Your browser does not support this video.
Certified Information Security Manager CISM, Part 2 of 4: Risk Management
with Kenneth Mayer
This course covers processes that deal with risk management and establishing a process for information asset classification, systematic risk assessment, business impact assessments, threat and vulnerability evaluations, identify and evaluate information security controls, lifecycle process and finally reporting changes in information. This course is part of a series covering the ISACA Certified Information Security Manager (CISM).Course Outline