CISM 2022: Information Security Governance

CISM    |    Intermediate
  • 16 videos | 1h 40m 3s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
The best way to improve the enterprise security stance is to align IT security solutions with business objectives. In this course, you will consider how information security must align with business strategies. You will explore the business model for information security and review the importance of identifying and classifying assets critical to a business. Next, you will learn about supply chain security, personnel management, and the components of an information security program. You will discover the relationship between service-level agreements (SLAs) and organizational objectives and discuss the relevance of change and configuration management. Then, consider how to develop organizational security policies. Lastly, explore expense types, chain of custody, organizational culture, and how the Control Objectives for Information Technologies (COBIT) framework applies to IT governance. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how the business model for information security encompasses information security planning, implementation, and management
    Identify and classify assets for proper data governance based on value to the business
    Recognize how to apply security criteria when evaluating third-party vendors
    Identify personnel security issues related to hiring, background checks, and exit interviews
    Recognize components constituting an effective program including balanced scorecards
    Review cloud service-level agreements (slas) to ensure alignment with security policies
    Outline enterprise change management procedures to ensure risks have been evaluated
  • Identify enterprise configuration management procedures and terms such as cms, cmdb, an ci
    Outline various types of security policies, including acceptable use, and their constituents as well as management buy-in
    Recognize how an it maturity model provides an assessment as to whether technology is effectively securely meeting business needs through a gap analysis
    Distinguish between capital and operating expenses when budgeting
    Recognize the importance of securing evidence including during and after collection
    Recognize how to ensure effective security governance through security awareness and business executive involvement
    Identify how the control objectives for information technologies (cobit) framework applies to it governance
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 19s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 7s
    After completing this video, you will be able to recognize how the business model for information security encompasses information security planning, implementation, and management. FREE ACCESS
  • Locked
    3.  Asset Identification and Classification
    6m 46s
    Upon completion of this video, you will be able to identify and classify assets for proper data governance based on value to the business. FREE ACCESS
  • Locked
    4.  Supply Chain Security
    7m 12s
    After completing this video, you will be able to recognize how to apply security criteria when evaluating third-party vendors. FREE ACCESS
  • Locked
    5.  Personnel Management
    7m 58s
    Upon completion of this video, you will be able to identify personnel security issues related to hiring, background checks, and exit interviews. FREE ACCESS
  • Locked
    6.  Information Security Programs
    6m 26s
    After completing this video, you will be able to recognize components constituting an effective program including balanced scorecards. FREE ACCESS
  • Locked
    7.  Reviewing Service-level Agreements (SLAs)
    6m 27s
    Learn how to review cloud service-level agreements (SLAs) to ensure alignment with security policies. FREE ACCESS
  • Locked
    8.  Change Management
    7m 28s
    After completing this video, you will be able to outline enterprise change management procedures to ensure risks have been evaluated. FREE ACCESS
  • Locked
    9.  Configuration Management
    5m 33s
    Upon completion of this video, you will be able to identify enterprise configuration management procedures and terms such as CMS, CMDB, and CI. FREE ACCESS
  • Locked
    10.  Organizational Security Policies
    8m 10s
    After completing this video, you will be able to outline various types of security policies, including acceptable use, and their constituents as well as management buy-in. FREE ACCESS
  • Locked
    11.  IT Maturity Models
    6m 50s
    Upon completion of this video, you will be able to recognize how an IT maturity model provides an assessment as to whether technology is effectively securely meeting business needs through a gap analysis. FREE ACCESS
  • Locked
    12.  Capital Versus Operating Expenses
    6m 52s
    In this video, you will learn how to distinguish between capital and operating expenses when budgeting. FREE ACCESS
  • Locked
    13.  Chain of Custody
    6m 41s
    After completing this video, you will be able to recognize the importance of securing evidence including during and after collection. FREE ACCESS
  • Locked
    14.  Organizational Culture and Security
    9m 11s
    Upon completion of this video, you will be able to recognize how to ensure effective security governance through security awareness and business executive involvement. FREE ACCESS
  • Locked
    15.  Use of Control Objectives for Information Technologies (COBIT) for IT Governance
    4m 54s
    Upon completion of this video, you will be able to identify how the Control Objectives for Information Technologies (COBIT) framework applies to IT governance. FREE ACCESS
  • Locked
    16.  Course Summary
    1m 11s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.7 of 9 users Rating 4.7 of 9 users (9)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 110 users Rating 4.5 of 110 users (110)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)