CISM 2020: Information Security & Business Process Alignment

CISM    |    Intermediate
  • 14 videos | 1h 13m 1s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 198 users Rating 4.6 of 198 users (198)
Proper IT governance starts with aligning IT solutions with business processes. In this course, you'll explore how to identify the relationship between IT security and business objectives. You'll examine in detail how various regulations and security standards, such as HIPAA, GDPR, and PCI DSS, can influence an organization's IT security decisions, going through seven of such regulations one-by-one. Next, you'll examine the cloud services, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) to determine how responsibility is divided between provider and consumer. Lastly, you'll investigate several public cloud providers' security accreditations. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize the relevance of it security in today's business environment
    Identify the relationship between it security and business processes
    Identify security control types and how they address potential threats
    Recall the usefulness of international it security management standards
    Correlate cloud computing and it security requirements as they pertain to u.s. government agencies
    Recognize how sensitive medial data is protected in conjunction with u.s. health care requirements
  • Recognize how eu citizen private data must be protected internationally
    Apply security controls to protect credit card holder information
    Recognize how select canadian acts of legislation are designed to ensure data privacy
    Outline how cobit provides an it management framework
    Identify the responsibility distribution of various cloud service models
    View public cloud provider security accreditations
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 5s
  • 3m 30s
    After completing this video, you will be able to recognize the importance of IT security in today's business environment. FREE ACCESS
  • Locked
    3.  Business Processes and IT Security
    6m 13s
    In this video, you will learn how to identify the relationship between IT security and business processes. FREE ACCESS
  • Locked
    4.  Security Controls and Control Objectives
    6m 1s
    In this video, you will identify types of security controls and how they address potential threats. FREE ACCESS
  • Locked
    5.  ISO/IEC 27001 and IT Security
    6m 12s
    After completing this video, you will be able to recall the usefulness of international IT security management standards. FREE ACCESS
  • Locked
    6.  FedRAMP and IT Security
    5m 26s
    In this video, find out how to correlate cloud computing and IT security requirements as they pertain to U.S. government agencies. FREE ACCESS
  • Locked
    7.  HIPAA and IT Security
    5m 35s
    After completing this video, you will be able to recognize how sensitive medical data is protected in conjunction with U.S. health care requirements. FREE ACCESS
  • Locked
    8.  GDPR and IT Security
    6m 3s
    Upon completion of this video, you will be able to recognize how EU citizens' private data must be protected internationally. FREE ACCESS
  • Locked
    9.  PCI DSS and IT Security
    6m 19s
    During this video, you will learn how to apply security controls to protect credit card holder information. FREE ACCESS
  • Locked
    10.  PIPEDA and IT Security
    5m 52s
    Upon completion of this video, you will be able to recognize how select Canadian acts of legislation are designed to ensure data privacy. FREE ACCESS
  • Locked
    11.  COBIT and IT Security
    7m 30s
    In this video, you will outline how COBIT provides an IT management framework. FREE ACCESS
  • Locked
    12.  Cloud Shared Responsibility
    8m 4s
    In this video, learn how to identify the responsibility distribution of various cloud service models. FREE ACCESS
  • Locked
    13.  Cloud Provider Security Accreditations
    3m 8s
    Learn how to view security accreditations for public cloud providers. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 6s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.8 of 11 users Rating 4.8 of 11 users (11)
Rating 4.2 of 25 users Rating 4.2 of 25 users (25)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 519 users Rating 4.4 of 519 users (519)
Rating 4.6 of 85 users Rating 4.6 of 85 users (85)
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)