CISM 2020: Information Security & Business Process Alignment

CISM    |    Intermediate
  • 14 Videos | 1h 19m 1s
  • Includes Assessment
  • Earns a Badge
Likes 8 Likes 8
Proper IT governance starts with aligning IT solutions with business processes. In this course, you'll explore how to identify the relationship between IT security and business objectives. You'll examine in detail how various regulations and security standards, such as HIPAA, GDPR, and PCI DSS, can influence an organization's IT security decisions, going through seven of such regulations one-by-one. Next, you'll examine the cloud services, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) to determine how responsibility is divided between provider and consumer. Lastly, you'll investigate several public cloud providers' security accreditations. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recognize the relevance of IT security in today's business environment
    identify the relationship between IT security and business processes
    identify security control types and how they address potential threats
    recall the usefulness of international IT security management standards
    correlate cloud computing and IT security requirements as they pertain to U.S. government agencies
    recognize how sensitive medial data is protected in conjunction with U.S. health care requirements
  • recognize how EU citizen private data must be protected internationally
    apply security controls to protect credit card holder information
    recognize how select Canadian acts of legislation are designed to ensure data privacy
    outline how COBIT provides an IT management framework
    identify the responsibility distribution of various cloud service models
    view public cloud provider security accreditations
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    2m 5s
    UP NEXT
  • Playable
    2. 
    Information Security Management
    3m 30s
  • Locked
    3. 
    Business Processes and IT Security
    6m 13s
  • Locked
    4. 
    Security Controls and Control Objectives
    6m 1s
  • Locked
    5. 
    ISO/IEC 27001 and IT Security
    6m 12s
  • Locked
    6. 
    FedRAMP and IT Security
    5m 26s
  • Locked
    7. 
    HIPAA and IT Security
    5m 35s
  • Locked
    8. 
    GDPR and IT Security
    6m 3s
  • Locked
    9. 
    PCI DSS and IT Security
    6m 19s
  • Locked
    10. 
    PIPEDA and IT Security
    5m 52s
  • Locked
    11. 
    COBIT and IT Security
    7m 30s
  • Locked
    12. 
    Cloud Shared Responsibility
    8m 4s
  • Locked
    13. 
    Cloud Provider Security Accreditations
    3m 8s
  • Locked
    14. 
    Course Summary
    1m 6s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.