Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Cissm - Certified Information System Security Manager

Alexhost
M 0

mitsumi

Alpha and Omega
Member
Access
Joined
Oct 3, 2022
Messages
6,726
Reaction score
854
Points
83
Age
35
Location
vn
grants
₲16,524
2 years of service

1fd463ece5d34d68ac745a3cd0241b00.jpeg


Last updated 3/2019
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.86 GB | Duration: 7h 21m

Prepare for the Mile2® Certified Digital Forensics Examiner (CDFE) with this course.​

What you'll learn
Audit and Risk management creation of policies
IS security strategy and frameworks
Deployment and maintenance
DR and BCP development
Security programs and CISO roles
Risk & incident management
Skills and knowledge to assess threat analysis and risks
Compliance and awareness
Requirements
A minimum of 1 year in Information Systems
Description
This course is provided directly by Mile2®. This official Mile2® video includes an authorized exam prep and exam simulator, available upon request.Today, when it comes to identifying critical issues and providing effective IS management solutions, companies are leaning on IS managers to create solutions for tomorrow's problems. The knowledge and course content provided in the Certified Information Systems Security Manager - C)ISSM will not only cover ISACA®'s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance.
Overview
Section 1: Module 1 - Introduction
Lecture 1 Introduction
Section 2: Module 2 - Information Security Governance
Lecture 2 part a
Lecture 3 part b
Lecture 4 part c
Lecture 5 part d
Section 3: Module 3 - Information Risk Management and Compliance
Lecture 6 part a
Lecture 7 part b
Lecture 8 part c
Section 4: Module 4 - Information Security Program Development and Management
Lecture 9 part a
Lecture 10 part b
Lecture 11 part c
Lecture 12 part d
Lecture 13 part e
Section 5: Module 5 - Information Security Incident Management
Lecture 14 part a
Lecture 15 part b
Lecture 16 part c
Lecture 17 part d
Information Security,risk management and governance,Information assurance

4485d32970f106604f69c4998dbe1c55.jpeg

Download link

rapidgator.net:
You must reply in thread to view hidden text.

uploadgig.com:
You must reply in thread to view hidden text.

nitroflare.com:
You must reply in thread to view hidden text.

1dl.net:
You must reply in thread to view hidden text.
 
K 0

KatzSec DevOps

Alpha and Omega
Philanthropist
Access
Joined
Jan 17, 2022
Messages
622,394
Reaction score
7,884
Points
83
grants
₲58,433
2 years of service
mitsumi salamat sa pag contribute. Next time always upload your files sa
Please, Log in or Register to view URLs content!
para siguradong di ma dedeadlink. Let's keep on sharing to keep our community running for good. This community is built for you and everyone to share freely. Let's invite more contributors para mabalik natin sigla ng Mobilarian at tuloy ang puyatan. :)
 
Top Bottom