Certified Information Security Manager Video Course

CISM: Certified Information Security Manager

Your Isaca CISM exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CISM certification test. Ace your Isaca CISM at the first attempt and obtain the Certified Information Security Manager credential with ease.

# of Students
523
# of Lectures
388
Course Length
14 h
Course Rating
4.5
Price $27.49
Today $24.99

Curriculum for CISM Video Course

Course Introduction

  Video Name Time
  1. Course Introduction 01:02
  Video Name Time
  1. Lesson 1: Information Security Governance Overview 00:53
  2. Information Security Governance Overview Part1 01:12
  3. Information Security Governance Overview Part2 02:00
  4. Information Security Governance Overview Part3 01:22
  5. Information Security Governance Overview Part4 01:32
  6. Information Security Governance Overview Part5 00:30
  7. Importance of Information Security Governance Part1 06:21
  8. Importance of Information Security Governance Part2 01:19
  9. Outcomes of Information Security Governance Part1 00:33
  10. Outcomes of Information Security Governance Part2 01:26
  11. Outcomes of Information Security Governance Part3 02:45
  12. Outcomes of Information Security Governance Part4 01:27
  13. Outcomes of Information Security Governance Part5 01:54
  14. Outcomes of Information Security Governance Part6 01:28
  15. Lesson 2: Effective Information Security Governance 00:31
  16. Business Goals and Objectives Part1 01:31
  17. Business Goals and Objectives Part2 02:00
  18. Roles and Responsibilities of Senior Management Part1 01:02
  19. Roles and Responsibilities of Senior Management Part2 00:43
  20. Domain Tasks Part1 01:21
  21. Domain Tasks Part2 03:16
  22. Business Model for Information Security Part1 00:45
  23. Business Model for Information Security Part2 01:09
  24. Business Model for Information Security Part3 03:16
  25. Business Model for Information Security Part4 01:37
  26. Dynamic Interconnections Part1 00:34
  27. Dynamic Interconnections Part2 02:55
  28. Dynamic Interconnections Part3 01:55
  29. Dynamic Interconnections Part4 00:51
  30. Lesson 3: Information Security Concepts and Technologies 03:27
  31. Information Security Concepts and Technologies Part1 02:58
  32. Information Security Concepts and Technologies Part2 03:25
  33. Information Security Concepts and Technologies Part3 01:50
  34. Technologies Part1 01:41
  35. Technologies Part2 06:12
  36. Lesson 4: Information Security Manager 00:33
  37. Responsibilities 01:48
  38. Senior Management Commitment Part1 00:48
  39. Senior Management Commitment Part2 02:27
  40. Obtaining Senior Management Commitment Part1 00:24
  41. Obtaining Senior Management Commitment Part2 00:53
  42. Establishing Reporting and Communication Channels Part1 01:13
  43. Establishing Reporting and Communication Channels Part2 01:07
  44. Lesson 5: Scope and Charter of Information Security Governance 01:55
  45. Assurance Process Integration and Convergence 02:24
  46. Convergence 02:32
  47. Governance and Third-Party Relationships 02:38
  48. Lesson 6: Information Security Governance Metrics 00:56
  49. Metrics 01:39
  50. Effective Security Metrics Part1 01:46
  51. Effective Security Metrics Part2 01:01
  52. Effective Security Metrics Part3 01:51
  53. Effective Security Metrics Part4 00:39
  54. Security Implementation Metrics 01:17
  55. Strategic Alignment Part1 02:56
  56. Strategic Alignment Part2 01:11
  57. Risk Management 01:14
  58. Value Delivery 01:02
  59. Resource Management Part1 00:47
  60. Resource Management Part2 00:41
  61. Performance Measurement 03:06
  62. Assurance Process Integration/Convergence 02:54
  63. Lesson 7: Information Security Strategy Overview 00:53
  64. Another View of Strategy 00:41
  65. Lesson 8: Creating Information Security Strategy 00:16
  66. Information Security Strategy 01:22
  67. Common Pitfalls Part1 04:38
  68. Common Pitfalls Part2 02:19
  69. Objectives of the Information Security Strategy 01:33
  70. What is the Goal? 01:40
  71. Defining Objectives 01:23
  72. Business Linkages 01:48
  73. Business Case Development Part1 01:44
  74. Business Case Development Part2 02:36
  75. Business Case Development Part3 00:45
  76. Business Case Objectives 00:57
  77. The Desired State 01:48
  78. COBIT 01:08
  79. COBIT Controls 01:09
  80. COBIT Framework 00:48
  81. Capability Maturity Model 01:38
  82. Balanced Scorecard 01:22
  83. Architectural Approaches 01:03
  84. ISO/IEC 27001 and 27002 01:00
  85. Risk Objectives Part1 01:39
  86. Risk Objectives Part2 03:11
  87. Lesson 9: Determining Current State Of Security 00:45
  88. Current Risk Part1 02:37
  89. Current Risk Part2 01:11
  90. BIA 01:11
  91. Lesson 10: Information Security Strategy Development 01:52
  92. The Roadmap 01:01
  93. Elements of a Strategy 03:27
  94. Strategy Resources and Constraints 02:46
  95. Lesson 11: Strategy Resources 00:32
  96. Policies and Standards 01:01
  97. Definitions 05:48
  98. Enterprise Information Security Architectures 01:30
  99. Controls 03:00
  100. Countermeasures 00:55
  101. Technologies 01:50
  102. Personnel 01:54
  103. Organizational Structure 03:47
  104. Employee Roles and Responsibilities 00:28
  105. Skills 01:17
  106. Audits 01:41
  107. Compliance Enforcement 02:24
  108. Threat Assessment 01:41
  109. Vulnerability Assessment 02:21
  110. Risk Assessment 02:19
  111. Insurance 02:04
  112. Business Impact Assessment 02:32
  113. Outsourced Security Providers 02:57
  114. Lesson 12: Strategy Constraints 00:23
  115. Legal and Regulatory Requirements 01:43
  116. Physical Constraints 02:56
  117. The Security Strategy 01:36
  118. Lesson 13: Action Plan to Implement Strategy 01:13
  119. Gap Analysis Part1 01:35
  120. Gap Analysis Part2 00:52
  121. Gap Analysis Part3 03:01
  122. Policy Development Part1 01:42
  123. Policy Development Part2 01:00
  124. Standards Development 02:45
  125. Training and Awareness 00:35
  126. Action Plan Metrics 01:23
  127. General Metric Considerations Part1 00:23
  128. General Metric Considerations Part2 00:35
  129. General Metric Considerations Part3 00:43
  130. General Metric Considerations Part4 00:23
  131. CMM4 Statements 02:00
  132. Objectives for CMM4 00:47
  133. Domain 01 Review 00:44
  Video Name Time
  1. Lesson 1: Risk Management Overview 00:59
  2. Risk Management Overview 01:51
  3. Types of Risk Analysis 07:08
  4. The Importance of Risk Management 02:14
  5. Risk Management Outcomes 01:35
  6. Risk Management Strategy 01:49
  7. Lesson 2: Good Information Security Risk Management 04:14
  8. Context and Purpose 03:08
  9. Scope and Charter 00:39
  10. Assets 02:31
  11. Other Risk Management Goals 02:02
  12. Roles and Responsibilities 02:52
  13. Lesson 3: Information Security Risk Management Concepts 06:06
  14. Technologies 06:39
  15. Lesson 4: Implementing Risk Management 02:08
  16. The Risk Management Framework 02:00
  17. The External Environment 01:48
  18. The Internal Environment 02:07
  19. The Risk Management Context 00:47
  20. Gap Analysis 02:21
  21. Other Organizational Support 04:09
  22. Risk Analysis 01:22
  23. Lesson 5: Risk Assessment 01:19
  24. NIST Risk Assessment Methodology 03:49
  25. Aggregated or Cascading Risk 02:54
  26. Other Risk Assessment Approaches 01:18
  27. Identification of Risks 01:49
  28. Threats 01:08
  29. Vulnerabilities Part1 02:11
  30. Vulnerabilities Part2 04:10
  31. Risks 01:36
  32. Analysis of Relevant Risks 01:48
  33. Risk Analysis 02:29
  34. Semi -Quantitative Analysis 01:52
  35. Quantitative Analysis Example 04:14
  36. Evaluation of Risks 00:46
  37. Risk Treatment Options 04:39
  38. Impact 02:59
  39. Lesson 6: Controls Countermeasures 00:25
  40. Controls 04:43
  41. Residual Risk 03:38
  42. Information Resource Valuation 01:33
  43. Methods of Valuing Assets 01:36
  44. Information Asset Classification 03:32
  45. Determining Classification 02:05
  46. Impact Part1 03:53
  47. Impact Part2 01:03
  48. Lesson 7: Recovery Time Objectives 00:49
  49. Recovery Point Objectives 04:18
  50. Service Delivery Objectives 01:58
  51. Third-Party Service Providers 01:44
  52. Working with Lifecycle Processes 02:08
  53. IT System Development 02:12
  54. Project Management Part1 00:47
  55. Project Management Part2 02:10
  56. Lesson 8: Risk Monitoring and Communication 01:17
  57. Risk Monitoring and Communication 00:38
  58. Other Communications 01:25
  59. Domain 02 Review 01:01
  Video Name Time
  1. Introduction 00:31
  2. Lesson 1: Development of Information Security Program 02:50
  3. Importance of the Program 00:52
  4. Outcomes of Security Program Development 01:47
  5. Effective Information Security Program Development 04:59
  6. Lesson 2: Information Security Program Objectives 00:10
  7. Cross Organizational Responsibilities 01:55
  8. Program Objectives Part1 02:23
  9. Program Objectives Part2 01:18
  10. Defining Objectives Part1 02:11
  11. Defining Objectives Part2 01:08
  12. Lesson 3: Information Security Program Development Concepts Part1 04:02
  13. Information Security Program Development Concepts Part2 05:39
  14. Technology Resources 02:44
  15. Information Security Manager 01:25
  16. Lesson 4: Scope and Charter of Information Security Program Development 00:30
  17. Assurance Function Integration 01:35
  18. Challenges in Developing Information Security Program 01:54
  19. Pitfalls 02:48
  20. Objectives of the Security Program 02:06
  21. Program Goals 02:52
  22. The Steps of the Security Program 01:46
  23. Defining the Roadmap Part1 01:38
  24. Defining the Roadmap Part2 00:58
  25. Elements of the Roadmap Part1 01:18
  26. Elements of the Roadmap Part2 00:34
  27. Elements of the Roadmap Part3 01:57
  28. Elements of the Roadmap Part4 01:17
  29. Elements of the Roadmap Part5 00:18
  30. Gap Analysis 00:44
  31. Lesson 5: Information Security Management Framework 00:15
  32. Security Management Framework 04:55
  33. COBIT 5 05:59
  34. ISO/IEC 27001 04:30
  35. Lesson 6: Information Security Framework Components 00:13
  36. Operational Components Part1 01:56
  37. Operational Components Part2 03:11
  38. Management Components 01:31
  39. Administrative Components 03:30
  40. Educational and Informational Components 01:26
  41. Lesson 7: Information Security Program Resources 01:32
  42. Resources 03:27
  43. Documentation 00:54
  44. Enterprise Architecture Part1 04:29
  45. Enterprise Architecture Part2 01:54
  46. Enterprise Architecture Part3 01:11
  47. Controls as Strategy Implementation Resources Part1 03:42
  48. Controls as Strategy Implementation Resources Part2 02:20
  49. Controls as Strategy Implementation Resources Part3 04:35
  50. Controls as Strategy Implementation Resources Part4 02:19
  51. Common Control Practices 01:41
  52. Countermeasures 00:37
  53. Technologies Part1 01:13
  54. Technologies Part2 01:52
  55. Technologies Part3 01:39
  56. Technologies Part4 05:38
  57. Personnel Part1 02:00
  58. Personnel Part2 02:56
  59. Security Awareness 01:28
  60. Awareness Topics 05:18
  61. Formal Audits 01:16
  62. Compliance Enforcement 01:03
  63. Project Risk Analysis 03:09
  64. Other Actions 02:58
  65. Other Organizational Support 01:21
  66. Program Budgeting Part1 01:03
  67. Program Budgeting Part2 02:19
  68. Lesson 8: Implementing an Information Security Program 00:13
  69. Policy Compliance 02:38
  70. Standards Compliance 02:44
  71. Training and Education 01:43
  72. ISACA Control Objectives 03:52
  73. Third-party Service Providers Part1 01:08
  74. Third-party Service Providers Part2 04:22
  75. Integration into Lifecycle Processes 02:14
  76. Monitoring and Communication 03:33
  77. Documentation 01:33
  78. The Plan of Action Part1 01:17
  79. The Plan of Action Part2 01:36
  80. Lesson 9: Information Infrastructure and Architecture 00:53
  81. Managing Complexity Part1 04:42
  82. Managing Complexity Part2 01:45
  83. Objectives of Information Security Architectures Part1 01:30
  84. Objectives of Information Security Architectures Part2 01:15
  85. Physical and Environmental Controls 03:32
  86. Lesson 10: Information Security Program 03:03
  87. Information Security Program Deployment Metrics 02:27
  88. Metrics 02:02
  89. Strategic Alignment 00:53
  90. Risk Management 01:41
  91. Value Delivery 00:35
  92. Resource Management 01:23
  93. Assurance Process Integration 00:27
  94. Performance Measurement 00:41
  95. Security Baselines 00:38
  96. Lesson 11: Security Program Services and Operational Activities 00:48
  97. IS Liaison Responsibilities Part1 10:17
  98. IS Liaison Responsibilities Part2 02:28
  99. Cross-Organizational Responsibilities 01:34
  100. Security Reviews and Audits Part1 03:27
  101. Security Reviews and Audits Part2 01:38
  102. Management of Security Technology 01:25
  103. Due Diligence Part1 04:10
  104. Due Diligence Part2 01:36
  105. Compliance Monitoring and Enforcement Part1 02:02
  106. Compliance Monitoring and Enforcement Part2 01:46
  107. Assessment of Risk and Impact Part1 02:17
  108. Assessment of Risk and Impact Part2 01:28
  109. Outsourcing and Service Providers 02:33
  110. Cloud Computing Part1 01:37
  111. Cloud Computing Part2 01:54
  112. Cloud Computing Part3 02:23
  113. Integration with IT Processes 00:42
  114. Domain 03 Review 01:13
  Video Name Time
  1. Lesson 1: Incident Management Overview Part1 00:47
  2. Incident Management Overview Part2 03:08
  3. Incident Management Overview Part3 03:45
  4. Types of Events Part1 02:44
  5. Types of Events Part2 03:20
  6. Goals of Incident Management Part1 04:45
  7. Goals of Incident Management Part2 06:31
  8. Goals of Incident Management Part3 03:26
  9. Lesson 2: Incident Response Procedures Part1 00:23
  10. Incident Response Procedures Part2 03:40
  11. Importance of Incident Management 08:01
  12. Outcomes of Incident Management 03:50
  13. Incident Management 01:35
  14. Concepts Part1 03:44
  15. Concepts Part2 01:35
  16. Concepts Part3 01:34
  17. Incident Management Systems Part1 04:02
  18. Incident Management Systems Part2 00:53
  19. Lesson 3: Incident Management Organization 02:31
  20. Responsibilities Part1 03:44
  21. Responsibilities Part2 02:58
  22. Responsibilities Part3 05:10
  23. Senior Management Commitment 01:02
  24. Lesson 4: Incident Management Resources 00:25
  25. Policies and Standards 00:36
  26. Incident Response Technology Concepts 11:12
  27. Personnel 03:11
  28. Roles and Responsibilities (eNotes) 08:24
  29. Skills 08:09
  30. Awareness and Education 01:20
  31. Audits 02:49
  32. Lesson 5: Incident Management Objectives 00:17
  33. Defining Objectives 00:48
  34. The Desired State 03:29
  35. Strategic Alignment 06:42
  36. Other Concerns 02:33
  37. Lesson 6: Incident Management Metrics and Indicators 05:14
  38. Implementation of the Security Program Management 03:01
  39. Management Metrics and Monitoring Part1 01:35
  40. Management Metrics and Monitoring Part2 02:48
  41. Other Security Monitoring Efforts 04:24
  42. Lesson 7: Current State of Incident Response Capability 00:11
  43. Threats 04:39
  44. Vulnerabilities 06:15
  45. Lesson 8: Developing an Incident Response Plan 00:44
  46. Elements of an Incident Response Plan 08:19
  47. Gap Analysis 03:05
  48. BIA Part1 05:05
  49. BIA Part2 02:48
  50. Escalation Process for Effective IM 02:45
  51. Help Desk Processes for Identifying Security Incidents 01:27
  52. Incident Management and Response Teams 02:10
  53. Organizing, Training, and Equipping the Response Staff 01:55
  54. Incident Notification Process 00:55
  55. Challenges in making an Incident Management Plan 02:18
  56. Lesson 9: BCP/DRP 07:49
  57. Goals of Recovery Operations Part1 02:02
  58. Goals of Recovery Operations Part2 01:57
  59. Choosing a Site Selection Part1 05:37
  60. Choosing a Site Selection Part2 01:18
  61. Implementing the Strategy 03:58
  62. Incident Management Response Teams 02:10
  63. Network Service High-availability 04:17
  64. Storage High-availability 04:01
  65. Risk Transference 01:27
  66. Other Response Recovery Plan Options 01:29
  67. Lesson 10: Testing Response and Recovery Plans 02:17
  68. Periodic Testing 01:17
  69. Analyzing Test Results Part1 02:06
  70. Analyzing Test Results Part2 03:39
  71. Measuring the Test Results 00:58
  72. Lesson 11: Executing the Plan 01:56
  73. Updating the Plan 01:15
  74. Intrusion Detection Policies 01:38
  75. Who to Notify about an Incident 01:52
  76. Recovery Operations 01:53
  77. Other Recovery Operations 01:57
  78. Forensic Investigation 03:05
  79. Hacker / Penetration Methodology 11:50
  80. Domain 04 Review 01:15
  81. Course Closure 00:34

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
4.5
Rating: 4.5
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • Amazon
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CyberArk
  • Databricks
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • Isaca
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mirantis
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Oracle
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • Isaca
Next Step
Next Step