CISM 2022: Information Security Governance
CISM
| Intermediate
- 16 videos | 1h 40m 3s
- Includes Assessment
- Earns a Badge
The best way to improve the enterprise security stance is to align IT security solutions with business objectives. In this course, you will consider how information security must align with business strategies. You will explore the business model for information security and review the importance of identifying and classifying assets critical to a business. Next, you will learn about supply chain security, personnel management, and the components of an information security program. You will discover the relationship between service-level agreements (SLAs) and organizational objectives and discuss the relevance of change and configuration management. Then, consider how to develop organizational security policies. Lastly, explore expense types, chain of custody, organizational culture, and how the Control Objectives for Information Technologies (COBIT) framework applies to IT governance. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how the business model for information security encompasses information security planning, implementation, and managementIdentify and classify assets for proper data governance based on value to the businessRecognize how to apply security criteria when evaluating third-party vendorsIdentify personnel security issues related to hiring, background checks, and exit interviewsRecognize components constituting an effective program including balanced scorecardsReview cloud service-level agreements (slas) to ensure alignment with security policiesOutline enterprise change management procedures to ensure risks have been evaluated
-
Identify enterprise configuration management procedures and terms such as cms, cmdb, an ciOutline various types of security policies, including acceptable use, and their constituents as well as management buy-inRecognize how an it maturity model provides an assessment as to whether technology is effectively securely meeting business needs through a gap analysisDistinguish between capital and operating expenses when budgetingRecognize the importance of securing evidence including during and after collectionRecognize how to ensure effective security governance through security awareness and business executive involvementIdentify how the control objectives for information technologies (cobit) framework applies to it governanceSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 19sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 7sAfter completing this video, you will be able to recognize how the business model for information security encompasses information security planning, implementation, and management. FREE ACCESS
-
6m 46sUpon completion of this video, you will be able to identify and classify assets for proper data governance based on value to the business. FREE ACCESS
-
7m 12sAfter completing this video, you will be able to recognize how to apply security criteria when evaluating third-party vendors. FREE ACCESS
-
7m 58sUpon completion of this video, you will be able to identify personnel security issues related to hiring, background checks, and exit interviews. FREE ACCESS
-
6m 26sAfter completing this video, you will be able to recognize components constituting an effective program including balanced scorecards. FREE ACCESS
-
6m 27sLearn how to review cloud service-level agreements (SLAs) to ensure alignment with security policies. FREE ACCESS
-
7m 28sAfter completing this video, you will be able to outline enterprise change management procedures to ensure risks have been evaluated. FREE ACCESS
-
5m 33sUpon completion of this video, you will be able to identify enterprise configuration management procedures and terms such as CMS, CMDB, and CI. FREE ACCESS
-
8m 10sAfter completing this video, you will be able to outline various types of security policies, including acceptable use, and their constituents as well as management buy-in. FREE ACCESS
-
6m 50sUpon completion of this video, you will be able to recognize how an IT maturity model provides an assessment as to whether technology is effectively securely meeting business needs through a gap analysis. FREE ACCESS
-
6m 52sIn this video, you will learn how to distinguish between capital and operating expenses when budgeting. FREE ACCESS
-
6m 41sAfter completing this video, you will be able to recognize the importance of securing evidence including during and after collection. FREE ACCESS
-
9m 11sUpon completion of this video, you will be able to recognize how to ensure effective security governance through security awareness and business executive involvement. FREE ACCESS
-
4m 54sUpon completion of this video, you will be able to identify how the Control Objectives for Information Technologies (COBIT) framework applies to IT governance. FREE ACCESS
-
1m 11sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Software Deployment & Management
Rating 4.5 of 46 users
(46)