CISM 2022: Business Continuity & Security
CISM
| Intermediate
- 12 videos | 1h 13m 2s
- Includes Assessment
- Earns a Badge
Keeping business processes up and running is a priority for every type of business. Security plays an important role in the success of business continuity planning. In this course, you will discover the characteristics that define a business impact analysis (BIA) and explore disaster recovery plans (DRPs) and various data and IT security roles commonly present in an enterprise. Next, you will learn how contractual obligations can necessitate security compliance and audits. You will discover the importance of establishing performance and security baselines on-premises and in the cloud. Lastly, you will explore physical security and security control types with a slant on business process alignment. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify common characteristics of a business continuity plan (bcp), business impact analysis (bia) and related insurance optionsIdentify common characteristics of a disaster recovery plan (drp) including recovery time objective (rto) and recovery point objective (rpo)Recognize data roles such as owner and custodian to enable accountabilityList common it security roles such as privacy officers, security policy staff, chief information officer (cio), chief information security office (ciso), and security engineersOutline how to determine contract details such as right-to-audit clause and communicate security policies to other parties
-
Recognize which factors influence the crafting of various security baselinesUse a data collector set to establish a windows performance baselineConfigure alert rules and action group notifications for performance metricsOutline methods of securing assets using physical controlsIdentify types of security controls including detective, preventative, compensating, technical, corrective, and administrativeSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 9sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 33sAfter completing this video, you will be able to identify common characteristics of a business continuity plan (BCP), business impact analysis (BIA) and related insurance options. FREE ACCESS
-
9m 11sUpon completion of this video, you will be able to identify common characteristics of a disaster recovery plan (DRP) including recovery time objective (RTO) and recovery point objective (RPO). FREE ACCESS
-
5m 51sAfter completing this video, you will be able to recognize data roles such as owner and custodian to enable accountability. FREE ACCESS
-
5m 41sUpon completion of this video, you will be able to list common IT security roles such as privacy officers, security policy staff, chief information officer (CIO), chief information security office (CISO), and security engineers. FREE ACCESS
-
6m 22sAfter completing this video, you will be able to outline how to determine contract details such as right-to-audit clause and communicate security policies to other parties. FREE ACCESS
-
7m 51sUpon completion of this video, you will be able to recognize which factors influence the crafting of various security baselines. FREE ACCESS
-
6m 8sFind out how to use a data collector set to establish a Windows performance baseline. FREE ACCESS
-
6m 28sLearn how to configure alert rules and action group notifications for performance metrics. FREE ACCESS
-
7m 40sAfter completing this video, you will be able to outline methods of securing assets using physical controls. FREE ACCESS
-
8m 7sUpon completion of this video, you will be able to identify types of security controls including detective, preventative, compensating, technical, corrective, and administrative. FREE ACCESS
-
1m 2sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.