy, Standard and Procedures
    Lecture 56 3.5B - QAE - Information Security Policy, Standard and Procedures
    Lecture 57 3.6 - Security Budget
    Lecture 58 3.7A - Key Aspects - Security Program Management and Administrative Activities
    Lecture 59 3.7B - QAE 1 - Security Program Management and Administrative Activities
    Lecture 60 3.8 - Privacy Laws
    Lecture 61 3.9 - Information Security Architecture
    Lecture 62 3.10A - Architecture Implementation
    Lecture 63 3.10B - QAE - Architecture Implementation
    Lecture 64 3.11A - Identity & Access Control
    Lecture 65 3.11B - Key Aspects - Identity & Access Control
    Lecture 66 3.11C - QAE - Identity & Access Control
    Lecture 67 3.12 - Biometrics
    Lecture 68 3.13 - Factor of Authentication
    Lecture 69 3.14 - Wireless Networks
    Lecture 70 3.15 - Different Attack Methods
    Lecture 71 3.16 - Cloud computing
    Lecture 72 3.17A - Fail 'Open' Fail 'Close'
    Lecture 73 3.17B - Key Aspects - Controls and Countermeasures
    Lecture 74 3.17C - QAE 1 - Controls and Countermeasures
    Lecture 75 3.18 - Vulnerability Assessment & Penetration Testing
    Lecture 76 3.19A - Key Aspects - Security Program Metrics and Monitoring
    Lecture 77 3.19B - QAE 1 - Security Program Metrics and Monitoring
    Lecture 78 CISM Flashcards - Domain 3
    Section 4: Domain 4 - Incident Management
    Lecture 79 4.1A - Firewall Types
    Lecture 80 4.1B - Firewall Implementation
    Lecture 81 4.1C - Proxy / Demilitarized Zone
    Lecture 82 4.2A - Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
    Lecture 83 4.2B - Key Aspects - IDS and IPS
    Lecture 84 4.3 - Digital Signature
    Lecture 85 4.4 - Elements of PKI
    Lecture 86 4.5 - Asymmetric Encryption
    Lecture 87 4.6A - Phases of Incident Management Life Cycle
    Lecture 88 4.6B - SDO-MTO-AIW
    Lecture 89 4.6C - Key Aspects - Incident Management Overview
    Lecture 90 4.6D - QAE 1 - Incident Management Overview
    Lecture 91 4.7A - Incident Response Procedure
    Lecture 92 4.7B - QAE - Incident Response Procedure
    Lecture 93 4.8A -Key Aspects - Developing Incident Response Plan
    Lecture 94 4.8B -QAE - Developing Incident Response Plan
    Lecture 95 4.9A - Business Continuity Plan
    Lecture 96 4.9B- Disaster Recovery Plan
    Lecture 97 4.9C - Business Impact Analysis
    Lecture 98 4.10A - Testing Incident Response Plan, BCP and DRP
    Lecture 99 4.10B - Key Aspects - Testing Incident Response Plan, BCP and DRP
    Lecture 100 4.10C - QAE - Testing Incident Response Plan, BCP and DRP
    Lecture 101 4.11 - Executing Response and Recovery Plan
    Lecture 102 4.12A Evidence Collection & Forensics
    Lecture 103 4.12B - Key Aspects - Post Incident Activities and Investigation
    Lecture 104 4.12C - QAE 1 - Post Incident Activities and Investigation
    Lecture 105 CISM Flashcards - Domain 4
    Information Security Professionals,IT Auditors,Risk Manager


    Download link

    rapidgator.net:
    Kod:
    https://rapidgator.net/file/f4ac6241fa2a3d67fba14728931a5461/ohypv.Certified.Information.Security.Manager.Cism..Isaca.part1.rar.html
    https://rapidgator.net/file/4808396118033d2c87e0394f6350ad9f/ohypv.Certified.Information.Security.Manager.Cism..Isaca.part2.rar.html
    https://rapidgator.net/file/7bc75c6490aebc946bea3198844a1bfb/ohypv.Certified.Information.Security.Manager.Cism..Isaca.part3.rar.html
    uploadgig.com:
    Kod:
    https://uploadgig.com/file/download/99e03b660299fD5b/ohypv.Certified.Information.Security.Manager.Cism..Isaca.part1.rar
    https://uploadgig.com/file/download/fd40d9D449A9269f/ohypv.Certified.Information.Security.Manager.Cism..Isaca.part2.rar
    https://uploadgig.com/file/download/1e128aE2Ceb1897e/ohypv.Certified.Information.Security.Manager.Cism..Isaca.part3.rar
    nitroflare.com:
    Kod:
    https://nitroflare.com/view/0800D900769C2E6/ohypv.Certified.Information.Security.Manager.Cism..Isaca.part1.rar
    https://nitroflare.com/view/A351E474A16184C/ohypv.Certified.Information.Security.Manager.Cism..Isaca.part2.rar
    https://nitroflare.com/view/E16B8336FDA29B4/ohypv.Certified.Information.Security.Manager.Cism..Isaca.part3.rar
    1dl.net:
    Kod:
    https://1dl.net/c1ocljgzf2we/ohypv.Certified.Information.Security.Manager.Cism..Isaca.part1.rar.html
    https://1dl.net/z44v23w6bbvs/ohypv.Certified.Information.Security.Manager.Cism..Isaca.part2.rar.html
    https://1dl.net/dm3pzs9p0vkq/ohypv.Certified.Information.Security.Manager.Cism..Isaca.part3.rar.html

  2. #2
    Üye odfamgaingnam30o - ait Kullanıcı Resmi (Avatar)
    Üyelik tarihi
    24.02.2022
    Yaş
    41
    Mesajlar
    19.748
    Konular
    0
    Bölümü
    Matematik
    Cinsiyet
    Erkek
    Tecrübe Puanı
    22

    Cevap: Certified Information Security Manager (Cism - Isaca)

    [Misafirler Kayıt Olmadan Link Göremezler Lütfen Kayıt İçin Tıklayın ! ] Äặt gạch
    Hỗ trợ 0101008867

 

 

Konu Bilgileri

Users Browsing this Thread

Şu an 1 kullanıcı var. (0 üye ve 1 konuk)

Konuyu Favori Sayfanıza Ekleyin

Konuyu Favori Sayfanıza Ekleyin

Yetkileriniz

  • Konu Acma Yetkiniz Yok
  • Cevap Yazma Yetkiniz Yok
  • Eklenti Yükleme Yetkiniz Yok
  • Mesajınızı Değiştirme Yetkiniz Yok
  •