23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
[ WebToolTip.com ] Udemy - CISM Masterclass - Managing Information Security UPDATED Status: This torrent has NOT been verified . Category: Other Infohash fabdb1e708f1127e4f9c59ab15641a6ff546895c Size: 933.4 MB in 25 files Release Date(s): Torrent Release: 22-12-2025 by user Swarm: 5 Seeds & 7 PeersVote: No votes yet.
CISM Masterclass: Managing Information Security | UPDATED | https://WebToolTip.com Published 12/2025 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch Language: English | Duration: 1h 40m | Size: 934 MB CISM Certification Essentials: Security Governance, Risk, and Program Oversight, CISM Concepts Made Simple for Success. What you'll learn Understand the role of information security management and the responsibilities of a security manager Distinguish between security governance and security management and apply both effectively Explain core information security principles, including confidentiality, integrity, and availability Align information security objectives with business goals and organizational strategy Apply recognized governance frameworks and standards such as COBIT, ISO/IEC 27001, and NIST at a conceptual level Develop and maintain an effective information security strategy and high-level policies Identify legal, regulatory, and contractual requirements that influence security decisions Define roles, responsibilities, and accountability across the organization Understand information security risk, including threats, vulnerabilities, impacts, and risk appetite Establish and manage an information security risk management program Perform and interpret risk assessments using qualitative and conceptual quantitative approaches Select and justify appropriate risk response and treatment options Design and manage an organization-wide information security program Understand security architecture concepts and control types from a managerial perspective Build effective security awareness, training, and culture programs Manage third-party and outsourced service risks Understand incident management concepts, preparation, response, and recovery at a leadership level Measure, monitor, and report on security program performance Requirements Willingness to learn security concepts from a managerial and business-focused perspective
VISITOR COMMENTS (0
)
Filename Size ~Get Your Files Here !/1 - Foundations of Information Security Management/1. Introduction to CISM and the Role of a Security Manager.mp4 28.6 MB ~Get Your Files Here !/1 - Foundations of Information Security Management/2. Information Security Principles and Core Terminology.mp4 29.4 MB ~Get Your Files Here !/1 - Foundations of Information Security Management/3. Security Governance vs Security Management.mp4 24.2 MB ~Get Your Files Here !/2 - Information Security Governance/4. Governance Frameworks and Standards.mp4 35.4 MB ~Get Your Files Here !/2 - Information Security Governance/5. Developing an Information Security Strategy.mp4 36.8 MB ~Get Your Files Here !/2 - Information Security Governance/6. Security Policies, Guidelines, and High-Level Requirements.mp4 36.9 MB ~Get Your Files Here !/2 - Information Security Governance/7. Legal, Regulatory, and Contractual Requirements.mp4 43.7 MB ~Get Your Files Here !/2 - Information Security Governance/8. Defining Roles, Responsibilities, and Accountability.mp4 33.5 MB ~Get Your Files Here !/3 - Information Security Risk Management/10. Establishing a Risk Management Program.mp4 38.8 MB ~Get Your Files Here !/3 - Information Security Risk Management/11. Risk Assessment Concepts.mp4 43.7 MB ~Get Your Files Here !/3 - Information Security Risk Management/12. Risk Response and Treatment Options.mp4 31.8 MB ~Get Your Files Here !/3 - Information Security Risk Management/13. Risk Monitoring, Reporting, and Review.mp4 40.4 MB ~Get Your Files Here !/3 - Information Security Risk Management/9. Understanding Risk in Information Security.mp4 35.9 MB ~Get Your Files Here !/4 - Information Security Program Development & Management/14. Designing the Information Security Program.mp4 46.9 MB ~Get Your Files Here !/4 - Information Security Program Development & Management/15. Security Architecture Concepts for Managers.mp4 64.6 MB ~Get Your Files Here !/4 - Information Security Program Development & Management/16. Control Types and Control Frameworks.mp4 46.7 MB ~Get Your Files Here !/4 - Information Security Program Development & Management/17. Security Training, Awareness, and Culture.mp4 35.6 MB ~Get Your Files Here !/4 - Information Security Program Development & Management/18. Managing Third-Party and Outsourced Services.mp4 41.1 MB ~Get Your Files Here !/5 - Information Security Incident Management/19. Foundations of Incident Management.mp4 34.8 MB ~Get Your Files Here !/5 - Information Security Incident Management/20. Preparing the Organization for Security Incidents.mp4 46 MB ~Get Your Files Here !/5 - Information Security Incident Management/21. Detection, Reporting, and Investigation Concepts.mp4 47.6 MB ~Get Your Files Here !/5 - Information Security Incident Management/22. Response, Containment, and Recovery Concepts.mp4 34.6 MB ~Get Your Files Here !/6 - Program Performance and Continuous Improvement/23. Measuring and Monitoring the Security Program.mp4 31.2 MB ~Get Your Files Here !/6 - Program Performance and Continuous Improvement/24. Continuous Improvement and Evolving Security Needs.mp4 44.9 MB ~Get Your Files Here !/Bonus Resources.txt 70 B
Torrent Name Added Size Seeds Peers Uploader Health