CISM 2020: Information Security & Business Process Alignment
CISM
| Intermediate
- 14 videos | 1h 13m 1s
- Includes Assessment
- Earns a Badge
Proper IT governance starts with aligning IT solutions with business processes. In this course, you'll explore how to identify the relationship between IT security and business objectives. You'll examine in detail how various regulations and security standards, such as HIPAA, GDPR, and PCI DSS, can influence an organization's IT security decisions, going through seven of such regulations one-by-one. Next, you'll examine the cloud services, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) to determine how responsibility is divided between provider and consumer. Lastly, you'll investigate several public cloud providers' security accreditations. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize the relevance of it security in today's business environmentIdentify the relationship between it security and business processesIdentify security control types and how they address potential threatsRecall the usefulness of international it security management standardsCorrelate cloud computing and it security requirements as they pertain to u.s. government agenciesRecognize how sensitive medial data is protected in conjunction with u.s. health care requirements
-
Recognize how eu citizen private data must be protected internationallyApply security controls to protect credit card holder informationRecognize how select canadian acts of legislation are designed to ensure data privacyOutline how cobit provides an it management frameworkIdentify the responsibility distribution of various cloud service modelsView public cloud provider security accreditationsSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 5s
-
3m 30sAfter completing this video, you will be able to recognize the importance of IT security in today's business environment. FREE ACCESS
-
6m 13sIn this video, you will learn how to identify the relationship between IT security and business processes. FREE ACCESS
-
6m 1sIn this video, you will identify types of security controls and how they address potential threats. FREE ACCESS
-
6m 12sAfter completing this video, you will be able to recall the usefulness of international IT security management standards. FREE ACCESS
-
5m 26sIn this video, find out how to correlate cloud computing and IT security requirements as they pertain to U.S. government agencies. FREE ACCESS
-
5m 35sAfter completing this video, you will be able to recognize how sensitive medical data is protected in conjunction with U.S. health care requirements. FREE ACCESS
-
6m 3sUpon completion of this video, you will be able to recognize how EU citizens' private data must be protected internationally. FREE ACCESS
-
6m 19sDuring this video, you will learn how to apply security controls to protect credit card holder information. FREE ACCESS
-
5m 52sUpon completion of this video, you will be able to recognize how select Canadian acts of legislation are designed to ensure data privacy. FREE ACCESS
-
7m 30sIn this video, you will outline how COBIT provides an IT management framework. FREE ACCESS
-
8m 4sIn this video, learn how to identify the responsibility distribution of various cloud service models. FREE ACCESS
-
3m 8sLearn how to view security accreditations for public cloud providers. FREE ACCESS
-
1m 6s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.