Channel Avatar

Hemang Doshi @UCrP-kcQ77iiQGTVLJYs8miQ@youtube.com

15K subscribers - no pronouns :c

CISA Exam updates and Study Material


19:18
Lecture 3 - Step 1 - Auditing Information Security Policies
04:01
Lecture 2 - Information System Audit Report Format
10:10
Lecture 1 - Introduction - Practical Aspects of Information System Audits
00:29
#shorts# Importance of Audit Charter
00:41
Hemang Doshi - CISM course promo video
05:43
CISM - 3.19B QAE 1 - Security Program Metrics and Monitoring
03:16
CISM - 3.19A Key Aspects Security Program Metrics and Monitoring
03:35
CISM - 3.17B - Key Aspects - Control and Countermeasure
03:57
CISM - 3.17A - Fail Open Fail Close
03:31
CISM 3.4A - Key Aspects - Information Security Program Road Map
06:32
CISM 3.1B Information Security Program Development Management
05:54
CISM - 3.2 Information Security Program Objective
07:52
CISM 2 .1B Risk Management Overview
02:11
CISM -1.14 Awareness and Education
06:12
CISM - 1.13 Record Retention
04:16
CISM - 1.12B Centralized and Decentralized Security Functions
04:40
CISM - 1.12A Organization structure
04:29
CISM - 1.11 - Enterprise information security architecture
07:09
CISM - 1.9C - QAE 1 - Information security strategy and plan
05:47
CISM - 1.9B - Key Aspects - Information security strategy and plan
03:02
CISM -1.9A - Information security strategy and plan
05:36
CISM - QAE - Information security governance metrics
04:35
CISM - Information security governance metrics
06:19
CISM - QAE 1 - Business Case and Feasibility Analysis
02:03
CISM - Key Aspects - Business Case and Feasibility Analysis
02:48
CISM - Business Case and Feasibility Analysis
06:50
CISM - QAE 1 - Senior management commitment
02:14
CISM - Key Aspects - Senior management commitment
02:26
CISM - Senior management commitment
06:18
CISM - QAE 1 - Governance of third party relationship
02:31
CISM - Key Aspects - Governance of third party relationship
02:16
CISM - Governance of third party relationship
07:21
CISM - QAE 1 Information security roles and responsibilities
08:30
CISM - Key Aspects - Information security roles and responsibilities
06:37
CISM - Information security roles and responsibilities
06:14
CISM - Maturity Model
04:39
CISM - Governance Risk Compliance
07:05
CISM - QAE 1 Information Security Governance
04:05
CISM - Governance Framework
06:39
CISM - Information Security Governance
23:29
ISO 27001 Annex 'A' control
02:50
ISO 27001 - Clause 10 - Improvement
07:24
ISO 27001 - Clause 9 - Performance Evaluation
04:41
ISO 27001 - Clause 8 - Operations
05:18
ISO 27001 Lead Audit course - Clause 7 - Support
10:12
ISO 27001 Lead Auditor - Clause 6 - Planning
05:43
ISO 27001 - Clause 5 - Leadership
06:32
ISO 27001 - Clause 4 - Context of the Organization
09:08
Introduction to ISO 27001 Clauses - Part 2
02:18
ISO 27001 Lead Auditor course - Introduction to Clauses Part 1
09:46
ISACA's Thinking Hat
12:12
Third Party Risk Management
06:00
CRISC Lecture -4.1.1 Lag vis a vis Lead Indicator
13:30
CRISC Lecture Video - 1.8 IT Risk Scenarios
12:56
CRISC Lecture Video - 1.7 Method of Risk Identification
06:21
CRISC Lecture Video -1.6E IT Concepts and Area of Concerns for the Risk Practitioner
05:12
CRISC Lecture Video -1.6C Domain Name System
07:37
CRISC Lecture Video -1.6B Virtual Private Network
05:03
CRISC Lecture Video - 1.6A Demilitarized Zone
11:11
CRISC Lecture Video -1.5C IT Risk Strategy of the Business