~Get Your Course Here !/01.Introduction/0101.Introduction.mp49.36MB
~Get Your Course Here !/01.Introduction/0102.Introduction to this course!.mp45.85MB
~Get Your Course Here !/01.Introduction/0103.Why you should want to get CISM certified..mp422.37MB
~Get Your Course Here !/01.Introduction/0104.The 4 CISM domains.mp416.81MB
~Get Your Course Here !/01.Introduction/0105.Download all the lecture slides from this course!.mp48.01MB
~Get Your Course Here !/01.Introduction/0106.Links, important topics and where to focus.mp47.95MB
~Get Your Course Here !/02.How to study for the CISM certification and how to reach your goals/0201.How to approach studying for the CISM exam and ..mp435.12MB
~Get Your Course Here !/02.How to study for the CISM certification and how to reach your goals/0202.How to reach your goal, in this case passing th..mp466.61MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0301.CISM Domain 3 - What we will be covering.mp47.08MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0302.Access control.mp411.03MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0303.Introduction to Access Control.mp48.61MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0304.IAAA and subjectobject.mp422.79MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0305.Type 1 authentication.mp436.87MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0306.Type 2 authentication.mp426.03MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0307.Type 3 authentication.mp428.28MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0308.Authorization.mp433.14MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0309.Accountability.mp46.46MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0310.Access control systems.mp418.89MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0311.Identity and access provisioning.mp428.04MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0312.Introduction to Cryptography.mp431.75MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0313.The history of Cryptography.mp441.69MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0314.Symmetric encryption.mp450.2MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0315.Asymmetric encryption.mp431.56MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0316.Hashing.mp441.03MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0317.Attacks on cryptography.mp438.7MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0318.Digital signatures.mp420.25MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0319.Implementing cryptography MAC, HMAC, SSL, and..mp413.25MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0320.Configuration Management.mp414.52MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0321.Patch Management.mp422.18MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0322.Change management.mp420.35MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0323.Security evaluation models.mp415.54MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0324.Security Assessments.mp411.12MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0325.Security Audits.mp414.29MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0326.Security Audit Logs.mp418.54MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0327.Vulnerability scanners.mp47.8MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0328.Penetration testing.mp429.48MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0329.Penetration testing tools.mp418.69MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0330.Social Engineering attacks.mp421.15MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0331.Software testing.mp444.28MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0332.CMM (Capability Maturity Model).mp427.92MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0333.Buying software from other companies.mp432.96MB
~Get Your Course Here !/03.CISM Domain 3 Information Security Program Development and Management/0334.CISM Domain 3 - What we covered.mp43.72MB
~Get Your Course Here !/04.The exam and life after it/0401.The CISM exam itself, how to mentally and physically prepare for it.mp434.74MB
~Get Your Course Here !/04.The exam and life after it/0402.Life after passing the CISM certification and being endorsed.mp420.42MB
~Get Your Course Here !/04.The exam and life after it/0403.I failed, now what should I do.mp420.64MB