CISM 2022: Security Standards

CISM    |    Intermediate
  • 10 videos | 53m 16s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 21 users Rating 4.8 of 21 users (21)
Global and local security standards, including laws and regulations, are an important input to determine how enterprises deploy and manage security controls. In this course, you will learn how the European Union's General Data Protection Regulation (GDPR) data privacy legislation applies to any organization world-wide handling private EU citizen data. Next, you will explore various International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) standards for proper data governance, followed by American data privacy and cloud security standards such as Health Insurance Portability and Accountability Act (HIPAA) and Federal Risk and Authorization Management Program (FedRamp). Discover how to secure cardholder data as related to Payment Card Industry Data Security Standard (PCI DSS) international security standards and review other data privacy legislation including Canada's Personal Information Protection and Electronic Documents Act (PIPEDA) and China's Personal Information Protection Law (PIPL). Lastly, explore the importance of securing cloud service usage in alignment with the Cloud Controls Matrix (CCM). This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how general data protection regulation (gdpr) assures data privacy
    Recognize how international organization for standardization/international electrotechnical commission (iso/iec) standards can result in proper it governance
    Outline how health insurance portability and accountability act (hipaa) protects sensitive medical information
    Recognize how federal risk and authorization management program (fedramp) standards are used to secure u.s. government information
  • Recognize how payment card industry data security standard (pci dss) standards protect cardholder information
    Outline how to implement controls in accordance with canada's personal information protection and electronic documents act (pipeda) data privacy legislation
    Outline how to implement controls in accordance with china's personal information protection law (pipl) data privacy legislation
    Recognize the role that the cloud controls matrix (ccm) plays in establishing cloud security controls
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 25s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 55s
    After completing this video, you will be able to outline how General Data Protection Regulation (GDPR) assures data privacy. FREE ACCESS
  • Locked
    3.  ISO/IEC Standards
    6m 8s
    Upon completion of this video, you will be able to recognize how International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) standards can result in proper IT governance. FREE ACCESS
  • Locked
    4.  America's Health Insurance Portability and Accountability Act (HIPAA)
    7m 10s
    After completing this video, you will be able to outline how Health Insurance Portability and Accountability Act (HIPAA) protects sensitive medical information. FREE ACCESS
  • Locked
    5.  America's Federal Risk and Authorization Management Program (FedRamp)
    5m 56s
    Upon completion of this video, you will be able to recognize how Federal Risk and Authorization Management Program (FedRAMP) standards are used to secure U.S. government information . FREE ACCESS
  • Locked
    6.  Payment Card Industry Data Security Standard (PCI DSS)
    6m 47s
    After completing this video, you will be able to recognize how Payment Card Industry Data Security Standard (PCI DSS) standards protect cardholder information. FREE ACCESS
  • Locked
    7.  Canada's Personal Information Protection and Electronic Documents Act (PIPEDA)
    5m 51s
    Upon completion of this video, you will be able to outline how to implement controls in accordance with Canada's Personal Information Protection and Electronic Documents Act (PIPEDA) data privacy legislation. FREE ACCESS
  • Locked
    8.  China's Personal Information Protection Law (PIPL)
    5m 41s
    After completing this video, you will be able to outline how to implement controls in accordance with China's Personal Information Protection Law (PIPL) data privacy legislation. FREE ACCESS
  • Locked
    9.  Using the Cloud Controls Matrix (CCM)
    7m 18s
    Find out how to recognize the role that the Cloud Controls Matrix (CCM) plays in establishing cloud security controls. FREE ACCESS
  • Locked
    10.  Course Summary
    1m 6s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.9 of 8 users Rating 4.9 of 8 users (8)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.4 of 258 users Rating 4.4 of 258 users (258)