Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Cism Certification: Domain 1 & 2 | Platinum Video Series

    Posted By: ELK1nG
    Cism Certification: Domain 1 & 2 | Platinum Video Series

    Cism Certification: Domain 1 & 2 | Platinum Video Series
    Published 7/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.26 GB | Duration: 4h 53m

    Develop strategic expertise in cybersecurity governance and risk management with CISM Domains 1 & 2.

    What you'll learn

    Prepare for the CISM certification exam by mastering Domain 1 & 2

    Define and establish information security strategies in alignment with business objectives.

    Develop and maintain a security governance framework and supporting processes.

    Ensure that information security roles and responsibilities are clearly defined and communicated.

    Integrate governance into the enterprise architecture and culture to ensure consistent enforcement.

    Identify and evaluate information security risks based on business impact.

    Establish and maintain a risk management program that supports business continuity and compliance.

    Implement risk mitigation strategies and monitor their effectiveness over time.

    Requirements

    A basic understanding of Information Systems, including IT infrastructure and cybersecurity principles, is desirable. This foundation helps grasp the strategic and managerial aspects of the CISM training.

    Description

    Welcome!This course is carefully designed to guide you through Domain 1: Information Security Governance and Domain 2: Information Security Risk Management of the CISM Certification [ Certified Information Security Manager ]. These two foundational domains provide the strategic insight and risk-focused mindset essential for leading in today’s complex cybersecurity landscape.What You Will LearnHow to establish and align security governance with business objectivesKey frameworks, policies, and roles in information security governanceBuilding and maintaining a risk management programIn this course, we’ll explore the foundations of Domain 1 - Information Security Governance and how it aligns with organizational goals. In Domain 1 we cover:Key governance concepts, frameworks, and strategic alignmentThe role of executive leadership, steering committees, and security stakeholdersHow to build and manage a security strategy and governance structureIntegration of GRC (Governance, Risk, Compliance) into security programsThe responsibilities of security roles and effective reporting practicesHow to create a culture of security and ensure leadership oversightIn Domain 2, we focus on building a deep understanding of Information Security Risk Management and its role in protecting organizational assets. In Domain 2 we cover:Core risk management concepts, including threats, vulnerabilities, and controlsHow to identify, assess, evaluate, and treat information security risksThe risk management lifecycle and integration with enterprise risk frameworksRisk analysis techniques (qualitative and quantitative) and key metricsSecurity strategies such as defense in depth, zero trust, and ROSIRoles of stakeholders, governance structures, and senior leadership involvementManaging compliance, audits, incident response, and business continuityKey human, organizational, and cloud-related risk considerationsEnroll now and move closer to becoming a certified security leader!

    Overview

    Section 1: CISM - Domain 1 - Information Security Governance

    Lecture 1 GOVERNANCE CONCEPT

    Lecture 2 PURPOSE OF GOVERNANCE

    Lecture 3 CORE GOVERNANCE PRACTICES

    Lecture 4 GOVERNANCE FRAMEWORK

    Lecture 5 BOARD OF DIRECTORS’ ROLE

    Lecture 6 LEADERSHIP AND STRUCTURE

    Lecture 7 STRATEGIC OBJECTIVES AND ALIGNMENT

    Lecture 8 ALIGNMENT EXAMPLES

    Lecture 9 BENEFITS OF EFFECTIVE GOVERNANCE

    Lecture 10 IMPACT OF POOR GOVERNANCE

    Lecture 11 GOVERNANCE COMMITTEES: ROLE AND VALUE

    Lecture 12 IT STRATEGY COMMITTEE

    Lecture 13 IT STEERING COMMITTEE

    Lecture 14 PROJECT STEERING COMMITTEE

    Lecture 15 SECURITY STEERING COMMITTEE

    Lecture 16 COMMITTEE SUMMARY

    Lecture 17 ORGANIZATIONAL STRUCTURE AND GOVERNANCE

    Lecture 18 REPORTING BEST PRACTICES

    Lecture 19 INFORMATION SECURITY GOVERNANCE

    Lecture 20 ALIGNING SECURITY WITH BUSINESS STRATEGY

    Lecture 21 CRITICAL ROLE OF SENIOR MANAGEMENT

    Lecture 22 INFORMATION SECURITY VS. CYBERSECURITY

    Lecture 23 CORE SECURITY RESPONSIBILITIES

    Lecture 24 SECURITY INTEGRATION INTO PROJECTS

    Lecture 25 BUILDING A SECURITY STRATEGY

    Lecture 26 SECURITY ARCHITECTURE

    Lecture 27 GRC (GOVERNANCE, RISK, COMPLIANCE)

    Lecture 28 INFORMATION SECURITY’S ROLE IN GRC

    Lecture 29 KEY GRC ACTIVITIES

    Lecture 30 MAJOR SECURITY ROLES

    Lecture 31 ROLE SEPARATION AND CONFLICT OF INTEREST

    Lecture 32 SECURITY MANAGER: ROLES AND RESPONSIBILITIES

    Lecture 33 SECURITY ORGANIZATIONAL STRUCTURES

    Lecture 34 STEERING COMMITTEES AND DECISION-MAKING PROCESS

    Lecture 35 RACI MATRIX

    Lecture 36 RACI BENEFITS

    Lecture 37 SECURITY PROGRAM OBJECTIVES

    Lecture 38 BUILDING A SECURITY PROGRAM

    Lecture 39 SENIOR MANAGEMENT: APPROVAL & OVERSIGHT

    Lecture 40 ROLE OF BUSINESS FUNCTIONS

    Lecture 41 GAP ANALYSIS

    Lecture 42 GAP ANALYSIS PROCESS

    Lecture 43 COMMON GAPS IDENTIFIED

    Lecture 44 STRATEGY CONSIDERATIONS

    Lecture 45 GOVERNANCE RISKS AND SECURITY CULTURE

    Section 2: CISM - Domain 2 - Information Security Risk Management

    Lecture 46 FUNDAMENTAL CONCEPTS RECAP

    Lecture 47 VULNERABILITIES: DEFINITION AND TYPES

    Lecture 48 CIA TRIAD: IMPORTANCE AND THREATS

    Lecture 49 VULNERABILITY MANAGEMENT

    Lecture 50 COMMON ATTACK EXAMPLES

    Lecture 51 DENIAL OF SERVICE (DDoS)

    Lecture 52 MALWARE

    Lecture 53 ADVANCED MALWARE AND INFECTION TECHNIQUES

    Lecture 54 ANTI-MALWARE PROTECTION MEASURES

    Lecture 55 GLOBAL SECURITY BEST PRACTICES

    Lecture 56 WEB APPLICATION SECURITY: OWASP FOCUS

    Lecture 57 ENTERPRISE RISK MANAGEMENT

    Lecture 58 RISK MANAGEMENT CYCLE

    Lecture 59 RISK TYPES

    Lecture 60 RISK CAPACITY, TOLERANCE, AND APPETITE

    Lecture 61 RISK IDENTIFICATION TECHNIQUES

    Lecture 62 ROLES OF DATA OWNERS AND RISK OWNERS

    Lecture 63 RISK ANALYSIS: KEY STEPS

    Lecture 64 RISK METRICS AND INDICATORS

    Lecture 65 RISK ANALYSIS: TOOLS AND TECHNIQUES

    Lecture 66 RISK EVALUATION

    Lecture 67 RISK TREATMENT STRATEGIES

    Lecture 68 RISK REPORTING AND MONITORING

    Lecture 69 REFERENCE FRAMEWORKS: NIST, ISO ..

    Lecture 70 RETURN ON SECURITY INVESTMENT (ROSI)

    Lecture 71 DEFENSE IN DEPTH

    Lecture 72 ZERO TRUST STRATEGY

    Lecture 73 INCIDENT CASE STUDIES (LESSONS LEARNED)

    Lecture 74 INCIDENT RESPONSE PLAN

    Lecture 75 BUSINESS CONTINUITY AND CRISIS MANAGEMENT

    Lecture 76 IT GENERAL CONTROLS

    Lecture 77 SENIOR MANAGEMENT INVOLVEMENT

    Lecture 78 SECURITY KPI & KRI

    Lecture 79 SECURITY AUDITS AND REVIEWS

    Lecture 80 BUSINESS ALIGNMENT

    Lecture 81 HUMAN FACTORS

    Lecture 82 TRAINING RETURN ON INVESTMENT

    Lecture 83 LEADERSHIP BY EXAMPLE

    Lecture 84 EXTERNAL AUDIT REQUIREMENTS

    Lecture 85 IMPROVEMENT PLANS

    Information Security Managers,Aspiring Information Security Managers,IT Security Consultants,Security Auditors,Risk Management Professionals,IT Managers / Project Managers,Chief Information Security Officers (CISOs),Compliance Officers,IT Governance Professionals,Business Continuity and Disaster Recovery Professionnals