Certified Information Security Manager CISM, Part 2 of 4: Risk Management

with Kenneth Mayer

This course covers processes that deal with risk management and establishing a process for information asset classification, systematic risk assessment, business impact assessments, threat and vulnerability evaluations, identify and evaluate information security controls, lifecycle process and finally reporting changes in information. This course is part of a series covering the ISACA Certified Information Security Manager (CISM).

Course Outline