CISM | Domain 1 - Information Security Governance
Example Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- What is Information Security? (2:50)
- CIA Triad (3:55)
- Authenticity and Nonrepudiation (3:43)
- Relationship between Information- and Cybersecurity (2:49)
- Governance Fundamentals (2:53)
- Governance vs. Management (2:49)
- Enterprise Governance (3:25)
- IT Governance (5:31)
- Information Security Governance (6:13)
- Organisational Culture (4:34)
- Acceptable Use Policy (2:42)
- The Importance of Ethics (3:30)
- Legal, regulatory and contractual Requirements (3:45)
- Business Records Retention (3:27)
- Organizational Structure, Roles and Responsibilities (4:43)
- Board of Directors (2:18)
- Senior Management (2:50)
- Steering Committee (1:55)
- Business Process Owners (1:27)
- Chief Information Security Officer (CISO) (2:37)
- Quiz 1: Part A: Review Questions
Available in
days
days
after you enroll
- What is an Information Security Strategy? (5:45)
- The Objectives of an Information Security Strategy (6:27)
- How to develop an Information Security Strategy (5:10)
- What to avoid when developing an Information Security Strategy (5:18)
- Governance Frameworks (2:48)
- The Balanced Scorecard (3:00)
- ISO/IEC 27000 Family of Standards (5:58)
- NIST Cybersecurity Framework (3:17)
- NIST Risk Management Framework (2:40)
- Other Frameworks and Standards worth knowing (1:53)
- Strategic Workforce Planning (2:49)
- Performance Evaluation (3:35)
- Quiz 2: Part B: Review Questions