CISM Cert Prep: 2 Information Risk Management

CISM Cert Prep: 2 Information Risk Management

.MP4, AVC, 200 kbps, 1280x720 | English, AAC, 160 kbps, 2 Ch | 3h 30m | 460 MB

Instructor: Mike Chapple
Prepare to pass the Certified Information Security Manager (CISM) exam. In this course, Mike Chapple dives into the topic of information security risk management practices, helping you bolster your ability to identify, assess, and mitigate risks as you prepare for the Information Risk Management exam domain. Mike goes over the key steps of the risk assessment process, the possible risk management options, and frameworks and tools that can help you keep your organization safe. He also includes comprehensive coverage of the many cybersecurity threats facing modern organizations, including viruses, adware, and advanced persistent threats (APTs). Learn about business continuity, disaster recovery, legal and regulatory compliance, and more.

Topics include:

Using information classification
Selecting and implementing security controls
Conducting ongoing risk management activities
Comparing adware, spyware, and ransomware
Dangers posed by advanced persistent threats (APTs)
Understanding attackers
Types of attacks, including networking and password attacks
Social engineering attacks
Scanning for vulnerabilities
Business continuity and disaster recovery planning
Managing vendor relationships


[Fast Download] CISM Cert Prep: 2 Information Risk Management

Ebooks related to "CISM Cert Prep: 2 Information Risk Management" :
DevSecOps: Building a Secure Continuous Delivery Pipeline
Principles of Secure Processor Architecture Design
Securing Web Applications
Architecting Cloud Computing Solutions: Build cloud strategies that align technology and economics w
VMware NSX Cookbook: Over 70 recipes to master the network virtualization skills to implement, valid
Understanding Information Age Warfare
Advances in Security and Payment Methods for Mobile Commerce
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 3rd Edition
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
InfoSecurity 2008 Threat Analysis
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
histats code