23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
This CISM training prepares IT professionals to manage enterprise-level security governance, risk, and incident response. This online, self-paced course aligns with ISACA's latest Certified Information Security Manager exam and is ideal for roles like Information Security Manager, GRC Lead, or Risk Officer. You'll build leadership skills in threat modeling, risk treatment, and post-incident review, making it perfect for both CISM certification prep and recertification.
What you'll learn
Design and align security strategy with business objectives
Conduct vulnerability and control gap analysis
Develop and evaluate business continuity plans
Manage third-party and supply chain security risks
Monitor incidents with tools like SIEMs and response playbooks
Communicate risk posture and incident response to stakeholders
FAQs
Who should take this CISM training?
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Creating An Information Security Program/1. Organizational Culture.mp4
13.6 MB
~Get Your Files Here !/1. Creating An Information Security Program/2. Security Governance 1.mp4
19.4 MB
~Get Your Files Here !/1. Creating An Information Security Program/3. Security Governance 2.mp4
15.3 MB
~Get Your Files Here !/1. Creating An Information Security Program/4. The Importance of Strategy 1.mp4
16.8 MB
~Get Your Files Here !/1. Creating An Information Security Program/5. The Importance of Strategy 2.mp4
13.7 MB
~Get Your Files Here !/1. Creating An Information Security Program/6. Information Security Frameworks.mp4
14.3 MB
~Get Your Files Here !/1. Creating An Information Security Program/7. Strategic Objectives.mp4
18.1 MB
~Get Your Files Here !/1. Creating An Information Security Program/8. Business Model for Information Security (BMIS).mp4
12.6 MB
~Get Your Files Here !/10. Information Security Operations/1. Security Operations Centers (SOCs) 1.mp4
22.8 MB
~Get Your Files Here !/10. Information Security Operations/2. Security Operations Centers (SOCs) 2.mp4
17 MB
~Get Your Files Here !/10. Information Security Operations/3. Vulnerability and Patch Management.mp4
10.4 MB
~Get Your Files Here !/10. Information Security Operations/4. Protecting Networks Pt.1.mp4
28.4 MB
~Get Your Files Here !/10. Information Security Operations/5. Protecting Networks Pt.2.mp4
33.8 MB
~Get Your Files Here !/10. Information Security Operations/6. Content Filtering Solutions.mp4
20.7 MB
~Get Your Files Here !/10. Information Security Operations/7. Endpoint Protection and Management.mp4
16.6 MB
~Get Your Files Here !/11. Managing An Information Security Program/1. Secure Software Development.mp4
14.3 MB
~Get Your Files Here !/11. Managing An Information Security Program/2. Identity & Access Management (IAM) 1.mp4
29.2 MB
~Get Your Files Here !/11. Managing An Information Security Program/3. Identity & Access Management (IAM) 2.mp4
11.9 MB
~Get Your Files Here !/11. Managing An Information Security Program/4. Security Awareness Training and MSSPs.mp4
23.6 MB
~Get Your Files Here !/11. Managing An Information Security Program/5. Data Backup and Recovery.mp4
31.7 MB
~Get Your Files Here !/11. Managing An Information Security Program/6. Financial and Capacity Management.mp4
21.3 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/1. Security Controls.mp4
16.3 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/2. Categories Of Security Controls.mp4
13.8 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/3. Security Control Functions.mp4
10.6 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/4. Testing Security Controls.mp4
16.6 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/5. Security Control Objectives and Frameworks.mp4
14.7 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/6. Designing Security Controls.mp4
10.9 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/7. Key Performance Indicators (KPIs).mp4
16.7 MB
~Get Your Files Here !/13. The Incident Response Process/1. Phases Of Incident Response.mp4
15.7 MB
~Get Your Files Here !/13. The Incident Response Process/2. Incident Response Preparation.mp4
18.8 MB
~Get Your Files Here !/13. The Incident Response Process/3. Incident Response Planning.mp4
19 MB
~Get Your Files Here !/13. The Incident Response Process/4. Detection, Initiation and Evaluation Of Incidents.mp4
17.1 MB
~Get Your Files Here !/13. The Incident Response Process/5. Containment, Eradication and Recovery.mp4
11.1 MB
~Get Your Files Here !/13. The Incident Response Process/6. Post Incident Activities.mp4
11.2 MB
~Get Your Files Here !/13. The Incident Response Process/7. Incident Response Resources.mp4
12.7 MB
~Get Your Files Here !/14. BCDR Planning and Standards/1. BC and DR Planning (BCDR).mp4
8.6 MB
~Get Your Files Here !/14. BCDR Planning and Standards/2. The BCDR Planning Process.mp4
16.7 MB
~Get Your Files Here !/14. BCDR Planning and Standards/3. Creating a BC Plan.mp4
12.6 MB
~Get Your Files Here !/14. BCDR Planning and Standards/4. DR Planning.mp4
26.3 MB
~Get Your Files Here !/14. BCDR Planning and Standards/5. Resiliency Technologies.mp4
19.4 MB
~Get Your Files Here !/14. BCDR Planning and Standards/6. BCDR Testing.mp4
8.4 MB
~Get Your Files Here !/14. BCDR Planning and Standards/7. BCDR Resources.mp4
17.1 MB
~Get Your Files Here !/2. IS Program Resources/1. The P3 Policies, Processes and Procedures.mp4
22.1 MB
~Get Your Files Here !/2. IS Program Resources/2. Standards, Guidelines and Architecture.mp4
23.8 MB
~Get Your Files Here !/2. IS Program Resources/3. Controls, Metrics and Assets.mp4
19.9 MB
~Get Your Files Here !/2. IS Program Resources/4. Risk Ledgers, Vulnerability Assessments and Insurance.mp4
14.5 MB
~Get Your Files Here !/2. IS Program Resources/5. Critical Data, BIA's and BCDR Planning.mp4
22.7 MB
~Get Your Files Here !/2. IS Program Resources/6. Incident Logs and Audits.mp4
10.9 MB
~Get Your Files Here !/2. IS Program Resources/7. Information Security Training, 3rd Party Risk and LCR Requirements.mp4
19.8 MB
~Get Your Files Here !/3. Creating A Successful IS Program/1. Creating A Business Case 1.mp4
22.6 MB
~Get Your Files Here !/3. Creating A Successful IS Program/2. Creating A Business Case 2.mp4
8.7 MB
~Get Your Files Here !/3. Creating A Successful IS Program/3. Communications and Reporting.mp4
22 MB
~Get Your Files Here !/3. Creating A Successful IS Program/4. How To Communicate Technical Information.mp4
15.7 MB
~Get Your Files Here !/3. Creating A Successful IS Program/5. Commitment From Management.mp4
34.9 MB
~Get Your Files Here !/3. Creating A Successful IS Program/6. End User Information Security Training.mp4
23.2 MB
~Get Your Files Here !/3. Creating A Successful IS Program/7. Causes Of Failure To Avoid.mp4
23.1 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/1. Organization Level Roles.mp4
29 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/2. Roles Pertaining To Our Data.mp4
9.6 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/3. The World of Metrics.mp4
11 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/4. Metrics Scenario 1.mp4
17.9 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/5. Metrics Scenario 2.mp4
17 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/6. Have We Achieved Success.mp4
11.1 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/7. DAD Triad.mp4
5 MB
~Get Your Files Here !/5. Introduction To Risk Management/1. The Role of Risk Managent.mp4
18 MB
~Get Your Files Here !/5. Introduction To Risk Management/2. Risk Management Frameworks.mp4
24.7 MB
~Get Your Files Here !/5. Introduction To Risk Management/3. Risk Management Strategy 1.mp4
21.4 MB
~Get Your Files Here !/5. Introduction To Risk Management/4. Risk Management Strategy 2.mp4
14.6 MB
~Get Your Files Here !/5. Introduction To Risk Management/5. Analyzing Risk 1.mp4
27.6 MB
~Get Your Files Here !/5. Introduction To Risk Management/6. Analyzing Risk 2.mp4
13.8 MB
~Get Your Files Here !/5. Introduction To Risk Management/7. Risk Analysis Techniques.mp4
16.1 MB
~Get Your Files Here !/5. Introduction To Risk Management/8. Dealing With Risk.mp4
30.1 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/1. Risk Management Activities.mp4
19.8 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/2. NIST SP 800-39 Managing Information Security Risk.mp4
30.2 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/3. NIST SP 800-30 Guide For Conducting Risk Assessments.mp4
22.6 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/4. ISOIEC 27005 Guidance On Managing IS Risk.mp4
21.1 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/5. Factor Analysis of Information Risk (FAIR).mp4
19.3 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/6. Risk Management Walk-Through.mp4
17 MB
~Get Your Files Here !/7. Managing Assets and Threats/1. Hardware, Software and Information Assets.mp4
27.3 MB
~Get Your Files Here !/7. Managing Assets and Threats/2. Cloud and Virtual Assets.mp4
25.7 MB
~Get Your Files Here !/7. Managing Assets and Threats/3. Asset Information and Classification 1.mp4
18.1 MB
~Get Your Files Here !/7. Managing Assets and Threats/4. Asset Information and Classification 2.mp4
12 MB
~Get Your Files Here !/7. Managing Assets and Threats/5. Identifying Threats To Assets 1.mp4
18.6 MB
~Get Your Files Here !/7. Managing Assets and Threats/6. Identifying Threats To Assets 2.mp4
16 MB
~Get Your Files Here !/7. Managing Assets and Threats/7. Identifying Asset Vulnerabilities.mp4
19.4 MB
~Get Your Files Here !/7. Managing Assets and Threats/8. Bonus Nugget Nessus Vulnerability Scanner.mp4
33.8 MB
~Get Your Files Here !/8. Information Security Risk Management/1. Risk Management Objectives Pt.1.mp4
24.7 MB
~Get Your Files Here !/8. Information Security Risk Management/2. Risk Management Objectives Pt.2.mp4
25.9 MB
~Get Your Files Here !/8. Information Security Risk Management/3. Third Party Risk Management Pt.1.mp4
30 MB
~Get Your Files Here !/8. Information Security Risk Management/4. Third Party Risk Management Pt.2.mp4
19.8 MB
~Get Your Files Here !/8. Information Security Risk Management/5. The Risk Register.mp4
12.5 MB
~Get Your Files Here !/8. Information Security Risk Management/6. Integrating Risk Management Into Other Processes.mp4
20.4 MB
~Get Your Files Here !/8. Information Security Risk Management/7. Risk Monitoring and Reporting.mp4
22.2 MB
~Get Your Files Here !/9. Creating An Information Security Program/1. Building Blocks Of An Information Security Program.mp4
15.8 MB
~Get Your Files Here !/9. Creating An Information Security Program/2. Information Security Program Details.mp4
16.2 MB
~Get Your Files Here !/9. Creating An Information Security Program/3. Information Security Architecture.mp4
21 MB
~Get Your Files Here !/9. Creating An Information Security Program/4. Security Program Management 1.mp4
21.9 MB
~Get Your Files Here !/9. Creating An Information Security Program/5. Security Program Management 2.mp4
15.9 MB
~Get Your Files Here !/9. Creating An Information Security Program/6. Security Policies.mp4