Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Cissm - Certified Information System Security Manager

TOP 110

TOP

Alpha and Omega
Member
Access
Joined
Jan 21, 2021
Messages
173,052
Reaction score
15,273
Points
113
Age
37
Location
OneDDL
grants
₲840,738
2 years of service
6ed8e35a15b4f8b17834d0aca3a3befb.jpeg

Last updated 3/2019
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.86 GB | Duration: 7h 21m
Prepare for the Mile2® Certified Digital Forensics Examiner (CDFE) with this course.

What you'll learn
Audit and Risk management creation of policies
IS security strategy and frameworks
Deployment and maintenance
DR and BCP development
Security programs and CISO roles
Risk & incident management
Skills and knowledge to assess threat analysis and risks
Compliance and awareness
Requirements
A minimum of 1 year in Information Systems
Description
This course is provided directly by Mile2®. This official Mile2® video includes an authorized exam prep and exam simulator, available upon request.Today, when it comes to identifying critical issues and providing effective IS management solutions, companies are leaning on IS managers to create solutions for tomorrow's problems. The knowledge and course content provided in the Certified Information Systems Security Manager - C)ISSM will not only cover ISACA®'s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance.
Overview
Section 1: Module 1 - Introduction
Lecture 1 Introduction
Section 2: Module 2 - Information Security Governance
Lecture 2 part a
Lecture 3 part b
Lecture 4 part c
Lecture 5 part d
Section 3: Module 3 - Information Risk Management and Compliance
Lecture 6 part a
Lecture 7 part b
Lecture 8 part c
Section 4: Module 4 - Information Security Program Development and Management
Lecture 9 part a
Lecture 10 part b
Lecture 11 part c
Lecture 12 part d
Lecture 13 part e
Section 5: Module 5 - Information Security Incident Management
Lecture 14 part a
Lecture 15 part b
Lecture 16 part c
Lecture 17 part d
Information Security,risk management and governance,Information assurance


Homepage
Code:
Please, Log in or Register to view codes content!

Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Links are Interchangeable - No Password - Single Extraction
 
K 0

KatzSec DevOps

Alpha and Omega
Philanthropist
Access
Joined
Jan 17, 2022
Messages
282,013
Reaction score
5,412
Points
83
grants
₲28,188
1 years of service
TOP salamat sa pag contribute. Next time always upload your files sa
Please, Log in or Register to view URLs content!
para siguradong di ma dedeadlink. Let's keep on sharing to keep our community running for good. This community is built for you and everyone to share freely. Let's invite more contributors para mabalik natin sigla ng Mobilarian at tuloy ang puyatan. :)
 

Similar threads

TOP
Replies
1
Views
32
KatzSec DevOps
K
TOP
Replies
1
Views
38
KatzSec DevOps
K
TOP
Replies
1
Views
32
KatzSec DevOps
K
TOP
Replies
1
Views
40
KatzSec DevOps
K
TOP
Replies
1
Views
43
KatzSec DevOps
K
Top Bottom