CISM 2013: Information Security Governance (Part 2)
Many companies realize that their information security is not in the state that it should be. As an information security manager, it will be your role to guide your organization to where ...
CISM 2013: Information Security Governance (Part 3)
In order for information security governance to succeed, there must be an action plan put into place to lay the groundwork for success. This course examines the assets, departments, resources, and ...
CISM 2013: Information Security Incident Management (Part 1)
Managing incidents, and the response that is put forward by an organization falls directly under the duties of a CISM. Organizations must have a plan in place, and must know the steps they will take ...
CISM 2013: Information Security Incident Management (Part 2)
Preparing incident response and recovery plans is a very important part of a CISM's role. This course examines how to identify the current state of incident response capability, identifies the ...
CISM 2013: Information Security Program Development and Management (Part 1)
An information security program is the foundation of an information security manager's daily work. This course examines the purpose and fundamentals of IS program development and management, along ...
CISM 2013: Information Security Program Development and Management (Part 2)
An information security framework represents the entire IS management structure. This course examines governance frameworks such as COBIT and industry standards like ISO/IEC 27001. This course also ...
CISM 2013: Information Security Program Development and Management (Part 3)
Information security managers are responsible for all administrative activities related to the development and management of an information security program. Those activities include such things as ...
CISM 2013: Information Security Program Development and Management (Part 4)
Information security programs typically have numerous operational responsibilities and provide a variety of security services. While programs vary from organization to organization, there are ...
CISM 2013: Information Security Program Development and Management (Part 5)
Security programs require strong controls and countermeasures to ensure that security activities are carried out and measures exist to deal with issues that may arise while a security program is ...
CISSP 2013 Domain: Access Control
This course focuses on the need for access control mechanisms to secure an organization's network and minimize its vulnerability to attacks or intrusion. It covers various access control models, ...