Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Cism Certification: Domain 3 & 4 | Platinum Video Series

    Posted By: ELK1nG
    Cism Certification: Domain 3 & 4 | Platinum Video Series

    Cism Certification: Domain 3 & 4 | Platinum Video Series
    Published 7/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.62 GB | Duration: 5h 28m

    Develop strategic expertise in cybersecurity governance and risk management with CISM Domains 3 & 4.

    What you'll learn

    Prepare for the CISM certification exam by mastering Domain 3 & 4

    Develop and manage an information security program aligned with business objectives.

    Establish policies, procedures, and resource planning for effective security governance.

    Integrate security into business processes and evaluate program performance.

    Establish and maintain an effective incident response capability.

    Detect, analyze, and respond to information security incidents promptly.

    Conduct post-incident reviews to strengthen response and reduce future risk.

    Requirements

    A basic understanding of Information Systems, including IT infrastructure and cybersecurity principles, is desirable. This foundation helps grasp the strategic and managerial aspects of the CISM training.

    Description

    Welcome!This course is carefully designed to guide you through Domain 3: Information Security Program and Domain 4: Incident Management of the CISM Certification. These two foundational domains provide the strategic guidance and risk-driven approach necessary for developing and managing an effective information security program and responding swiftly to security incidents in today’s complex cybersecurity environment.In domain3, we cover :Learn to design, implement, and align an information security program with organizational goals.Understand the key components, roles, and responsibilities within a security program.Develop policies, procedures, and strategies to manage assets, identity, and access.Master the application of continuous improvement cycles (Plan-Do-Check-Act) for security programs.Build and monitor performance metrics to evaluate and refine the program’s effectivenessIn domain4, we cover:A comprehensive understanding of security incidents and the principles of incident management.Learn to develop and implement effective Incident Response Plans (IRP) and assemble Incident Response Teams.Master key concepts like forensic investigations, and post-incident lessons learned.Understand disaster recovery, business continuity, and service recovery strategies, including RTO/RPO.Develop skills in vulnerability management, patching, and change management as preventive measures.Learn the importance of crisis communication, coordination with authorities during incidents.Enroll now and move closer to becoming a certified security leader!

    Overview

    Section 1: CISM - Domain 3 - Information Security Program

    Lecture 1 SECURITY PROGRAM FUNDAMENTALS

    Lecture 2 ALIGNMENT WITH STRATEGIC OBJECTIVES

    Lecture 3 KEY COMPONENTS OF A SECURITY PROGRAM

    Lecture 4 ROLES AND RESPONSIBILITIES

    Lecture 5 ASSET MANAGEMENT

    Lecture 6 SECURITY STRATEGY AND ARCHITECTURE

    Lecture 7 SECURITY POLICIES AND PROCEDURES

    Lecture 8 DEVELOPING A SECURITY TRAINING PLAN

    Lecture 9 PERFORMANCE MEASUREMENT

    Lecture 10 SECURITY CONTROLS INTEGRATION

    Lecture 11 PROGRAM CYCLE: PLAN-DO-CHECK-ACT

    Lecture 12 PROGRAM CYCLE: ACT AND EVOLUTION

    Lecture 13 INITIATING A SECURITY PROGRAM

    Lecture 14 IMPLEMENTATION ROADMAP

    Lecture 15 PROJECT SELECTION AND PRIORITIZATION

    Lecture 16 HUMAN RESOURCES AND SKILLS

    Lecture 17 COLLABORATION WITH INTERNAL AUDIT

    Lecture 18 HUMAN FACTOR: AWARENESS INITIATIVES

    Lecture 19 COMPLIANCE MANAGEMENT

    Lecture 20 BUDGET MONITORING AND ROI

    Lecture 21 PROGRAM MATURITY

    Lecture 22 INTEGRATION INTO THE INFORMATION SYSTEM

    Lecture 23 COORDINATING CROSS-FUNCTIONAL PROJECTS

    Lecture 24 SECURITY MONITORING TOOLS

    Lecture 25 THIRD-PARTY AND SUPPLIER SECURITY

    Lecture 26 EXTERNAL COMMUNICATION & AWARENESS STRATEGY

    Lecture 27 CLOUD MIGRATION: SECURITY CHALLENGES

    Lecture 28 AGILITY AND DEVSECOPS

    Lecture 29 BACKUP AND RESTORE PLANNING

    Lecture 30 EXTERNAL AUDITS & CERTIFICATIONS

    Lecture 31 BUSINESS CONTINUITY (BCP) & DISASTER RECOVERY (DRP)

    Lecture 32 SECURITY PROGRAM GOVERNANCE

    Lecture 33 CRITICAL SUCCESS FACTORS

    Lecture 34 COMMON CHALLENGES AND OBSTACLES

    Lecture 35 SUCCESS ENABLERS TO OVERCOME CHALLENGES

    Lecture 36 RISK ASSESSMENT METHODS

    Lecture 37 BOARD-LEVEL REPORTING

    Lecture 38 PROJECT RISK MANAGEMENT

    Lecture 39 ROLE OF STANDARDS & FRAMEWORKS

    Lecture 40 CONTINUOUS IMPROVEMENT PROCESS

    Lecture 41 PROGRAM DEVELOPMENT & UPDATES

    Lecture 42 SECURITY PORTFOLIO MANAGEMENT

    Lecture 43 EXAMPLES OF TOOLS AND PLATFORMS

    Lecture 44 SAMPLE 12-MONTH ROADMAP

    Section 2: CISM - Domain 4 - Incident Management

    Lecture 45 UNDERSTANDING SECURITY INCIDENTS

    Lecture 46 INCIDENT RESPONSE MANAGEMENT

    Lecture 47 INCIDENT MANAGEMENT PRINCIPLES

    Lecture 48 INCIDENT RESPONSE TEAM

    Lecture 49 INCIDENT RESPONSE PLAN

    Lecture 50 INCIDENT RESPONSE PHASES

    Lecture 51 FORENSIC INVESTIGATIONS

    Lecture 52 POST-INCIDENT: LESSONS LEARNED

    Lecture 53 SERVICE RECOVERY & RESUMPTION STRATEGIES

    Lecture 54 RTO AND RPO CONCEPTS

    Lecture 55 DISASTER RECOVERY PLAN (DRP)

    Lecture 56 RECOVERY SITES (HOT, WARM, COLD)

    Lecture 57 BACKUP AND DATA PROTECTION

    Lecture 58 BACKUP TYPES: FULL, DIFFERENTIAL, INCREMENTAL

    Lecture 59 PATCH MANAGEMENT & VULNERABILITY HANDLING

    Lecture 60 VULNERABILITY SCANNING

    Lecture 61 CONFIGURATION MANAGEMENT

    Lecture 62 CHANGE MANAGEMENT AS PREVENTIVE CONTROL

    Lecture 63 INCIDENT VS. DISASTER

    Lecture 64 BUSINESS CONTINUITY PLAN (BCP)

    Lecture 65 DISASTER RECOVERY PLAN (DRP)

    Lecture 66 BUSINESS IMPACT ANALYSIS (BIA)

    Lecture 67 DRP/BCP TESTING & VALIDATION

    Lecture 68 COMPLIANCE MANAGEMENT DURING CRISIS

    Lecture 69 HUMAN FACTOR IMPACT

    Lecture 70 INCIDENT RESPONSE PLAN TESTING

    Lecture 71 OUTSOURCING & CRISIS PREPAREDNESS

    Lecture 72 COORDINATION WITH AUTHORITIES

    Lecture 73 MAJOR INCIDENTS & CRISIS MANAGEMENT

    Lecture 74 CRISIS COMMUNICATION

    Lecture 75 ROLES & RESPONSIBILITIES DIVERSIFICATION

    Lecture 76 TRAINING & AWARENESS

    Lecture 77 PERFORMANCE MEASUREMENT: KPI & KRI

    Lecture 78 SIEM INTEGRATION

    Lecture 79 TOOLS & TECHNIQUES

    Lecture 80 EXAMPLE INCIDENT SCENARIOS

    Lecture 81 INCIDENT GOVERNANCE

    Lecture 82 TRANSITION: INCIDENT / PROBLEM / CHANGE

    Lecture 83 SECURITY ROI IMPACT

    Lecture 84 INTERDEPARTMENTAL COLLABORATION

    Lecture 85 INTERNATIONAL & MULTISITE CONTEXT

    Lecture 86 INCIDENT RISK MONITORING & MANAGEMENT

    Lecture 87 ORGANIZATIONAL RESILIENCE

    Lecture 88 CONTAINMENT & ERADICATION PHASE

    Lecture 89 RECOVERY & RETURN TO NORMAL OPERATIONS

    Lecture 90 POST-INCIDENT STRUCTURAL IMPROVEMENTS

    Lecture 91 MEDIA & PUBLIC ENGAGEMENT

    Lecture 92 MATURITY IMPROVEMENT PLAN

    Information Security Managers,Aspiring Information Security Managers,IT Security Consultants,Security Auditors,Risk Management Professionals,IT Managers / Project Managers,Chief Information Security Officers (CISOs),Compliance Officers,IT Governance Professionals,Business Continuity and Disaster Recovery Professionnals