Curriculum For This Course
Video tutorials list
-
Course Introduction
Video Name Time 1. Course Introduction 01:02 -
Domain 01 - Information Security Governance
Video Name Time 1. Lesson 1: Information Security Governance Overview 00:53 2. Information Security Governance Overview Part1 01:12 3. Information Security Governance Overview Part2 02:00 4. Information Security Governance Overview Part3 01:22 5. Information Security Governance Overview Part4 01:32 6. Information Security Governance Overview Part5 00:30 7. Importance of Information Security Governance Part1 06:21 8. Importance of Information Security Governance Part2 01:19 9. Outcomes of Information Security Governance Part1 00:33 10. Outcomes of Information Security Governance Part2 01:26 11. Outcomes of Information Security Governance Part3 02:45 12. Outcomes of Information Security Governance Part4 01:27 13. Outcomes of Information Security Governance Part5 01:54 14. Outcomes of Information Security Governance Part6 01:28 15. Lesson 2: Effective Information Security Governance 00:31 16. Business Goals and Objectives Part1 01:31 17. Business Goals and Objectives Part2 02:00 18. Roles and Responsibilities of Senior Management Part1 01:02 19. Roles and Responsibilities of Senior Management Part2 00:43 20. Domain Tasks Part1 01:21 21. Domain Tasks Part2 03:16 22. Business Model for Information Security Part1 00:45 23. Business Model for Information Security Part2 01:09 24. Business Model for Information Security Part3 03:16 25. Business Model for Information Security Part4 01:37 26. Dynamic Interconnections Part1 00:34 27. Dynamic Interconnections Part2 02:55 28. Dynamic Interconnections Part3 01:55 29. Dynamic Interconnections Part4 00:51 30. Lesson 3: Information Security Concepts and Technologies 03:27 31. Information Security Concepts and Technologies Part1 02:58 32. Information Security Concepts and Technologies Part2 03:25 33. Information Security Concepts and Technologies Part3 01:50 34. Technologies Part1 01:41 35. Technologies Part2 06:12 36. Lesson 4: Information Security Manager 00:33 37. Responsibilities 01:48 38. Senior Management Commitment Part1 00:48 39. Senior Management Commitment Part2 02:27 40. Obtaining Senior Management Commitment Part1 00:24 41. Obtaining Senior Management Commitment Part2 00:53 42. Establishing Reporting and Communication Channels Part1 01:13 43. Establishing Reporting and Communication Channels Part2 01:07 44. Lesson 5: Scope and Charter of Information Security Governance 01:55 45. Assurance Process Integration and Convergence 02:24 46. Convergence 02:32 47. Governance and Third-Party Relationships 02:38 48. Lesson 6: Information Security Governance Metrics 00:56 49. Metrics 01:39 50. Effective Security Metrics Part1 01:46 51. Effective Security Metrics Part2 01:01 52. Effective Security Metrics Part3 01:51 53. Effective Security Metrics Part4 00:39 54. Security Implementation Metrics 01:17 55. Strategic Alignment Part1 02:56 56. Strategic Alignment Part2 01:11 57. Risk Management 01:14 58. Value Delivery 01:02 59. Resource Management Part1 00:47 60. Resource Management Part2 00:41 61. Performance Measurement 03:06 62. Assurance Process Integration/Convergence 02:54 63. Lesson 7: Information Security Strategy Overview 00:53 64. Another View of Strategy 00:41 65. Lesson 8: Creating Information Security Strategy 00:16 66. Information Security Strategy 01:22 67. Common Pitfalls Part1 04:38 68. Common Pitfalls Part2 02:19 69. Objectives of the Information Security Strategy 01:33 70. What is the Goal? 01:40 71. Defining Objectives 01:23 72. Business Linkages 01:48 73. Business Case Development Part1 01:44 74. Business Case Development Part2 02:36 75. Business Case Development Part3 00:45 76. Business Case Objectives 00:57 77. The Desired State 01:48 78. COBIT 01:08 79. COBIT Controls 01:09 80. COBIT Framework 00:48 81. Capability Maturity Model 01:38 82. Balanced Scorecard 01:22 83. Architectural Approaches 01:03 84. ISO/IEC 27001 and 27002 01:00 85. Risk Objectives Part1 01:39 86. Risk Objectives Part2 03:11 87. Lesson 9: Determining Current State Of Security 00:45 88. Current Risk Part1 02:37 89. Current Risk Part2 01:11 90. BIA 01:11 91. Lesson 10: Information Security Strategy Development 01:52 92. The Roadmap 01:01 93. Elements of a Strategy 03:27 94. Strategy Resources and Constraints 02:46 95. Lesson 11: Strategy Resources 00:32 96. Policies and Standards 01:01 97. Definitions 05:48 98. Enterprise Information Security Architectures 01:30 99. Controls 03:00 100. Countermeasures 00:55 101. Technologies 01:50 102. Personnel 01:54 103. Organizational Structure 03:47 104. Employee Roles and Responsibilities 00:28 105. Skills 01:17 106. Audits 01:41 107. Compliance Enforcement 02:24 108. Threat Assessment 01:41 109. Vulnerability Assessment 02:21 110. Risk Assessment 02:19 111. Insurance 02:04 112. Business Impact Assessment 02:32 113. Outsourced Security Providers 02:57 114. Lesson 12: Strategy Constraints 00:23 115. Legal and Regulatory Requirements 01:43 116. Physical Constraints 02:56 117. The Security Strategy 01:36 118. Lesson 13: Action Plan to Implement Strategy 01:13 119. Gap Analysis Part1 01:35 120. Gap Analysis Part2 00:52 121. Gap Analysis Part3 03:01 122. Policy Development Part1 01:42 123. Policy Development Part2 01:00 124. Standards Development 02:45 125. Training and Awareness 00:35 126. Action Plan Metrics 01:23 127. General Metric Considerations Part1 00:23 128. General Metric Considerations Part2 00:35 129. General Metric Considerations Part3 00:43 130. General Metric Considerations Part4 00:23 131. CMM4 Statements 02:00 132. Objectives for CMM4 00:47 133. Domain 01 Review 00:44 -
Domain 02 - Information Risk Management
Video Name Time 1. Lesson 1: Risk Management Overview 00:59 2. Risk Management Overview 01:51 3. Types of Risk Analysis 07:08 4. The Importance of Risk Management 02:14 5. Risk Management Outcomes 01:35 6. Risk Management Strategy 01:49 7. Lesson 2: Good Information Security Risk Management 04:14 8. Context and Purpose 03:08 9. Scope and Charter 00:39 10. Assets 02:31 11. Other Risk Management Goals 02:02 12. Roles and Responsibilities 02:52 13. Lesson 3: Information Security Risk Management Concepts 06:06 14. Technologies 06:39 15. Lesson 4: Implementing Risk Management 02:08 16. The Risk Management Framework 02:00 17. The External Environment 01:48 18. The Internal Environment 02:07 19. The Risk Management Context 00:47 20. Gap Analysis 02:21 21. Other Organizational Support 04:09 22. Risk Analysis 01:22 23. Lesson 5: Risk Assessment 01:19 24. NIST Risk Assessment Methodology 03:49 25. Aggregated or Cascading Risk 02:54 26. Other Risk Assessment Approaches 01:18 27. Identification of Risks 01:49 28. Threats 01:08 29. Vulnerabilities Part1 02:11 30. Vulnerabilities Part2 04:10 31. Risks 01:36 32. Analysis of Relevant Risks 01:48 33. Risk Analysis 02:29 34. Semi -Quantitative Analysis 01:52 35. Quantitative Analysis Example 04:14 36. Evaluation of Risks 00:46 37. Risk Treatment Options 04:39 38. Impact 02:59 39. Lesson 6: Controls Countermeasures 00:25 40. Controls 04:43 41. Residual Risk 03:38 42. Information Resource Valuation 01:33 43. Methods of Valuing Assets 01:36 44. Information Asset Classification 03:32 45. Determining Classification 02:05 46. Impact Part1 03:53 47. Impact Part2 01:03 48. Lesson 7: Recovery Time Objectives 00:49 49. Recovery Point Objectives 04:18 50. Service Delivery Objectives 01:58 51. Third-Party Service Providers 01:44 52. Working with Lifecycle Processes 02:08 53. IT System Development 02:12 54. Project Management Part1 00:47 55. Project Management Part2 02:10 56. Lesson 8: Risk Monitoring and Communication 01:17 57. Risk Monitoring and Communication 00:38 58. Other Communications 01:25 59. Domain 02 Review 01:01 -
Domain 03 - Information Security Program Development
Video Name Time 1. Introduction 00:31 2. Lesson 1: Development of Information Security Program 02:50 3. Importance of the Program 00:52 4. Outcomes of Security Program Development 01:47 5. Effective Information Security Program Development 04:59 6. Lesson 2: Information Security Program Objectives 00:10 7. Cross Organizational Responsibilities 01:55 8. Program Objectives Part1 02:23 9. Program Objectives Part2 01:18 10. Defining Objectives Part1 02:11 11. Defining Objectives Part2 01:08 12. Lesson 3: Information Security Program Development Concepts Part1 04:02 13. Information Security Program Development Concepts Part2 05:39 14. Technology Resources 02:44 15. Information Security Manager 01:25 16. Lesson 4: Scope and Charter of Information Security Program Development 00:30 17. Assurance Function Integration 01:35 18. Challenges in Developing Information Security Program 01:54 19. Pitfalls 02:48 20. Objectives of the Security Program 02:06 21. Program Goals 02:52 22. The Steps of the Security Program 01:46 23. Defining the Roadmap Part1 01:38 24. Defining the Roadmap Part2 00:58 25. Elements of the Roadmap Part1 01:18 26. Elements of the Roadmap Part2 00:34 27. Elements of the Roadmap Part3 01:57 28. Elements of the Roadmap Part4 01:17 29. Elements of the Roadmap Part5 00:18 30. Gap Analysis 00:44 31. Lesson 5: Information Security Management Framework 00:15 32. Security Management Framework 04:55 33. COBIT 5 05:59 34. ISO/IEC 27001 04:30 35. Lesson 6: Information Security Framework Components 00:13 36. Operational Components Part1 01:56 37. Operational Components Part2 03:11 38. Management Components 01:31 39. Administrative Components 03:30 40. Educational and Informational Components 01:26 41. Lesson 7: Information Security Program Resources 01:32 42. Resources 03:27 43. Documentation 00:54 44. Enterprise Architecture Part1 04:29 45. Enterprise Architecture Part2 01:54 46. Enterprise Architecture Part3 01:11 47. Controls as Strategy Implementation Resources Part1 03:42 48. Controls as Strategy Implementation Resources Part2 02:20 49. Controls as Strategy Implementation Resources Part3 04:35 50. Controls as Strategy Implementation Resources Part4 02:19 51. Common Control Practices 01:41 52. Countermeasures 00:37 53. Technologies Part1 01:13 54. Technologies Part2 01:52 55. Technologies Part3 01:39 56. Technologies Part4 05:38 57. Personnel Part1 02:00 58. Personnel Part2 02:56 59. Security Awareness 01:28 60. Awareness Topics 05:18 61. Formal Audits 01:16 62. Compliance Enforcement 01:03 63. Project Risk Analysis 03:09 64. Other Actions 02:58 65. Other Organizational Support 01:21 66. Program Budgeting Part1 01:03 67. Program Budgeting Part2 02:19 68. Lesson 8: Implementing an Information Security Program 00:13 69. Policy Compliance 02:38 70. Standards Compliance 02:44 71. Training and Education 01:43 72. ISACA Control Objectives 03:52 73. Third-party Service Providers Part1 01:08 74. Third-party Service Providers Part2 04:22 75. Integration into Lifecycle Processes 02:14 76. Monitoring and Communication 03:33 77. Documentation 01:33 78. The Plan of Action Part1 01:17 79. The Plan of Action Part2 01:36 80. Lesson 9: Information Infrastructure and Architecture 00:53 81. Managing Complexity Part1 04:42 82. Managing Complexity Part2 01:45 83. Objectives of Information Security Architectures Part1 01:30 84. Objectives of Information Security Architectures Part2 01:15 85. Physical and Environmental Controls 03:32 86. Lesson 10: Information Security Program 03:03 87. Information Security Program Deployment Metrics 02:27 88. Metrics 02:02 89. Strategic Alignment 00:53 90. Risk Management 01:41 91. Value Delivery 00:35 92. Resource Management 01:23 93. Assurance Process Integration 00:27 94. Performance Measurement 00:41 95. Security Baselines 00:38 96. Lesson 11: Security Program Services and Operational Activities 00:48 97. IS Liaison Responsibilities Part1 10:17 98. IS Liaison Responsibilities Part2 02:28 99. Cross-Organizational Responsibilities 01:34 100. Security Reviews and Audits Part1 03:27 101. Security Reviews and Audits Part2 01:38 102. Management of Security Technology 01:25 103. Due Diligence Part1 04:10 104. Due Diligence Part2 01:36 105. Compliance Monitoring and Enforcement Part1 02:02 106. Compliance Monitoring and Enforcement Part2 01:46 107. Assessment of Risk and Impact Part1 02:17 108. Assessment of Risk and Impact Part2 01:28 109. Outsourcing and Service Providers 02:33 110. Cloud Computing Part1 01:37 111. Cloud Computing Part2 01:54 112. Cloud Computing Part3 02:23 113. Integration with IT Processes 00:42 114. Domain 03 Review 01:13 -
Domain 04 - Information Security Incident Management
Video Name Time 1. Lesson 1: Incident Management Overview Part1 00:47 2. Incident Management Overview Part2 03:08 3. Incident Management Overview Part3 03:45 4. Types of Events Part1 02:44 5. Types of Events Part2 03:20 6. Goals of Incident Management Part1 04:45 7. Goals of Incident Management Part2 06:31 8. Goals of Incident Management Part3 03:26 9. Lesson 2: Incident Response Procedures Part1 00:23 10. Incident Response Procedures Part2 03:40 11. Importance of Incident Management 08:01 12. Outcomes of Incident Management 03:50 13. Incident Management 01:35 14. Concepts Part1 03:44 15. Concepts Part2 01:35 16. Concepts Part3 01:34 17. Incident Management Systems Part1 04:02 18. Incident Management Systems Part2 00:53 19. Lesson 3: Incident Management Organization 02:31 20. Responsibilities Part1 03:44 21. Responsibilities Part2 02:58 22. Responsibilities Part3 05:10 23. Senior Management Commitment 01:02 24. Lesson 4: Incident Management Resources 00:25 25. Policies and Standards 00:36 26. Incident Response Technology Concepts 11:12 27. Personnel 03:11 28. Roles and Responsibilities (eNotes) 08:24 29. Skills 08:09 30. Awareness and Education 01:20 31. Audits 02:49 32. Lesson 5: Incident Management Objectives 00:17 33. Defining Objectives 00:48 34. The Desired State 03:29 35. Strategic Alignment 06:42 36. Other Concerns 02:33 37. Lesson 6: Incident Management Metrics and Indicators 05:14 38. Implementation of the Security Program Management 03:01 39. Management Metrics and Monitoring Part1 01:35 40. Management Metrics and Monitoring Part2 02:48 41. Other Security Monitoring Efforts 04:24 42. Lesson 7: Current State of Incident Response Capability 00:11 43. Threats 04:39 44. Vulnerabilities 06:15 45. Lesson 8: Developing an Incident Response Plan 00:44 46. Elements of an Incident Response Plan 08:19 47. Gap Analysis 03:05 48. BIA Part1 05:05 49. BIA Part2 02:48 50. Escalation Process for Effective IM 02:45 51. Help Desk Processes for Identifying Security Incidents 01:27 52. Incident Management and Response Teams 02:10 53. Organizing, Training, and Equipping the Response Staff 01:55 54. Incident Notification Process 00:55 55. Challenges in making an Incident Management Plan 02:18 56. Lesson 9: BCP/DRP 07:49 57. Goals of Recovery Operations Part1 02:02 58. Goals of Recovery Operations Part2 01:57 59. Choosing a Site Selection Part1 05:37 60. Choosing a Site Selection Part2 01:18 61. Implementing the Strategy 03:58 62. Incident Management Response Teams 02:10 63. Network Service High-availability 04:17 64. Storage High-availability 04:01 65. Risk Transference 01:27 66. Other Response Recovery Plan Options 01:29 67. Lesson 10: Testing Response and Recovery Plans 02:17 68. Periodic Testing 01:17 69. Analyzing Test Results Part1 02:06 70. Analyzing Test Results Part2 03:39 71. Measuring the Test Results 00:58 72. Lesson 11: Executing the Plan 01:56 73. Updating the Plan 01:15 74. Intrusion Detection Policies 01:38 75. Who to Notify about an Incident 01:52 76. Recovery Operations 01:53 77. Other Recovery Operations 01:57 78. Forensic Investigation 03:05 79. Hacker / Penetration Methodology 11:50 80. Domain 04 Review 01:15 81. Course Closure 00:34
Add Comment