• Report Links
    We do not store any files or images on our server. XenPaste only index and link to content provided by other non-affiliated sites. If your copyrighted material has been posted on XenPaste or if hyperlinks to your copyrighted material are returned through our search engine and you want this material removed, you must contact the owners of such sites where the files and images are stored.
  • Home
  • -
  • New Pastes

Cissm - Certified Information System Security Manager

  • Thread starter King
  • Start date Nov 14, 2022

King

Administrator
Joined
Jul 12, 2021
Messages
25,005
Reaction score
5
Points
38
  • Nov 14, 2022
  • #1





Last updated 3/2019
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.86 GB | Duration: 7h 21m

Prepare for the Mile2® Certified Digital Forensics Examiner (CDFE) with this course.​

What you'll learn
Audit and Risk management creation of policies
IS security strategy and frameworks
Deployment and maintenance
DR and BCP development
Security programs and CISO roles
Risk & incident management
Skills and knowledge to assess threat analysis and risks
Compliance and awareness
Requirements
A minimum of 1 year in Information Systems
Description
This course is provided directly by Mile2®. This official Mile2® video includes an authorized exam prep and exam simulator, available upon request.Today, when it comes to identifying critical issues and providing effective IS management solutions, companies are leaning on IS managers to create solutions for tomorrow's problems. The knowledge and course content provided in the Certified Information Systems Security Manager - C)ISSM will not only cover ISACA®'s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance.
Overview
Section 1: Module 1 - Introduction
Lecture 1 Introduction
Section 2: Module 2 - Information Security Governance
Lecture 2 part a
Lecture 3 part b
Lecture 4 part c
Lecture 5 part d
Section 3: Module 3 - Information Risk Management and Compliance
Lecture 6 part a
Lecture 7 part b
Lecture 8 part c
Section 4: Module 4 - Information Security Program Development and Management...

Read more

Continue reading...
 
https://xenforo.be/
Upvote 0 Downvote
You must log in or register to reply here.
Share:
Facebook Twitter Reddit Pinterest Tumblr WhatsApp Email
  • Home
  • -
  • New Pastes
  • Terms and rules
  • Privacy policy
  • Help
  • Home
AMP generated by AMPXF.com
Menu
Log in

Register

  • Home
    • Go Premium
  • Go Premium / Advertise
  • New Ad Listings
  • What's new
    • New posts
    • New Ad Listings
    • Latest activity
  • Members
    • Registered members
    • Current visitors
X

Privacy & Transparency

We use cookies and similar technologies for the following purposes:

  • Personalized ads and content
  • Content measurement and audience insights

Do you accept cookies and these technologies?

X

Privacy & Transparency

We use cookies and similar technologies for the following purposes:

  • Personalized ads and content
  • Content measurement and audience insights

Do you accept cookies and these technologies?