Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CISM | Domain 1 - Information Security Governance
Introduction
Welcome to the course (1:27)
The CISM Certification
What is the CISM? (3:30)
How to become CISM certified (6:04)
The CISM exam (3:48)
How to maintain your certification (3:58)
Domain 1: Information Security Governance
Domain 1: Overview (2:25)
Domain 1: A - Enterprise Governance
What is Information Security? (2:50)
CIA Triad (3:55)
Authenticity and Nonrepudiation (3:43)
Relationship between Information- and Cybersecurity (2:49)
Governance Fundamentals (2:53)
Governance vs. Management (2:49)
Enterprise Governance (3:25)
IT Governance (5:31)
Information Security Governance (6:13)
Organisational Culture (4:34)
Acceptable Use Policy (2:42)
The Importance of Ethics (3:30)
Legal, regulatory and contractual Requirements (3:45)
Business Records Retention (3:27)
Organizational Structure, Roles and Responsibilities (4:43)
Board of Directors (2:18)
Senior Management (2:50)
Steering Committee (1:55)
Business Process Owners (1:27)
Chief Information Security Officer (CISO) (2:37)
Quiz 1: Part A: Review Questions
Domain 1: B - Information Security Strategy
What is an Information Security Strategy? (5:45)
The Objectives of an Information Security Strategy (6:27)
How to develop an Information Security Strategy (5:10)
What to avoid when developing an Information Security Strategy (5:18)
Governance Frameworks (2:48)
The Balanced Scorecard (3:00)
ISO/IEC 27000 Family of Standards (5:58)
NIST Cybersecurity Framework (3:17)
NIST Risk Management Framework (2:40)
Other Frameworks and Standards worth knowing (1:53)
Strategic Workforce Planning (2:49)
Performance Evaluation (3:35)
Quiz 2: Part B: Review Questions
The Objectives of an Information Security Strategy
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock