Posted: 10 May 2009 04:16 PM PDT
CISM certification focuses on business and risk management issues. According to Certification Magazine, it is the leading information security certification. The CISM certification process combines an exam with real-life work credit and ongoing education. It tells upper management that you’ve got what it takes to be the high-level security manager they need.
As you listen to CBT Nuggets Trainer Michael Shannon, the entire CISM process will open up for you. Michael shows you how to prepare for the exam and how to get — or substitute for — the work experience you need (both before and after the test).
# Information Risk Management
# Information Security Program Development
# Information Security Program Management
# Incidence Management & Response
For each domain, he gives you an overview of its goals, its relative importance on the exam and your responsibilities as a manager. Soon you’ll be on your way to CISM certification and a successful information security (INFOSEC) professional career.
CISM is vendor independent. But note that Microsoft recognizes it as an accepted security credential for Security Solutions Competency in the Microsoft Partner Program.
The CISM Certification Package contains the following videos:
# Information Security Governance (Part 1)
# Information Security Governance (Part 2)
# Information Security Governance (Part 3
# Information Risk Management (Part 1)
# Information Risk Management (Part 2)
# Information Risk Management (Part 3)
# Information Security Program Development (Part 1)
# Information Security Program Development (Part 2)
# Information Security Program Development (Part 3)
# Information Security Program Management (Part 1)
# Information Security Program Management (Part 2)
# Information Security Program Management (Part 3)
# Incident Management and Response (Part 1)
# Incident Management and Response (Part 2)
CISM Certification Package highlights for each video:
Video #1. Introduction In this introductory video you will find out about the recent 5 CISM domains and the many topics covered on the way to becoming a Certified Information Security Manager.
Video #2. Information Security Governance (Part 1) In this update video you will get an overview of Information Security (INFOSEC) Governance and the 6 key results of proper Infosec governance. You will learn the responsibilities of senior management as well. This nugget also explores Infosec terminology and concepts along with the role of the Information Security Manager.
Video #3. Information Security Governance (Part 2) You will really enjoy this video as you explore INFOSEC governance scope and charter. The nugget finishes with governance metrics as well as strategy goals and objectives.
Video #4. Information Security Governance (Part 3) This fourth nugget of the CISM series covers three topics: several approaches to a security framework; strategy resources and constraints; and an action plan for Infosec governance strategy.
Video #5. Information Risk Management (Part 1) This update video delves even deeper into Risk Management. First we define in depth the concept of risk management and provide an overview of security risk management. The final topics then cover a risk management strategy and the elements of effective risk management.
Video #6. Information Risk Management (Part 2) The second video of this domain covers further the risk management process. You will understand what defines a risk management framework and a risk analysis framework as well. Finally you will get an overview of risk assessment.
Video #7. Information Risk Management (Part 3) In the third video of this CISM domain you will explore five important knowledge areas: threats and vulnerabilities; operational risk categories; additional risk management responses; impacts of risk; and controls and countermeasures.
Video #8. Information Security Program Development (Part 1) In this first video you will get an overview of Information Security Program Development as well as the importance and expected results of INFOSEC programs. You will discover an Infosec Management Workflow. You will take a survey of relevant technologies for programs and, finally, revisit the role of the Information Security Manager as INFOSEC Program Manager.
Video #9. Information Security Program Development (Part 2) The second part of this domain covers the scope of INFOSEC programs as well as the ongoing challenges to program development. This nugget also explores the topics of program objectives, implementation strategy, and, finally, an information security program development roadmap.
Video #10. Information Security Program Development (Part 3) The following topics are addressed in this final nugget of this CSIM domain: documentation requirements; operational security architecture; and the SABSA framework for security management.
Video #11. Information Security Program Management (Part 1) This particular domain makes up almost a quarter of the tested content. In the first domain nugget you will get an overview of INFOSEC Program Management. You will learn about the results of effective information security program management. You will explore organizational/business roles and responsibilities as they relate to Infosec program management. Lastly, you will evaluate an information security management framework.
Video #12. Information Security Program Management (Part 2) This particular nugget deals with the concepts of performance measurement, obstacles to effective security program management, the evaluation of security programs and a survey of information security management resources.
Video #13. Information Security Program Management (Part 3) This beefy third nugget of the domain explores 14 key practical elements of deploying and implementing information security management programs: policies and standards; metrics and monitoring; control testing; third party providers; life cycle integration; communication; documentation; assurance integration; acceptable use policies; assigning roles and responsibilities; change management; vulnerability assessment; due diligence; and non-compliance resolution.
Video #14. Incident Management and Response (Part 1) As one of the smaller content domains, this first of two nuggets will cover an overview of incident management and response…related concepts and technologies are also covered. Next, you will learn about INFOSEC management responsibilities and objectives relating to incidents and response. You will explore metrics, indicators, procedures, and resources. Finally you will look closer at the Business Impact Analysis (BIA) process.
Video #15. Incident Management and Response (Part 2) The final nugget of the CISM will show you how to evaluate the current state of incident response in the organization. You will then learn how to develop the plans, test the plans, implement the plans, and then finally, conduct the documentation phase and post-review.
Posted: 10 May 2009 01:48 AM PDT
Topics (in part) included on this DVD:
Victor even has a section on using low cost, fluorescent lights. See video demo 3 above for a small sample of how he uses them in the DV and HDV world.
This nearly 2-hour session with a master is sure to inspire you in addition to teaching a number of unusual but highly effective location lighting techniques. This is one of the best videos we have seen on lighting.
This DVD covers lighting in office spaces, exteriors, beauty/glamour shots, location staff interviews, lighting in smoke, reception areas, podiums, conference tables, and other lighting scenarios. The DVD also covers fixtures ranging from Chinese Lanterns to 2 man-crew tungsten’s.
Posted: 10 May 2009 01:32 AM PDT
Application architecture is an essential skill for ASP.NET developers. It is always tempting to jump in and start coding, but planning your architecture early in the project will leave you with a solid application that scales well, is easy to modify and extend, and saves you time and effort later on. As businesses struggle to control their costs, writing solid code that can be extended easily is becoming even more important.
This book takes a pragmatic approach to Application Architecture in ASP.NET 3.5. It presents a series of common architectural models, and shows how to select the best ones for your project and apply them.
The book begins by showing you how to use the main architectural models in your applications. You will see how to implement n-tier architectures, MVC, design patterns, and more. But this is no software engineering theory book - it is a practical, hands-on guide that shows you how to use these techniques in your software straight away. We then go on to build SOA (Service-Oriented Architecture) applications with the Windows Communication Framework (WCF). Finally the book contains some essential guidance on effective database design, and a chapter on localizing your applications.
This book is a great way to learn ASP.NET Architecture in a practical, hands-on way. It will also serve as a quick reference for improving your application design.
Posted: 10 May 2009 01:30 AM PDT
This official Microsoft study guide is designed to help you make the most of your study time. Maximize your performance on the exam by learning to: Define and implement service contracts Configure client and service endpoints across transport protocols Customize service behavior; host and expose services Add instrumentation to services, including end-to-end tracing Implement transport, message, and user level security Consume services through proxies and agents Manage the service life cycle instances, sessions, transactions, concurrency PRACTICE TESTS Assess your skills with the practice tests on CD. You can work through hundreds of questions using multiple testing modes to meet your specific learning needs. You get detailed explanations for right and wrong answers including a customized learning path that describes how and where to focus your studies. Your kit includes: 15% exam discount from Microsoft. Offer expires 12/31/13. Official self-paced study guide. Practice tests with multiple, customizable testing options and a learning plan based on your results. 225+ practice and review questions. Code samples in Microsoft Visual Basic and Visual C# on CD. 90-day trial of Microsoft Visual Studio 2008 Professional Edition. Case scenarios, exercises, and best practices. Fully searchable eBook of this guide.
Posted: 10 May 2009 01:27 AM PDT
As a building material, precast concrete allows a wide range of sculptural forms and design options. By treating the surface in various ways, fascinating textures and fine finishes can be produced. This book provides a systematic overview of the variety of applications for such concrete elements throughout Europe. Author David Bennett provides in-depth information on newly developed, especially lightweight forms of concrete such as GRC (Glass-Fibre Reinforced Concrete), Ductal and CRC (Compact Reinforced Composite).
A selection of some 24 projects which are of particular significance, are documented in detail and provide a wealth of inspiring design ideas. The appendix comprises an overview of the building practices in the individual European countries and the availability of concrete elements. Amongst the buildings documented are the Scottish Parliament Building in Edinburgh by Enric Miralles Benedetta Tagliabue, the Synagogue in Dresden by Wandel, Hoefer, Lorch + Hirsch, and the Mexican Embassy in Berlin by González de León.
Posted: 10 May 2009 01:26 AM PDT
Filthy Rich Clients refers to ultra-graphically rich applications that ooze cool. They suck the user in from the outset and hang on to them with a death grip of excitement. Filthy Rich Clients: Developing Animated and Graphical Effects for Desktop Java™ Applications shows you how to build better, more effective, cooler desktop applications that intensify the user experience.
The keys to Filthy Rich Clients are graphical and animated effects. These kinds of effects provide ways of enhancing the user experience of the application through more attractive GUIs, dynamic effects that give your application a pulse, and animated transitions that keep your user connected to the logical flow of the application. The book also discusses how to do so effectively, making sure to enrich applications in sensible ways.
In-depth coverage includes
Posted: 10 May 2009 01:22 AM PDT
Release Date : 15/04/09
Posted: 10 May 2009 01:22 AM PDT
Cognitive Effects of Multimedia Learning identifies the role and function of multimedia in learning through a collection of research studies focusing on cognitive functionality. An advanced collection of critical theories and practices, this much needed contribution to the research is an essential holding for academic libraries, and will benefit researchers, practitioners and students in basic and applied fields ranging from education to cognitive sciences.
Posted: 10 May 2009 01:18 AM PDT
The Skill Pack series provides a unique book/CD-ROM learning experience that helps readers focus on a specific skill they want to learn. Unlike other books with companion discs, the source files on your Skill Pack CD-ROM are an essential part of the book’s tutorials. You’ll learn by applying the skills you’ve been taught through hands-on exercises that will take you from the novice stage to a true expert. By the conclusion of the book, you’ll have a comprehensive understanding of the design and philosophy behind MIDI editing in Cubase, you’ll be able to work more efficiently, and you’ll know how to avoid the most common mistakes.
Posted: 10 May 2009 12:45 AM PDT
Burne Hogarth "Drawing Dynamic Hands"
Dynamic Hands is the ideal book to learn how to draw hands and understand the structure of the hand and how it works in all positions. Well drawn hands and feet are extremely important for finished paintings and illustrations. I am a commercial artist and designer, but have worked for many years on non-figurative projects. I am focusing on figurative work again, primarily in the game, fantasy and science fiction field. My goal is to draw entirely from imagination without having to use reference material, and this book by Burne Hogarth and his Dynamic Anatomy is helping me to reach this goal. The illustrations are very well done with several important hand positions and range of motion diagrams. I highly recommend it.
|You are subscribed to email updates from Download Free Computer Ebooks - NET BOOKS |
To stop receiving these emails, you may unsubscribe now.
|Email delivery powered by Google|
|Inbox too full? Subscribe to the feed version of Download Free Computer Ebooks - NET BOOKS in a feed reader.|
|If you prefer to unsubscribe via postal mail, write to: Download Free Computer Ebooks - NET BOOKS, c/o Google, 20 W Kinzie, Chicago IL USA 60610|