
10.73 GB | 9min 5s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
FileName :1 - 01 Introduction to the CISM Exam Preparation.mp4 | Size: (16.36 MB)
FileName :2 - 02 Getting Started Planning Your Study.mp4 | Size: (17.33 MB)
FileName :3 - 03 Using the CISM Review Manual Effectively.mp4 | Size: (16.83 MB)
FileName :4 - 04 Types of Questions on the CISM Exam.mp4 | Size: (22.48 MB)
FileName :5 - 05 Using ISACA Exam Preparation Resources.mp4 | Size: (21.83 MB)
FileName :6 - 06 CISM Review Questions, Answers & Explanations Manual.mp4 | Size: (25.45 MB)
FileName :7 - 07 CISM Review QAE Database.mp4 | Size: (23.73 MB)
FileName :8 - 08 Important Final Note on Exam Preparation.mp4 | Size: (20.21 MB)
FileName :9 - Instructor Introduction.mp4 | Size: (8.99 MB)
FileName :1 - 1 1 Importance of Information Security Governance.mp4 | Size: (35.89 MB)
FileName :2 - 1 1 Importance of Information Security Governance.mp4 | Size: (28.29 MB)
FileName :3 - 1 1 1 Outcomes of Information Security Governance.mp4 | Size: (27.21 MB)
FileName :4 - 1 1 2 Scope and Charter of information Security Governance.mp4 | Size: (28.64 MB)
FileName :5 - 1 2 Organizational Culture.mp4 | Size: (28.52 MB)
FileName :6 - 1 2 1 Acceptable Use Policy (AUP).mp4 | Size: (30.51 MB)
FileName :7 - 1 2 2 Ethics in Information Security.mp4 | Size: (30.1 MB)
FileName :8 - 1 3 Legal, Regulatory & Contractual Requirements.mp4 | Size: (26.11 MB)
FileName :9 - 1 3 1 Business Record Content & Retention Requirements.mp4 | Size: (22.14 MB)
FileName :10 - 1 4 Organizational Structures, Roles & Responsibilities.mp4 | Size: (26.44 MB)
FileName :11 - 1 4 1 Roles and Responsibilities in Security Governance.mp4 | Size: (23.93 MB)
FileName :12 - 1 4 1 1 Skills in Defining Roles & Responsibilities.mp4 | Size: (25.47 MB)
FileName :13 - 1 4 1 2 Role of the Board of Directors in Security Governance.mp4 | Size: (27.52 MB)
FileName :14 - 1 4 1 3 Role of Senior Management in Security Governance.mp4 | Size: (34.03 MB)
FileName :15 - 1 4 1 4 Role of Business Process Owners (BPOs).mp4 | Size: (20.8 MB)
FileName :16 - 1 4 1 5 Chief Information Security Officer (CISO).mp4 | Size: (31.62 MB)
FileName :17 - 1 4 1 6 Risk Management Roles & Responsibilities.mp4 | Size: (21.61 MB)
FileName :18 - 1 5 Information Security Strategy Development.mp4 | Size: (21.46 MB)
FileName :19 - 1 5 1 Business Goals and Objectives.mp4 | Size: (24.79 MB)
FileName :20 - 1 5 2 Information Security Strategy Objectives.mp4 | Size: (26.62 MB)
FileName :21 - 1 5 3 Ensuring Objective and Business Integration.mp4 | Size: (30.91 MB)
FileName :22 - 1 5 3 1 Business Linkages in Information Security Strategy.mp4 | Size: (30.7 MB)
FileName :23 - 1 5 4 Avoiding Common Pitfalls and Bias.mp4 | Size: (25.6 MB)
FileName :24 - 1 5 5 Defining the Desired State of Information Security.mp4 | Size: (28.28 MB)
FileName :25 - 1 5 5 1 Business Model for Information Security (BMIS).mp4 | Size: (32.17 MB)
FileName :26 - 1 5 5 2 Dynamic Interconnections in BMIS.mp4 | Size: (25.69 MB)
FileName :27 - 1 5 5 3 Governance, Risk Management & Compliance (GRC).mp4 | Size: (25.74 MB)
FileName :28 - 1 5 6 Information Security Strategy Development.mp4 | Size: (30.43 MB)
FileName :29 - 1 5 7 Elements of a Strategy.mp4 | Size: (26.36 MB)
FileName :30 - 1 5 7 1 Resources and Constraints Overview.mp4 | Size: (34.11 MB)
FileName :31 - 1 5 7 2 Constraints in Information Security Strategy.mp4 | Size: (26.67 MB)
FileName :32 - 1 6 Information Governance Frameworks and Standards.mp4 | Size: (33.35 MB)
FileName :33 - 1 6 1 Balanced Scorecard in Information Security Governance.mp4 | Size: (26.74 MB)
FileName :34 - 1 6 2 Architectural Approaches in Information Security.mp4 | Size: (32.32 MB)
FileName :35 - 1 6 3 Enterprise Risk Management (ERM) Frameworks.mp4 | Size: (22.73 MB)
FileName :36 - 1 6 4 1 ISOIEC 27000 Series for Information Security.mp4 | Size: (32.44 MB)
FileName :37 - 1 6 4 2 NIST Cybersecurity Framework (CSF).mp4 | Size: (25.45 MB)
FileName :38 - 1 6 4 3 NIST Risk Management Framework (RMF).mp4 | Size: (32.57 MB)
FileName :39 - 1 6 4 4 Other Approaches to Information Security Strategy.mp4 | Size: (35.46 MB)
FileName :40 - 1 7 Strategic Planning.mp4 | Size: (23.25 MB)
FileName :41 - 1 7 1 Workforce Composition and Skills.mp4 | Size: (26.15 MB)
FileName :42 - 1 7 1 1 Organizational Structure and Its Impact.mp4 | Size: (25.98 MB)
FileName :43 - 1 7 1 2 Centralized vs Decentralized Security Approaches.mp4 | Size: (37.54 MB)
FileName :44 - 1 7 1 3 Employee Roles & Responsibilities.mp4 | Size: (24.25 MB)
FileName :45 - 1 7 1 4 Skills for Security Strategy Implementation.mp4 | Size: (29.04 MB)
FileName :46 - 1 7 1 5 Awareness and Education.mp4 | Size: (23.54 MB)
FileName :47 - 1 7 2 Assurance Provisions.mp4 | Size: (27.07 MB)
FileName :48 - 1 7 2 1 Audits.mp4 | Size: (29.96 MB)
FileName :49 - 1 7 2 2 Compliance Enforcement.mp4 | Size: (27.79 MB)
FileName :50 - 1 7 3 Risk Assessment and Management.mp4 | Size: (29.44 MB)
FileName :51 - 1 7 3 1 Business Impact Analysis (BIA).mp4 | Size: (27.63 MB)
FileName :52 - 1 7 3 2 Resource Dependency Analysis.mp4 | Size: (23.55 MB)
FileName :53 - 1 7 3 3 Outsourced Services in Security Strategy.mp4 | Size: (34.09 MB)
FileName :54 - 1 7 3 4 Threat Assessment.mp4 | Size: (32.12 MB)
FileName :55 - 1 7 3 5 Vulnerability Assessment.mp4 | Size: (29.88 MB)
FileName :56 - 1 7 3 6 Insurance as a Risk Treatment.mp4 | Size: (25.34 MB)
FileName :57 - 1 7 3 7 Organizational Support and Assurance Providers.mp4 | Size: (30.32 MB)
FileName :58 - 1 7 4 Action Plan to Implement Strategy.mp4 | Size: (22 MB)
FileName :59 - 1 7 4 1 Gap Analysis Basis for an Action Plan.mp4 | Size: (30.71 MB)
FileName :60 - 1 7 4 2 Action Plan Metrics.mp4 | Size: (21.73 MB)
FileName :61 - 1 7 4 3 Key Goal Indicators (KGIs).mp4 | Size: (20.4 MB)
FileName :62 - 1 7 4 5 General Metrics Considerations.mp4 | Size: (27.09 MB)
FileName :63 - 1 7 4 6 Action Plan Intermediate Goals.mp4 | Size: (32.34 MB)
FileName :64 - 1 7 5 Information Security Program Objectives.mp4 | Size: (33.4 MB)
FileName :1 - Part A Information Risk Assessment.mp4 | Size: (34.94 MB)
FileName :2 - 2 1 Emerging Risk and Threat Landscape.mp4 | Size: (21.31 MB)
FileName :3 - 2 1 1 Risk Identification.mp4 | Size: (19.81 MB)
FileName :4 - 2 1 2 Threats.mp4 | Size: (22.26 MB)
FileName :5 - 2 1 2 1 Internal Threats.mp4 | Size: (20.88 MB)
FileName :6 - 2 1 2 2 External Threats.mp4 | Size: (23.45 MB)
FileName :7 - 2 1 2 3 Advanced Persistent Threats (APTs).mp4 | Size: (32.63 MB)
FileName :8 - 2 1 3 Defining a Risk Management Framework.mp4 | Size: (36.88 MB)
FileName :9 - 2 1 3 1 Defining the External Environment.mp4 | Size: (24.54 MB)
FileName :10 - 2 1 3 2 Defining the External Environment.mp4 | Size: (20.76 MB)
FileName :11 - 2 1 4 Risk, Likelihood and Impact.mp4 | Size: (19 MB)
FileName :12 - 2 1 5 Risk Register.mp4 | Size: (22.47 MB)
FileName :13 - 2 1 6 Emerging Threats.mp4 | Size: (22.4 MB)
FileName :14 - 2 2 Vulnerability and Control Deficiency Analysis.mp4 | Size: (28.56 MB)
FileName :15 - 2 2 1 Security Control Baselines.mp4 | Size: (27.84 MB)
FileName :16 - 2 2 2 Events Affecting Security Baselines.mp4 | Size: (23.93 MB)
FileName :17 - 2 3 Risk Analysis, Evaluation and Assessment.mp4 | Size: (28.52 MB)
FileName :18 - 2 3 1 Determining the Risk Management Context.mp4 | Size: (28.39 MB)
FileName :19 - 2 3 2 Operational Risk Management.mp4 | Size: (24.85 MB)
FileName :20 - 2 3 3 Risk Management Integration with IT Life Cycle Management Processes.mp4 | Size: (28.07 MB)
FileName :21 - 2 3 4 Risk Scenarios.mp4 | Size: (23.06 MB)
FileName :22 - 2 3 5 Risk Assessment Process.mp4 | Size: (43 MB)
FileName :23 - 2 3 6 Risk Assessment & Analysis Methodologies.mp4 | Size: (31.45 MB)
FileName :24 - 2 3 6 1 NIST Risk Assessment Methodology.mp4 | Size: (24.93 MB)
FileName :25 - 2 3 6 2 Cascading Risk.mp4 | Size: (19.91 MB)
FileName :26 - 2 3 7 Other Risk Assessment Approaches.mp4 | Size: (20.02 MB)
FileName :27 - 2 3 7 1 Holistic Approach to Risk Management (HARM).mp4 | Size: (22.2 MB)
FileName :28 - 2 3 7 2 Probabilistic Risk Assessment.mp4 | Size: (26.92 MB)
FileName :29 - 2 3 8 Risk Analysis.mp4 | Size: (20.69 MB)
FileName :30 - 2 3 8 1 Gap Analysis.mp4 | Size: (18.72 MB)
FileName :31 - 2 3 8 2 Qualitative Risk Analysis.mp4 | Size: (14.61 MB)
FileName :32 - 2 3 8 3 Semi-Quantitative (Hybrid) Risk Analysis.mp4 | Size: (16.67 MB)
FileName :33 - 2 3 8 4 Quantitative Analysis.mp4 | Size: (21.67 MB)
FileName :34 - 2 3 8 5 Annual Loss Expectancy.mp4 | Size: (18.64 MB)
FileName :35 - 2 3 8 6 Value at Risk (VaR) in Risk Management.mp4 | Size: (18.54 MB)
FileName :36 - 2 3 8 7 Other Risk Analysis Methods.mp4 | Size: (32.56 MB)
FileName :37 - 2 3 9 Risk Evaluation.mp4 | Size: (18.8 MB)
FileName :38 - 2 3 10 Risk Ranking.mp4 | Size: (21.14 MB)
FileName :39 - Part B Information Risk Response.mp4 | Size: (22.01 MB)
FileName :40 - 2 4 Risk Treatment Risk Response Options.mp4 | Size: (20.87 MB)
FileName :41 - 2 4 1 Determining Risk Capacity and Acceptable Risk (Risk Appetite).mp4 | Size: (23.84 MB)
FileName :42 - 2 4 2 Risk Response Options.mp4 | Size: (20.34 MB)
FileName :43 - 2 4 2 1 Terminate the Activity.mp4 | Size: (15.79 MB)
FileName :44 - 2 4 2 2 Transfer the Risk.mp4 | Size: (13.88 MB)
FileName :45 - 2 4 2 3 Mitigate the Risk.mp4 | Size: (19.8 MB)
FileName :46 - 2 4 2 4 Accept the Risk.mp4 | Size: (24.02 MB)
FileName :47 - 2 4 4 Inherent and Residual Risk.mp4 | Size: (16.46 MB)
FileName :48 - 2 4 5 Impact.mp4 | Size: (19.55 MB)
FileName :49 - 2 4 6 Controls.mp4 | Size: (20.04 MB)
FileName :50 - 2 4 7 Legal and Regulatory Requirements.mp4 | Size: (22.69 MB)
FileName :51 - 2 4 8 Costs and Benefits.mp4 | Size: (14.03 MB)
FileName :52 - 2 5 Risk and Control Ownership.mp4 | Size: (19.91 MB)
FileName :53 - 2 5 1 Risk Ownership and Accountability.mp4 | Size: (19.54 MB)
FileName :54 - 2 5 2 Risk Owner.mp4 | Size: (17.32 MB)
FileName :55 - 2 5 3 Control Owner.mp4 | Size: (20.15 MB)
FileName :56 - 2 6 Risk Monitoring and Reporting.mp4 | Size: (17.2 MB)
FileName :57 - 2 6 1 Risk Monitoring.mp4 | Size: (16.66 MB)
FileName :58 - 2 6 2 Key Risk Indicators.mp4 | Size: (18.86 MB)
FileName :59 - 2 6 3 Reporting Changes in Risk.mp4 | Size: (20.47 MB)
FileName :60 - 2 6 4 Risk Communication, Awareness and Consulting.mp4 | Size: (25.56 MB)
FileName :61 - 2 6 4 1 Risk Awareness.mp4 | Size: (21.14 MB)
FileName :62 - 2 6 5 Documentation.mp4 | Size: (10.89 MB)
FileName :1 - Part A Information Security Program Development.mp4 | Size: (23.58 MB)
FileName :2 - 3 1 Information Security Program Overview.mp4 | Size: (26.11 MB)
FileName :3 - 3 1 1 Information Security Management Trends.mp4 | Size: (19.49 MB)
FileName :4 - 3 1 2 Essential Security Program Elements.mp4 | Size: (25.88 MB)
FileName :5 - 3 1 3 Importance of the Information Security Program.mp4 | Size: (25.33 MB)
FileName :6 - 3 1 4 Applying the Security Program Business Case.mp4 | Size: (28.48 MB)
FileName :7 - 3 1 5 Outcomes of Information Security Program Management.mp4 | Size: (18.74 MB)
FileName :8 - 3 1 5 1 Risk Management in Information Security.mp4 | Size: (18.74 MB)
FileName :9 - 3 1 5 2 Value Delivery in Information Security.mp4 | Size: (25.02 MB)
FileName :10 - 3 1 5 3 Resource Management in Information Security.mp4 | Size: (28.57 MB)
FileName :11 - 3 1 5 4 Performance Measurement in Information Security.mp4 | Size: (25.75 MB)
FileName :12 - 3 1 5 5 Assurance Process Integration.mp4 | Size: (21.53 MB)
FileName :13 - 3 2 Information Security Program Resources.mp4 | Size: (18.65 MB)
FileName :14 - 3 2 1 Information Security Program Objectives.mp4 | Size: (19.33 MB)
FileName :15 - 3 2 1 1 Defining Objectives of the Information Security Program.mp4 | Size: (16.67 MB)
FileName :16 - 3 2 2 Concepts Information Security Program.mp4 | Size: (26.61 MB)
FileName :17 - 3 2 2 1 Management and Process Concepts in Security Program Implementation.mp4 | Size: (24.35 MB)
FileName :18 - 3 2 2 2 Technology Resources in an Information Security Program.mp4 | Size: (26.26 MB)
FileName :19 - 3 2 3 Scope and Charter of an Information Security Program.mp4 | Size: (24.53 MB)
FileName :20 - 3 2 4 Common Information Security Program.mp4 | Size: (32.68 MB)
FileName :21 - 3 2 4 1 The Critical Role of Management Support.mp4 | Size: (25.01 MB)
FileName :22 - 3 2 4 2 Overcoming Funding Challenges in InfoSec.mp4 | Size: (25.03 MB)
FileName :23 - 3 2 4 3 Staffing Challenges in Information Security.mp4 | Size: (27.57 MB)
FileName :24 - 3 2 5 Common Constraints in Information Security Program Development.mp4 | Size: (25.63 MB)
FileName :25 - 3 2 5 1 Physical Constraints in Information Security Programs.mp4 | Size: (22.12 MB)
FileName :26 - 3 2 5 2 Ethical Considerations in Information Security Programs.mp4 | Size: (19.76 MB)
FileName :27 - 3 2 5 3 The Role of Culture in Information Security Programs.mp4 | Size: (29.07 MB)
FileName :28 - 3 2 5 4 The Impact of Organizational Structure on Information Security.mp4 | Size: (23 MB)
FileName :29 - 3 2 5 5 Managing Costs in Information Security Program Implementation.mp4 | Size: (19.54 MB)
FileName :30 - 3 2 5 6 Cost Justification and ROI in Security Programs.mp4 | Size: (18.32 MB)
FileName :31 - 3 2 5 7 Personnel Resistance in Security Program Implementation.mp4 | Size: (18.66 MB)
FileName :32 - 3 2 5 8 Resource Planning for Effective Security Strategy.mp4 | Size: (19.64 MB)
FileName :33 - 3 2 5 9 Life Cycle of Security Resources.mp4 | Size: (13.4 MB)
FileName :34 - 3 2 5 10 Time as a Strategic Constraint.mp4 | Size: (25.04 MB)
FileName :35 - 3 2 5 11 Technology as a Constraint in Security Strategy Implementation.mp4 | Size: (21.4 MB)
FileName :36 - 3 3 Information Asset Identification and Classification.mp4 | Size: (22.81 MB)
FileName :37 - 3 3 1 Information Asset Identification and Valuation.mp4 | Size: (19.84 MB)
FileName :38 - 3 3 2 Information Asset Valuation Stratégies.mp4 | Size: (15.82 MB)
FileName :39 - 3 3 3 Information Asset Classification.mp4 | Size: (17.87 MB)
FileName :40 - 3 3 3 1 Information Asset Classification Benefits & Key Questions.mp4 | Size: (21.2 MB)
FileName :41 - 3 3 4 Determining Asset Criticality & Impact of Adverse Events.mp4 | Size: (17.25 MB)
FileName :42 - 3 4 Industry Standards and Frameworks for Information Security.mp4 | Size: (23.21 MB)
FileName :43 - 3 4 1 Enterprise Information Security Architectures.mp4 | Size: (20.34 MB)
FileName :44 - 3 4 1 1Alternative Frameworks for Enterprise & Security Architecture.mp4 | Size: (20.81 MB)
FileName :45 - 3 4 1 2 Enterprise Architecture Domains & Layers.mp4 | Size: (19.42 MB)
FileName :46 - 3 4 1 3 Objectives of Information Security Architectures.mp4 | Size: (20.4 MB)
FileName :47 - 3 4 2 Information Security Management Frameworks.mp4 | Size: (25.06 MB)
FileName :48 - 3 4 2 1 COBIT and Its Role in Information Security Governance.mp4 | Size: (19.73 MB)
FileName :49 - 3 4 2 2 ISOIEC 27001 and the ISO 27000 Series in ISM.mp4 | Size: (24.12 MB)
FileName :50 - 3 4 2 3 NIST Cybersecurity Framework (CSF).mp4 | Size: (23.2 MB)
FileName :51 - 3 4 2 4 NIST Risk Management Framework (RMF).mp4 | Size: (21.72 MB)
FileName :52 - 3 4 3 Information Security Framework Components.mp4 | Size: (22.9 MB)
FileName :53 - 3 4 3 1 Technical Components of Information Security.mp4 | Size: (22.89 MB)
FileName :54 - 3 4 3 2 Operational Components of Information Security.mp4 | Size: (21.47 MB)
FileName :55 - 3 4 3 3 Management Components of Information Security.mp4 | Size: (19.95 MB)
FileName :56 - 3 4 3 4 Administrative Components of Information Security.mp4 | Size: (22.37 MB)
FileName :57 - 3 4 3 5 Educational & Informational Components of InfoSec.mp4 | Size: (18.38 MB)
FileName :58 - 3 5 Information Security Policies, Procedures and Guidelines.mp4 | Size: (20.59 MB)
FileName :59 - 3 5 1 Information Security Policies.mp4 | Size: (18.6 MB)
FileName :60 - 3 5 1 1 Policy Development in Information Security.mp4 | Size: (21.66 MB)
FileName :61 - 3 5 2 Information Security Standards.mp4 | Size: (21.03 MB)
FileName :62 - 3 5 2 1 Developing Effective Information Security Standards.mp4 | Size: (22.7 MB)
FileName :63 - 3 5 3 Information Security Procedures.mp4 | Size: (19.42 MB)
FileName :64 - 3 5 4 Guidelines in Information Security.mp4 | Size: (14.09 MB)
FileName :65 - 3 6 1 Applying Frameworks and Architectures to Build a Security Program Road Map.mp4 | Size: (19.54 MB)
FileName :66 - 3 6 2 Developing an Information Security Program Road Map.mp4 | Size: (22.54 MB)
FileName :67 - 3 6 2 Simplicity & Clarity Through Layering and Modularization.mp4 | Size: (16.88 MB)
FileName :68 - 3 6 2 1 Gap Analysis as the Basis for an Action Plan.mp4 | Size: (16.84 MB)
FileName :69 - 3 6 3 Business Focus Beyond the Technical Domain.mp4 | Size: (14.9 MB)
FileName :70 - 3 6 3 Life Cycle Principles Supporting the Road Map.mp4 | Size: (17.88 MB)
FileName :71 - 3 6 4 Architecture and Control Objectives.mp4 | Size: (30.29 MB)
FileName :72 - 3 6 5 Architecture Implementation in Security Programs.mp4 | Size: (21.81 MB)
FileName :73 - 3 6 6 Security Program Management & Administrative Activities.mp4 | Size: (21.7 MB)
FileName :74 - 3 6 7 Program Administration in Information Security.mp4 | Size: (21.62 MB)
FileName :75 - 3 7 1 Effective Security Metrics.mp4 | Size: (13.25 MB)
FileName :76 - 3 7 1 1 Standards and Approaches for Security Metrics.mp4 | Size: (21.52 MB)
FileName :77 - 3 7 1 2 Governance Implementation Metrics.mp4 | Size: (15.79 MB)
FileName :78 - 3 7 1 3 Strategic Alignment Metrics.mp4 | Size: (15.68 MB)
FileName :79 - 3 7 1 4 Risk Management Metrics.mp4 | Size: (20.05 MB)
FileName :80 - 3 7 1 5 Value Delivery Metrics.mp4 | Size: (15.71 MB)
FileName :81 - 3 7 1 6 Resource Management Metrics.mp4 | Size: (20.92 MB)
FileName :82 - 3 7 1 7 Performance Measurement in Information Security.mp4 | Size: (20.05 MB)
FileName :83 - 3 7 2 Security Program Metrics & Monitoring.mp4 | Size: (16.62 MB)
FileName :84 - 3 7 3 Metrics Tailored to Enterprise Needs.mp4 | Size: (14.51 MB)
FileName :85 - 3 7 3 1 Strategic Metrics for Information Security.mp4 | Size: (12.23 MB)
FileName :86 - 3 7 3 2 Management Metrics for Information Security.mp4 | Size: (18.46 MB)
FileName :87 - 3 7 3 3 Operational Metrics in Information Security.mp4 | Size: (15.01 MB)
FileName :88 - 3 8 Information Security Control Design and Selection.mp4 | Size: (10.46 MB)
FileName :89 - 3 8 1 Managing Risk Through Controls.mp4 | Size: (7.87 MB)
FileName :90 - 3 8 1 1 IT Controls.mp4 | Size: (6.59 MB)
FileName :91 - 3 8 1 2 Non-IT Controls.mp4 | Size: (5.92 MB)
FileName :92 - 3 8 1 3 Layered Defenses (Defense in Depth).mp4 | Size: (8.15 MB)
FileName :93 - 3 8 1 4 Technologies in Information Security.mp4 | Size: (7.7 MB)
FileName :94 - 3 8 2 Controls and Countermeasures.mp4 | Size: (10.79 MB)
FileName :95 - 3 8 3 Control Categories.mp4 | Size: (10.2 MB)
FileName :96 - 3 8 4 Control Design Considerations.mp4 | Size: (9.06 MB)
FileName :97 - 3 8 5 Control Methods.mp4 | Size: (7.8 MB)
FileName :98 - 3 8 5 1 Countermeasures in Information Security.mp4 | Size: (8.04 MB)
FileName :99 - 3 8 5 2 Physical and Environmental Controls.mp4 | Size: (13.69 MB)
FileName :100 - 3 8 5 3 Control Technology Categories.mp4 | Size: (12.38 MB)
FileName :101 - 3 8 5 4 Native Control Technologies.mp4 | Size: (6.31 MB)
FileName :102 - 3 8 5 5 Supplemental Control Technologies.mp4 | Size: (23.82 MB)
FileName :103 - 3 8 5 6 Management Support Technologies.mp4 | Size: (29.06 MB)
FileName :104 - 3 8 5 7 Technical Control Components and Architecture.mp4 | Size: (39.43 MB)
FileName :105 - 3 9 Information Security Control.mp4 | Size: (27.7 MB)
FileName :106 - 3 9 1 Baseline Controls.mp4 | Size: (35.31 MB)
FileName :107 - 3 10 Information Security Control Testing and Evaluation.mp4 | Size: (25.46 MB)
FileName :108 - 3 10 1 Control Strength.mp4 | Size: (21.51 MB)
FileName :109 - 3 10 2 Control Recommendations.mp4 | Size: (28.39 MB)
FileName :110 - 3 10 3 Control Testing and Modification.mp4 | Size: (29.17 MB)
FileName :111 - 3 11 Information Security Awareness and Training.mp4 | Size: (27.07 MB)
FileName :112 - 3 11 1 Security Awareness Training and Education.mp4 | Size: (23.23 MB)
FileName :113 - 3 11 2 Developing an Information Security Awareness Program.mp4 | Size: (31.2 MB)
FileName :114 - 3 11 3 Role-Based Training.mp4 | Size: (60.17 MB)
FileName :115 - 3 12 1 Personnel, Roles, Skills and Culture.mp4 | Size: (7.76 MB)
FileName :116 - 3 12 1 1 Documentation in Information Security Programs.mp4 | Size: (46.36 MB)
FileName :117 - 3 12 1 2 Document Maintenance in Information Security Programs.mp4 | Size: (34.03 MB)
FileName :118 - 3 12 2 Information Security Liaison Responsibilities.mp4 | Size: (33.75 MB)
FileName :119 - 3 12 2 1 Physical Corporate Security.mp4 | Size: (20.9 MB)
FileName :120 - 3 12 2 2 IT Audit.mp4 | Size: (26.88 MB)
FileName :121 - 3 12 2 3 Role of Information Technology in Security Programs.mp4 | Size: (31.13 MB)
FileName :122 - 3 12 2 4 Role of Business Unit Managers in Information Security.mp4 | Size: (24.79 MB)
FileName :123 - 3 12 2 5 Human Resources & Information Security.mp4 | Size: (35.59 MB)
FileName :124 - 3 12 2 6 Legal Department & Information Security.mp4 | Size: (28.43 MB)
FileName :125 - 3 12 2 7 Employees The First Line of Defense.mp4 | Size: (24.18 MB)
FileName :126 - 3 12 2 7 Procurement A Critical Security Touchpoint.mp4 | Size: (22.15 MB)
FileName :127 - 3 12 2 8 Compliance Aligning Security with Legal and Regulatory Demands.mp4 | Size: (29.46 MB)
FileName :128 - 3 12 2 9 Privacy Enforcing Data Protection in a Regulated World.mp4 | Size: (25.05 MB)
FileName :129 - 3 12 2 10 Training Partnering for Security Awareness & Skill Development.mp4 | Size: (26.66 MB)
FileName :130 - 3 12 2 11 Quality Assurance Integrating Security into QA Processes.mp4 | Size: (24.07 MB)
FileName :131 - 3 12 2 12 Insurance as a Compensating Control in Information Security.mp4 | Size: (22.35 MB)
FileName :132 - 3 12 2 13 Third Party Management in Information Security.mp4 | Size: (26.71 MB)
FileName :133 - 3 12 2 14 Role of the PMO in Information Security.mp4 | Size: (22.5 MB)
FileName :134 - 3 12 3 Cross-Organizational Responsibilities.mp4 | Size: (28.62 MB)
FileName :135 - 3 12 3 1 Information Security Leadership & Cross-Business Alignment.mp4 | Size: (29.43 MB)
FileName :136 - 3 12 4 Issue Resolution through the Information Security Program.mp4 | Size: (23.21 MB)
FileName :137 - 3 12 5 Integration With IT Processes.mp4 | Size: (23.61 MB)
FileName :138 - 3 12 5 1 Integration of Information Security Across the Enterprise.mp4 | Size: (15.75 MB)
FileName :139 - 3 12 5 1 1 Vendor Management in Information Security.mp4 | Size: (30.3 MB)
FileName :140 - 3 12 5 2 Physical and Environmental Factors in Information Security.mp4 | Size: (24.98 MB)
FileName :141 - 3 12 5 2 1 System Development Life Cycle (SDLC) & Security Integration.mp4 | Size: (29.87 MB)
FileName :142 - 3 12 5 3 Cultural and Regional Variances in Information Security.mp4 | Size: (24.39 MB)
FileName :143 - 3 12 5 3 1 DevOps and DevSec Ops Security in High-Speed Development.mp4 | Size: (33.31 MB)
FileName :144 - 3 12 5 4 Change Management in Information Security.mp4 | Size: (27.8 MB)
FileName :145 - 3 12 5 4 Logistics in Information Security Management.mp4 | Size: (5.58 MB)
FileName :146 - 3 12 5 5 Configuration Management in Information Security.mp4 | Size: (24.2 MB)
FileName :147 - 3 12 5 6 Secure Release Management.mp4 | Size: (32.05 MB)
FileName :148 - 3 12 6 Cloud Computing.mp4 | Size: (37.92 MB)
FileName :149 - 3 12 6 1 Cloud Service Models.mp4 | Size: (24.24 MB)
FileName :150 - 3 12 6 2 Advantages of Cloud Computing.mp4 | Size: (32.88 MB)
FileName :151 - 3 12 6 3 Evaluation of Cloud Service Providers.mp4 | Size: (38.76 MB)
FileName :152 - 3 13 Management of External Services and Relationships.mp4 | Size: (36.13 MB)
FileName :153 - 3 13 1 Governance of Third-Party Relationships.mp4 | Size: (28.2 MB)
FileName :154 - 3 13 2 Third-Party Service Providers.mp4 | Size: (32.47 MB)
FileName :155 - 3 13 2 1 Outsourcing and Third-Party Security Providers.mp4 | Size: (33.01 MB)
FileName :156 - 3 13 3 Outsourcing Challenges.mp4 | Size: (40.13 MB)
FileName :157 - 3 13 4 Outsourcing Contracts.mp4 | Size: (28.85 MB)
FileName :158 - 3 13 4 1 Security Provisions in Outsourcing Contracts.mp4 | Size: (25.18 MB)
FileName :159 - 3 13 5 Third-Party Access.mp4 | Size: (14.87 MB)
FileName :160 - 3 14 Information Security Program.mp4 | Size: (21.53 MB)
FileName :161 - 3 14 1 Program Management Evaluation.mp4 | Size: (29.77 MB)
FileName :162 - 3 14 1 1 Compliance Requirements in Information Security.mp4 | Size: (36.33 MB)
FileName :163 - 3 14 1 2 Program Management in Information Security.mp4 | Size: (35.98 MB)
FileName :164 - 3 14 1 3 Security Operations Management.mp4 | Size: (24.89 MB)
FileName :165 - 3 14 1 4 Technical Security Management.mp4 | Size: (29.72 MB)
FileName :166 - 3 14 1 5 Resource Levels in Information Security Program.mp4 | Size: (45.33 MB)
FileName :167 - 3 14 2 The Plan-Do-Check-Act Cycle.mp4 | Size: (29.41 MB)
FileName :168 - 3 14 3 Security Reviews and Audits.mp4 | Size: (17.81 MB)
FileName :169 - 3 14 3 1 Security Reviews vs Audits.mp4 | Size: (15.55 MB)
FileName :170 - 3 14 4 Compliance Monitoring and Enforcement.mp4 | Size: (16.26 MB)
FileName :171 - 3 14 4 1 Standards Compliance.mp4 | Size: (12.58 MB)
FileName :172 - 3 14 4 2 Resolution of Noncompliance Issues.mp4 | Size: (12.66 MB)
FileName :173 - 3 14 4 3 Resolution of Noncompliance Issues.mp4 | Size: (12.04 MB)
FileName :174 - 3 14 4 4 Compliance Enforcement.mp4 | Size: (10.35 MB)
FileName :175 - 3 14 5 Monitoring Approaches.mp4 | Size: (14.27 MB)
FileName :176 - 3 14 5 1 Monitoring Security Activities in Infrastructure and Applications.mp4 | Size: (10.09 MB)
FileName :177 - 3 14 5 2 Determining Success of Information Security Investments.mp4 | Size: (29.29 MB)
FileName :178 - 3 14 6 Measuring Information Security Management Performance.mp4 | Size: (40.9 MB)
FileName :179 - 3 14 6 1 Measuring Support of Organizational Objectives.mp4 | Size: (22.81 MB)
FileName :180 - 3 14 6 2 Measuring Compliance in Information Security.mp4 | Size: (28.35 MB)
FileName :181 - 3 14 6 3 Measuring Operational Productivity in InfoSec.mp4 | Size: (22.63 MB)
FileName :182 - 3 14 6 4 Measuring Security Cost-Effectiveness.mp4 | Size: (24.9 MB)
FileName :183 - 3 14 6 5 Measuring Awareness & Technical Security Effectiveness.mp4 | Size: (23.97 MB)
FileName :184 - 3 14 6 6 Measuring Effectiveness of Management Framework & Resources.mp4 | Size: (25.02 MB)
FileName :185 - 3 14 6 7 Measuring Operational Performance in InfoSec.mp4 | Size: (24.07 MB)
FileName :186 - 3 14 6 8 Ongoing Monitoring and Communication.mp4 | Size: (21.42 MB)
FileName :1 - Part A Incident Management Readiness.mp4 | Size: (24.83 MB)
FileName :2 - 4 1 Incident Management & Response.mp4 | Size: (27.42 MB)
FileName :3 - 4 1 1 Incident Management vs Incident Response.mp4 | Size: (30.6 MB)
FileName :4 - 4 1 2 Goals of Incident Management & Response.mp4 | Size: (34.76 MB)
FileName :5 - 4 1 2 1 Goals & Value of Effective Incident Management.mp4 | Size: (36.21 MB)
FileName :6 - 4 1 3 Incident Handling & Life Cycle.mp4 | Size: (24.32 MB)
FileName :7 - 4 1 3 1 Incident Management Life Cycle & Disaster Progression.mp4 | Size: (31.46 MB)
FileName :8 - 4 2 Incident Management and Incident Response Plans.mp4 | Size: (32.38 MB)
FileName :9 - 4 2 1 Importance of Incident Management.mp4 | Size: (31.85 MB)
FileName :10 - 4 2 2 Outcomes of Incident Management.mp4 | Size: (35.53 MB)
FileName :11 - 4 2 3 Incident Management Resources.mp4 | Size: (46.99 MB)
FileName :12 - 4 2 4 Policies and Standards.mp4 | Size: (22.71 MB)
FileName :13 - 4 2 5 Incident Management Objectives.mp4 | Size: (30.09 MB)
FileName :14 - 4 2 6 Strategic Alignment.mp4 | Size: (39.16 MB)
FileName :15 - 4 2 7 Response and Recovery Plan.mp4 | Size: (35.36 MB)
FileName :16 - 4 2 8 The Role of the Information Security Manager in Incident Management.mp4 | Size: (32.96 MB)
FileName :17 - 4 2 9 Risk Management.mp4 | Size: (19.32 MB)
FileName :18 - 4 2 10 Assurance Process Integration.mp4 | Size: (24.81 MB)
FileName :19 - 4 2 11 Value Delivery.mp4 | Size: (24.96 MB)
FileName :20 - 4 2 12 Resource Management.mp4 | Size: (24.4 MB)
FileName :21 - 4 2 13 Defining Incident Management Procedures.mp4 | Size: (28.65 MB)
FileName :22 - 4 2 14 Detailed Plan of Action for Incident Management.mp4 | Size: (27.89 MB)
FileName :23 - 4 2 14 1Phase 1 - Prepare (Prepare Improve Sustain).mp4 | Size: (31.58 MB)
FileName :24 - 4 2 14 2 Phase 2 - Protect (Reputation, Brand, Infrastructure, Data).mp4 | Size: (28.02 MB)
FileName :25 - 4 2 14 3 Phase 3 - Detect (Events Incidents Anomalies).mp4 | Size: (29.32 MB)
FileName :26 - 4 2 14 4 Phase 4 Triage.mp4 | Size: (24.52 MB)
FileName :27 - 4 2 14 5 Phase 5 Respond.mp4 | Size: (28.2 MB)
FileName :28 - 4 2 15 Current State of Incident Response Capability.mp4 | Size: (40.18 MB)
FileName :29 - 4 2 15 1 History of Incidents.mp4 | Size: (34.24 MB)
FileName :30 - 4 2 15 2 Threats to Enterprise Security.mp4 | Size: (32.82 MB)
FileName :31 - 4 2 15 3 Vulnerabilities.mp4 | Size: (29.26 MB)
FileName :32 - 4 2 16 Developing an Incident Response Plan (IRP).mp4 | Size: (34.11 MB)
FileName :33 - 4 2 16 1 Elements of an Incident Response Plan (IRP).mp4 | Size: (28.47 MB)
FileName :34 - 4 2 16 2 Gap Analysis Basis for an Incident Response Plan.mp4 | Size: (26.44 MB)
FileName :35 - 4 2 16 3 Logistics in Incident Response and Recovery.mp4 | Size: (34.26 MB)
FileName :36 - 4 2 17 Incident Management and Response Teams.mp4 | Size: (44.11 MB)
FileName :37 - 4 2 18 Organizing, Training, and Equipping the Response Staff.mp4 | Size: (32.75 MB)
FileName :38 - 4 2 19 Incident Notification Process.mp4 | Size: (42.77 MB)
FileName :39 - 4 2 20 Challenges in Developing an Incident Management Pian.mp4 | Size: (34.62 MB)
FileName :40 - 4 3 Business Impact Analysis.mp4 | Size: (24.94 MB)
FileName :41 - 4 3 1 Elements of a Business Impact Analysis (BIA).mp4 | Size: (33.51 MB)
FileName :42 - 4 3 2 Benefits of Conducting a Business Impact Analysis.mp4 | Size: (28 MB)
FileName :43 - 4 4 Business Continuity Plan.mp4 | Size: (33.03 MB)
FileName :44 - 4 4 1 Integrating Incident Response with Business Continuity.mp4 | Size: (25.43 MB)
FileName :45 - 4 4 2 Network Methods for Providing Continuity of Services.mp4 | Size: (31.28 MB)
FileName :46 - 4 4 3 High-Availability Considerations.mp4 | Size: (29.44 MB)
FileName :47 - 4 4 4 Insurance.mp4 | Size: (28.51 MB)
FileName :48 - 4 5 Disaster Recovery Plan.mp4 | Size: (32.5 MB)
FileName :49 - 4 5 1 Business Continuity and Disaster Recovery Procedures.mp4 | Size: (33.37 MB)
FileName :50 - 4 5 2 Recovery Operations.mp4 | Size: (37.28 MB)
FileName :51 - 4 5 3 Evaluating Recovery Strategies.mp4 | Size: (25.69 MB)
FileName :52 - 4 5 4 Addressing Threats.mp4 | Size: (24.53 MB)
FileName :53 - 4 5 5 Recovery Sites.mp4 | Size: (38.34 MB)
FileName :54 - 4 5 6 Basis for Recovery Site Selections.mp4 | Size: (27.13 MB)
FileName :55 - 4 5 7 Response and Recovery Strategy Implementation.mp4 | Size: (31.01 MB)
FileName :56 - 4 6 Incident Classification Categorization.mp4 | Size: (20.15 MB)
FileName :57 - 4 6 1 Escalation Process for Effective Incident Management.mp4 | Size: (32.57 MB)
FileName :58 - 4 6 2 Identifying Help Service Desk Processes for Security Incidents.mp4 | Size: (28.14 MB)
FileName :59 - 4 7 Incident Management Training, Testing, and Evaluation.mp4 | Size: (37.52 MB)
FileName :60 - 4 7 1 Incident Management Roles and Responsibilities.mp4 | Size: (31.12 MB)
FileName :61 - 4 7 1 1 Common Roles in Incident Management.mp4 | Size: (33.55 MB)
FileName :62 - 4 7 1 2 Senior Management Commitment.mp4 | Size: (25.3 MB)
FileName :63 - 4 7 1 3 Responsibilities of the Information Security Manager in Incident Mgt.mp4 | Size: (36.76 MB)
FileName :64 - 4 7 2 Incident Management Metrics and indicator.mp4 | Size: (35.09 MB)
FileName :65 - 4 7 2 1 Recovery Time Objectives (RTOs).mp4 | Size: (27.73 MB)
FileName :66 - 4 7 2 2 RTO in Business Continuity & Contingency Planning.mp4 | Size: (27.18 MB)
FileName :67 - 4 7 2 3 Recovery Point Objective (RPO).mp4 | Size: (25.56 MB)
FileName :68 - 4 7 2 4 Service Delivery Objectives (SDOs).mp4 | Size: (30.38 MB)
FileName :69 - 4 7 2 5 Maximum Tolerable Outage (MTO).mp4 | Size: (21.35 MB)
FileName :70 - 4 7 2 6 Allowable Interruption Window (AIW).mp4 | Size: (22.41 MB)
FileName :71 - 4 7 2 7 Recovery Point Objectives (RPO).mp4 | Size: (22.42 MB)
FileName :72 - 4 7 2 8 Service Delivery Objectives (SDOs).mp4 | Size: (26.15 MB)
FileName :73 - 4 7 2 9 Maximum Tolerable Outage (MTO).mp4 | Size: (21.21 MB)
FileName :74 - 4 7 3 Performance Measurement.mp4 | Size: (21.22 MB)
FileName :75 - 4 7 4 Updating Recovery Plans.mp4 | Size: (29.42 MB)
FileName :76 - 4 7 5 Testing Incident Response and Business Continuity Disaster Recovery Plans.mp4 | Size: (30.7 MB)
FileName :77 - 4 7 6 Periodic Testing of Response & Recovery Plans.mp4 | Size: (24.81 MB)
FileName :78 - 4 7 7 Testing for Infrastructure & Critical Business Applications.mp4 | Size: (22.42 MB)
FileName :79 - 4 7 8 Types of Tests.mp4 | Size: (26.06 MB)
FileName :80 - 4 7 9 Test Results.mp4 | Size: (21.22 MB)
FileName :81 - 4 7 10 Recovery Test Metrics.mp4 | Size: (19.88 MB)
FileName :82 - Part B Incident Management Operations.mp4 | Size: (28.37 MB)
FileName :83 - 4 8 Incident Management Tools and Technologies.mp4 | Size: (29.69 MB)
FileName :84 - 4 8 1 Incident Management Systems.mp4 | Size: (34.9 MB)
FileName :85 - 4 8 1 1 Endpoint Detection and Response (EDR).mp4 | Size: (22.99 MB)
FileName :86 - 4 8 1 2 Extended Detection and Response (XDR).mp4 | Size: (27.34 MB)
FileName :87 - 4 8 1 3 Managed Detection and Response (MDR).mp4 | Size: (35.83 MB)
FileName :88 - 4 8 2 Incident Response Technology Foundations.mp4 | Size: (29.94 MB)
FileName :89 - 4 8 2 1 Incident Response Operating Systems Knowledge.mp4 | Size: (28.1 MB)
FileName :90 - 4 8 2 2 Malicious Code Propagation & Impact.mp4 | Size: (30.31 MB)
FileName :91 - 4 8 2 3 Programming Skills for Incident Response Teams.mp4 | Size: (29.25 MB)
FileName :92 - 4 8 3 Personnel on Incident Management Teams (IMTs).mp4 | Size: (22.14 MB)
FileName :93 - 4 8 3 1 Incident Response Team (IRT) Organization Models.mp4 | Size: (31.95 MB)
FileName :94 - 4 8 3 2 Incident Response Team (IRT) Roles & Responsibilities.mp4 | Size: (40.93 MB)
FileName :95 - 4 8 4 Skills.mp4 | Size: (25.08 MB)
FileName :96 - 4 8 5 Awareness and Education.mp4 | Size: (27.65 MB)
FileName :97 - 4 8 6 Audits in Incident Management.mp4 | Size: (33.6 MB)
FileName :98 - 4 8 7 Outsourced Security Providers.mp4 | Size: (31.77 MB)
FileName :99 - 4 9 Incident Investigation and Evaluation.mp4 | Size: (23.38 MB)
FileName :100 - 4 9 1 Executing Response and Recovery Plans.mp4 | Size: (30.61 MB)
FileName :101 - 4 9 1 1 Ensuring Execution as Required.mp4 | Size: (23.42 MB)
FileName :102 - 4 10 Incident Containment Methods.mp4 | Size: (22.96 MB)
FileName :103 - 4 11 Incident Response Communications.mp4 | Size: (22.68 MB)
FileName :104 - 4 11 1 Notification Requirements.mp4 | Size: (29.76 MB)
FileName :105 - 4 11 2 Communication Networks.mp4 | Size: (33.61 MB)
FileName :106 - 4 12 Incident Eradication and Recovery.mp4 | Size: (23.59 MB)
FileName :107 - 4 12 1 Eradication Activities.mp4 | Size: (21.24 MB)
FileName :108 - 4 12 2 Recovery.mp4 | Size: (20.44 MB)
FileName :109 - 4 13 Post-Incident Review Practices.mp4 | Size: (31.34 MB)
FileName :110 - 4 13 1 Identifying Causes and Corrective Actions.mp4 | Size: (25.15 MB)
FileName :111 - 4 13 2 Documenting Events.mp4 | Size: (25.27 MB)
FileName :112 - 4 13 3 Establishing Legal Procedures to Assist in Post-incident Activities.mp4 | Size: (31.16 MB)
FileName :113 - 4 13 4 Requirements for Evidence.mp4 | Size: (24.24 MB)
FileName :114 - 4 13 5 Legal Aspects of Forensic Evidence.mp4 | Size: (38.6 MB)]
Screenshot
DDownload
https://ddownload.com/9rcq4zw4dyu8/CISM.Certification.Masterclass.2025.Complete.Guide.part01.rar https://ddownload.com/e0dd0815q6fg/CISM.Certification.Masterclass.2025.Complete.Guide.part02.rar https://ddownload.com/cue5yyfb4upx/CISM.Certification.Masterclass.2025.Complete.Guide.part03.rar https://ddownload.com/dy19selnu1v3/CISM.Certification.Masterclass.2025.Complete.Guide.part04.rar https://ddownload.com/37jiwp8dq3c8/CISM.Certification.Masterclass.2025.Complete.Guide.part05.rar https://ddownload.com/hvv0r1rezu4o/CISM.Certification.Masterclass.2025.Complete.Guide.part06.rar https://ddownload.com/3b8t3iqw3o1r/CISM.Certification.Masterclass.2025.Complete.Guide.part07.rar https://ddownload.com/pul7382eh7hm/CISM.Certification.Masterclass.2025.Complete.Guide.part08.rar https://ddownload.com/jhq9yufy511m/CISM.Certification.Masterclass.2025.Complete.Guide.part09.rar https://ddownload.com/8yk9pmwwgl0s/CISM.Certification.Masterclass.2025.Complete.Guide.part10.rar
