CISM 2022: Business Continuity & Security

CISM    |    Intermediate
  • 12 videos | 1h 13m 2s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Keeping business processes up and running is a priority for every type of business. Security plays an important role in the success of business continuity planning. In this course, you will discover the characteristics that define a business impact analysis (BIA) and explore disaster recovery plans (DRPs) and various data and IT security roles commonly present in an enterprise. Next, you will learn how contractual obligations can necessitate security compliance and audits. You will discover the importance of establishing performance and security baselines on-premises and in the cloud. Lastly, you will explore physical security and security control types with a slant on business process alignment. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify common characteristics of a business continuity plan (bcp), business impact analysis (bia) and related insurance options
    Identify common characteristics of a disaster recovery plan (drp) including recovery time objective (rto) and recovery point objective (rpo)
    Recognize data roles such as owner and custodian to enable accountability
    List common it security roles such as privacy officers, security policy staff, chief information officer (cio), chief information security office (ciso), and security engineers
    Outline how to determine contract details such as right-to-audit clause and communicate security policies to other parties
  • Recognize which factors influence the crafting of various security baselines
    Use a data collector set to establish a windows performance baseline
    Configure alert rules and action group notifications for performance metrics
    Outline methods of securing assets using physical controls
    Identify types of security controls including detective, preventative, compensating, technical, corrective, and administrative
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 9s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 33s
    After completing this video, you will be able to identify common characteristics of a business continuity plan (BCP), business impact analysis (BIA) and related insurance options. FREE ACCESS
  • Locked
    3.  Disaster Recovery Plan (DRP)
    9m 11s
    Upon completion of this video, you will be able to identify common characteristics of a disaster recovery plan (DRP) including recovery time objective (RTO) and recovery point objective (RPO). FREE ACCESS
  • Locked
    4.  Data Roles
    5m 51s
    After completing this video, you will be able to recognize data roles such as owner and custodian to enable accountability. FREE ACCESS
  • Locked
    5.  IT Security Roles
    5m 41s
    Upon completion of this video, you will be able to list common IT security roles such as privacy officers, security policy staff, chief information officer (CIO), chief information security office (CISO), and security engineers. FREE ACCESS
  • Locked
    6.  Contractual Obligations
    6m 22s
    After completing this video, you will be able to outline how to determine contract details such as right-to-audit clause and communicate security policies to other parties. FREE ACCESS
  • Locked
    7.  Security Baselines
    7m 51s
    Upon completion of this video, you will be able to recognize which factors influence the crafting of various security baselines. FREE ACCESS
  • Locked
    8.  Establishing a Performance Baseline on Windows Server
    6m 8s
    Find out how to use a data collector set to establish a Windows performance baseline. FREE ACCESS
  • Locked
    9.  Establishing a Performance Baseline in the Azure Cloud
    6m 28s
    Learn how to configure alert rules and action group notifications for performance metrics. FREE ACCESS
  • Locked
    10.  Physical Security
    7m 40s
    After completing this video, you will be able to outline methods of securing assets using physical controls. FREE ACCESS
  • Locked
    11.  Security Control Types
    8m 7s
    Upon completion of this video, you will be able to identify types of security controls including detective, preventative, compensating, technical, corrective, and administrative. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 2s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.6 of 93 users Rating 4.6 of 93 users (93)
Rating 4.5 of 84 users Rating 4.5 of 84 users (84)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 153 users Rating 4.5 of 153 users (153)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.8 of 21 users Rating 4.8 of 21 users (21)