Torrent details for "Certified Information Security Manager (CISM): Part 2 – Domains"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
6.53 GB
Info Hash:
7d0913a3c70db1f13a8f50c316bc4e0b48005a55
Added By:
Added:  
01-06-2021 05:28
Views:
988
Health:
Seeds:
1
Leechers:
3
Completed:
187
wide




Description
wide
Image error
Description

This learning path provides a deep dive into information security and prepares you for the Certified Information Security Manager (CISM) exam.

By the time you reach the end of this learning path, you will have a comprehensive understanding of information security and will be well equipped to take the CISM exam.

If you have any feedback relating to this learning path, please contact us at support@cloudacademy.com.
Learning Objectives

   Obtain a comprehensive understanding of information security and risk management including roles, functions, resources, goals, strategies, metrics, controls
   Understand how an organization can identify and analyze risk and learn the constraints to risk management
   Get a solid understanding of how to build risk management action plan, how people and process are essential for risk management
   Learn about the training, the technical aspects, and standards for risk management
   Understanding how to monitor and measure risk, and also mitigate risk through controls
   Understand how to set goals and strategies for managing information security and learn about the metrics used to measure security performance
   Obtain a solid understanding of security incident management, set goals for responding to incidents, and understand the additional resources that help for managing incidents

Intended Audience

This learning path is intended for anyone studying for the Certified Information Security Manager (CISM) exam or who simply wants to learn about information security in general.
Prerequisites

This is a beginner-level learning path so you don’t need to have existing knowledge of information security. We do, however, strongly recommend that you take the CISM: Part 1 — Foundations learning path before embarking on this one.

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes