File List
-
01 Introduction/001 Introduction.mp4 18.15 MB
01 Introduction/002 Introduction to this course.mp4 19.44 MB
01 Introduction/003 Why you should want to get CISM certified.mp4 50.25 MB
01 Introduction/004 The 4 CISM domains.mp4 48.19 MB
01 Introduction/005 Lecture speed.mp4 8.38 MB
01 Introduction/006 Download all the lecture slides from this course.mp4 8.74 MB
01 Introduction/007 Links important topics and where to focus.mp4 16.31 MB
01 Introduction/008 General CISM and ISACA links.html 4.13 KB
02 How to study for the CISM certification and how to reach your goals/009 How to approach studying for the CISM exam and study plans.mp4 103.92 MB
02 How to study for the CISM certification and how to reach your goals/010 How to reach your goal in this case passing the CISM exam.mp4 192.24 MB
03 CISM Domain 3 Information Security Program Development and Management/011 CISM Domain 3 - What we will be covering.mp4 14.46 MB
03 CISM Domain 3 Information Security Program Development and Management/011 Thorteaches-Study-Guide-CISM-Domain-3-v2.pdf 8.44 MB
03 CISM Domain 3 Information Security Program Development and Management/012 Access control.mp4 28.4 MB
03 CISM Domain 3 Information Security Program Development and Management/013 Introduction to Access Control.mp4 16.86 MB
03 CISM Domain 3 Information Security Program Development and Management/014 IAAA and subjectobject.mp4 59.72 MB
03 CISM Domain 3 Information Security Program Development and Management/015 Type 1 authentication.mp4 106.1 MB
03 CISM Domain 3 Information Security Program Development and Management/016 Type 2 authentication.mp4 74.59 MB
03 CISM Domain 3 Information Security Program Development and Management/017 Type 3 authentication.mp4 73.96 MB
03 CISM Domain 3 Information Security Program Development and Management/018 Authorization.mp4 96.63 MB
03 CISM Domain 3 Information Security Program Development and Management/019 Accountability.mp4 15.44 MB
03 CISM Domain 3 Information Security Program Development and Management/020 Access control systems.mp4 53.68 MB
03 CISM Domain 3 Information Security Program Development and Management/021 Identity and access provisioning.mp4 81.22 MB
03 CISM Domain 3 Information Security Program Development and Management/022 Introduction to Cryptography.mp4 83.55 MB
03 CISM Domain 3 Information Security Program Development and Management/023 The history of Cryptography.mp4 103.66 MB
03 CISM Domain 3 Information Security Program Development and Management/024 Symmetric encryption.mp4 143.34 MB
03 CISM Domain 3 Information Security Program Development and Management/025 Asymmetric encryption.mp4 77.99 MB
03 CISM Domain 3 Information Security Program Development and Management/026 Hashing.mp4 76.61 MB
03 CISM Domain 3 Information Security Program Development and Management/027 Attacks on cryptography.mp4 107.55 MB
03 CISM Domain 3 Information Security Program Development and Management/028 Digital signatures.mp4 51.82 MB
03 CISM Domain 3 Information Security Program Development and Management/029 Implementing cryptography MAC HMAC SSL and TLS.mp4 33.02 MB
03 CISM Domain 3 Information Security Program Development and Management/030 Configuration Management.mp4 37.71 MB
03 CISM Domain 3 Information Security Program Development and Management/031 Patch Management.mp4 65.05 MB
03 CISM Domain 3 Information Security Program Development and Management/032 Change management.mp4 57.26 MB
03 CISM Domain 3 Information Security Program Development and Management/033 Security evaluation models.mp4 35.44 MB
03 CISM Domain 3 Information Security Program Development and Management/034 Security Assessments.mp4 31.82 MB
03 CISM Domain 3 Information Security Program Development and Management/035 Security Audits.mp4 40.89 MB
03 CISM Domain 3 Information Security Program Development and Management/036 Security Audit Logs.mp4 53.74 MB
03 CISM Domain 3 Information Security Program Development and Management/037 Vulnerability scanners.mp4 24.9 MB
03 CISM Domain 3 Information Security Program Development and Management/038 Penetration testing.mp4 81.76 MB
03 CISM Domain 3 Information Security Program Development and Management/039 Penetration testing tools.mp4 49.47 MB
03 CISM Domain 3 Information Security Program Development and Management/040 Social Engineering attacks.mp4 60.37 MB
03 CISM Domain 3 Information Security Program Development and Management/041 Software testing.mp4 132.41 MB
03 CISM Domain 3 Information Security Program Development and Management/042 CMM (Capability Maturity Model).mp4 81.33 MB
03 CISM Domain 3 Information Security Program Development and Management/043 Buying software from other companies.mp4 103.32 MB
03 CISM Domain 3 Information Security Program Development and Management/044 CISM Domain 3 - What we covered.mp4 8.26 MB
03 CISM Domain 3 Information Security Program Development and Management/045 CISM Domain 3 links.html 13.77 KB
04 The exam and life after it/046 The CISM exam itself how to mentally and physically prepare for it.mp4 113.96 MB
04 The exam and life after it/047 Life after passing the CISM certification and being being endorsed.mp4 54.61 MB
04 The exam and life after it/048 CPE resources.html 3.13 KB
04 The exam and life after it/049 I failed now what should I do.mp4 62.63 MB
05 Bonus Lecture/050 Bonus Lecture.mp4 30.87 MB
05 Bonus Lecture/050 Thor-Teaches-CISSP-CISM-bonus-lecture-1.1.0.pdf 585.02 KB
05 Bonus Lecture/external-assets-links.txt 249 B
Download Info
-
Tips
“UD588” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.