CBTNuggets - ISACA CISM - Certified Information Security Manager ...
- Category Other
- Type Tutorials
- Language English
- Total size 1.8 GB
- Uploaded By freecoursewb
- Downloads 477
- Last checked 13 hours ago
- Date uploaded 7 months ago
- Seeders 9
- Leechers 5
Infohash : 6819F87F2F4DAEEA7F85085FCC058416C394D88B
CBTNuggets - ISACA CISM – Certified Information Security Manager 2025
https://WebToolTip.com
Released 6/2025
Taught by Bob Salmans
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Intermediate | Genre: eLearning | Language: English | Duration: 99 Lessons ( 12h 55m ) | Size: 1.8 GB
This CISM training prepares IT professionals to manage enterprise-level security governance, risk, and incident response. This online, self-paced course aligns with ISACA's latest Certified Information Security Manager exam and is ideal for roles like Information Security Manager, GRC Lead, or Risk Officer. You'll build leadership skills in threat modeling, risk treatment, and post-incident review, making it perfect for both CISM certification prep and recertification.
What you'll learn
Design and align security strategy with business objectives
Conduct vulnerability and control gap analysis
Develop and evaluate business continuity plans
Manage third-party and supply chain security risks
Monitor incidents with tools like SIEMs and response playbooks
Communicate risk posture and incident response to stakeholders
FAQs
Who should take this CISM training?
Files:
[ WebToolTip.com ] CBTNuggets - ISACA CISM - Certified Information Security Manager 2025- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 1. Creating An Information Security Program
- 1. Organizational Culture.mp4 (13.6 MB)
- 2. Security Governance 1.mp4 (19.4 MB)
- 3. Security Governance 2.mp4 (15.3 MB)
- 4. The Importance of Strategy 1.mp4 (16.8 MB)
- 5. The Importance of Strategy 2.mp4 (13.7 MB)
- 6. Information Security Frameworks.mp4 (14.3 MB)
- 7. Strategic Objectives.mp4 (18.1 MB)
- 8. Business Model for Information Security (BMIS).mp4 (12.6 MB)
- 1. Security Operations Centers (SOCs) 1.mp4 (22.8 MB)
- 2. Security Operations Centers (SOCs) 2.mp4 (17.0 MB)
- 3. Vulnerability and Patch Management.mp4 (10.4 MB)
- 4. Protecting Networks Pt.1.mp4 (28.4 MB)
- 5. Protecting Networks Pt.2.mp4 (33.8 MB)
- 6. Content Filtering Solutions.mp4 (20.7 MB)
- 7. Endpoint Protection and Management.mp4 (16.6 MB)
- 1. Secure Software Development.mp4 (14.3 MB)
- 2. Identity & Access Management (IAM) 1.mp4 (29.2 MB)
- 3. Identity & Access Management (IAM) 2.mp4 (11.9 MB)
- 4. Security Awareness Training and MSSPs.mp4 (23.6 MB)
- 5. Data Backup and Recovery.mp4 (31.7 MB)
- 6. Financial and Capacity Management.mp4 (21.3 MB)
- 1. Security Controls.mp4 (16.3 MB)
- 2. Categories Of Security Controls.mp4 (13.8 MB)
- 3. Security Control Functions.mp4 (10.6 MB)
- 4. Testing Security Controls.mp4 (16.6 MB)
- 5. Security Control Objectives and Frameworks.mp4 (14.7 MB)
- 6. Designing Security Controls.mp4 (10.9 MB)
- 7. Key Performance Indicators (KPIs).mp4 (16.7 MB)
- 1. Phases Of Incident Response.mp4 (15.7 MB)
- 2. Incident Response Preparation.mp4 (18.8 MB)
- 3. Incident Response Planning.mp4 (19.0 MB)
- 4. Detection, Initiation and Evaluation Of Incidents.mp4 (17.1 MB)
- 5. Containment, Eradication and Recovery.mp4 (11.1 MB)
- 6. Post Incident Activities.mp4 (11.2 MB)
- 7. Incident Response Resources.mp4 (12.7 MB)
- 1. BC and DR Planning (BCDR).mp4 (8.6 MB)
- 2. The BCDR Planning Process.mp4 (16.7 MB)
- 3. Creating a BC Plan.mp4 (12.6 MB)
- 4. DR Planning.mp4 (26.3 MB)
- 5. Resiliency Technologies.mp4 (19.4 MB)
- 6. BCDR Testing.mp4 (8.4 MB)
- 7. BCDR Resources.mp4 (17.1 MB)
- 1. The P3 Policies, Processes and Procedures.mp4 (22.1 MB)
- 2. Standards, Guidelines and Architecture.mp4 (23.8 MB)
- 3. Controls, Metrics and Assets.mp4 (19.9 MB)
- 4. Risk Ledgers, Vulnerability Assessments and Insurance.mp4 (14.5 MB)
- 5. Critical Data, BIA's and BCDR Planning.mp4 (22.7 MB)
- 6. Incident Logs and Audits.mp4 (10.9 MB)
- 7. Information Security Training, 3rd Party Risk and LCR Requirements.mp4 (19.8 MB)
- 1. Creating A Business Case 1.mp4 (22.6 MB)
- 2. Creating A Business Case 2.mp4 (8.7 MB)
- 3. Communications and Reporting.mp4 (22.0 MB)
- 4. How To Communicate Technical Information.mp4 (15.7 MB)
- 5. Commitment From Management.mp4 (34.9 MB)
- 6. End User Information Security Training.mp4 (23.2 MB)
- 7. Causes Of Failure To Avoid.mp4 (23.1 MB)
- 1. Organization Level Roles.mp4 (29.0 MB)
- 2. Roles Pertaining To Our Data.mp4 (9.6 MB)
- 3. The World of Metrics.mp4 (11.0 MB)
- 4. Metrics Scenario 1.mp4 (17.9 MB)
- 5. Metrics Scenario 2.mp4 (17.0 MB)
- 6. Have We Achieved Success.mp4 (11.1 MB)
- 7. DAD Triad.mp4 (5.0 MB)
- 1. The Role of Risk Managent.mp4 (18.0 MB)
- 2. Risk Management Frameworks.mp4 (24.7 MB)
- 3. Risk Management Strategy 1.mp4 (21.4 MB)
- 4. Risk Management Strategy 2.mp4 (14.6 MB)
- 5. Analyzing Risk 1.mp4 (27.6 MB)
- 6. Analyzing Risk 2.mp4 (13.8 MB)
- 7. Risk Analysis Techniques.mp4 (16.1 MB)
- 8. Dealing With Risk.mp4 (30.1 MB)
- 1. Risk Management Activities.mp4 (19.8 MB)
- 2. NIST SP 800-39 Managing Information Security Risk.mp4 (30.2 MB)
- 3. NIST SP 800-30 Guide For Conducting Risk Assessments.mp4 (22.6 MB)
- 4. ISOIEC 27005 Guidance On Managing IS Risk.mp4 (21.1 MB)
- 5. Factor Analysis of Information Risk (FAIR).mp4 (19.3 MB)
- 6. Risk Management Walk-Through.mp4 (17.0 MB)
- 1. Hardware, Software and Information Assets.mp4 (27.3 MB)
- 2. Cloud and Virtual Assets.mp4 (25.7 MB)
- 3. Asset Information and Classification 1.mp4 (18.1 MB)
- 4. Asset Information and Classification 2.mp4 (12.0 MB)
- 5. Identifying Threats To Assets 1.mp4 (18.6 MB)
- 6. Identifying Threats To Assets 2.mp4 (16.0 MB)
- 7. Identifying Asset Vulnerabilities.mp4 (19.4 MB)
- 8. Bonus Nugget Nessus Vulnerability Scanner.mp4 (33.8 MB)
- 1. Risk Management Objectives Pt.1.mp4 (24.7 MB)
- 2. Risk Management Objectives Pt.2.mp4 (25.9 MB)
- 3. Third Party Risk Management Pt.1.mp4 (30.0 MB)
- 4. Third Party Risk Management Pt.2.mp4 (19.8 MB)
- 5. The Risk Register.mp4 (12.5 MB)
- 6. Integrating Risk Management Into Other Processes.mp4 (20.4 MB)
- 7. Risk Monitoring and Reporting.mp4 (22.2 MB)
- 1. Building Blocks Of An Information Security Program.mp4 (15.8 MB)
- 2. Information Security Program Details.mp4 (16.2 MB)
- 3. Information Security Architecture.mp4 (21.0 MB)
- 4. Security Program Management 1.mp4 (21.9 MB)
- 5. Security Program Management 2.mp4 (15.9 MB)
- 6. Security Policies.mp4 (10.8 MB)
- 7. Working With Resources.mp4 (22.5 MB)
- Bonus Resources.txt (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce