Certified: The ISC(2) ISSMP Audio Course

Duración total:8 h 40 min
Welcome to Certified: The ISC(2) ISSMP Audio Course
Certified: The ISC(2) ISSMP Audio Course
00:55
Episode 1 — Decode the ISSMP Blueprint, Domain Weights, and Realistic Time-Management Tactics
Certified: The ISC(2) ISSMP Audio Course
12:11
Episode 2 — Build a Spoken Study Plan That Tracks Every ISSMP Objective Precisely
Certified: The ISC(2) ISSMP Audio Course
12:40
Episode 3 — Master Exam Policies, Question Mechanics, and Confident Elimination Techniques
Certified: The ISC(2) ISSMP Audio Course
12:00
Episode 4 — Establish Security’s Role in Culture, Vision, Mission, and Daily Decisions
Certified: The ISC(2) ISSMP Audio Course
15:14
Episode 5 — Define the Information Security Program Vision, Mission, and Success Measures
Certified: The ISC(2) ISSMP Audio Course
13:27
Episode 6 — Align Security With Organizational Goals, Objectives, and Stated Values
Certified: The ISC(2) ISSMP Audio Course
12:46
Episode 7 — Fit Security Into Enterprise Processes Without Becoming the “Department of No”
Certified: The ISC(2) ISSMP Audio Course
13:27
Episode 8 — Explain How Organizational Culture Shapes Security Behavior and Outcomes
Certified: The ISC(2) ISSMP Audio Course
12:47
Episode 9 — Navigate Governance Structures and Place Security Authority in Context
Certified: The ISC(2) ISSMP Audio Course
13:13
Episode 10 — Verify Key Stakeholder Roles and Responsibilities Without Guesswork
Certified: The ISC(2) ISSMP Audio Course
12:49
Episode 11 — Validate Sources and Boundaries of Authorization for Security Decisions
Certified: The ISC(2) ISSMP Audio Course
16:13
Episode 12 — Advocate for Security Initiatives and Win Durable Executive Support
Certified: The ISC(2) ISSMP Audio Course
13:12
Episode 13 — Identify Security Requirements Driven by Organizational Initiatives and Change
Certified: The ISC(2) ISSMP Audio Course
15:02
Episode 14 — Evaluate Capability and Capacity to Execute Security Strategies Realistically
Certified: The ISC(2) ISSMP Audio Course
14:25
Episode 15 — Prescribe Security Architecture Direction That Enables Strategy Execution
Certified: The ISC(2) ISSMP Audio Course
14:29
Episode 16 — Manage Implementation of Security Strategies Across People, Process, Technology
Certified: The ISC(2) ISSMP Audio Course
13:12
Episode 17 — Review and Maintain Security Strategies as Risks and Threats Evolve
Certified: The ISC(2) ISSMP Audio Course
14:00
Episode 18 — Determine Applicable External Standards, Laws, and Regulatory Obligations
Certified: The ISC(2) ISSMP Audio Course
13:49
Episode 19 — Determine Data Classification and Protection Requirements That Hold Up
Certified: The ISC(2) ISSMP Audio Course
14:56
Episode 20 — Establish Internal Policies That Are Clear, Enforceable, and Auditable
Certified: The ISC(2) ISSMP Audio Course
13:16
Episode 21 — Advocate for Policy Adoption and Secure Organization-Wide Commitment
Certified: The ISC(2) ISSMP Audio Course
14:19
Episode 22 — Develop Procedures, Standards, Guidelines, and Baselines That Operate Together
Certified: The ISC(2) ISSMP Audio Course
13:34
Episode 23 — Evaluate Service Management Agreements for Risk, Cost, and Accountability
Certified: The ISC(2) ISSMP Audio Course
14:21
Episode 24 — Govern Managed Services and Cloud Services With Security Built In
Certified: The ISC(2) ISSMP Audio Course
14:12
Episode 25 — Manage Security Impact of Mergers, Acquisitions, Outsourcing, and Reorgs
Certified: The ISC(2) ISSMP Audio Course
14:14
Episode 26 — Embed Regulatory Compliance Requirements Into Contracts and Service Agreements
Certified: The ISC(2) ISSMP Audio Course
13:46
Episode 27 — Monitor and Enforce Contractual Security Commitments Without Creating Drag
Certified: The ISC(2) ISSMP Audio Course
13:22
Episode 28 — Promote Security Programs to Stakeholders Using Their Language and Incentives
Certified: The ISC(2) ISSMP Audio Course
13:42
Episode 29 — Identify Training Needs and Implement Programs by Role and Target Segment
Certified: The ISC(2) ISSMP Audio Course
13:12
Episode 30 — Monitor, Evaluate, and Report Training Effectiveness With Meaningful Evidence
Certified: The ISC(2) ISSMP Audio Course
14:19
Episode 31 — Identify KPI and KRI Metrics That Reflect Security Performance and Exposure
Certified: The ISC(2) ISSMP Audio Course
12:51
Episode 32 — Tie Security Metrics to Risk Posture and What Leadership Actually Cares About
Certified: The ISC(2) ISSMP Audio Course
12:14
Episode 33 — Use Metrics to Drive Security Program and Operations Improvements That Last
Certified: The ISC(2) ISSMP Audio Course
11:48
Episode 34 — Prepare and Secure the Annual Security Budget Under Competing Priorities
Certified: The ISC(2) ISSMP Audio Course
14:44
Episode 35 — Adjust Budget Requests as Risks and Threats Shift Mid-Year
Certified: The ISC(2) ISSMP Audio Course
11:17
Episode 36 — Manage and Report Financial Responsibilities With Credibility and Clarity
Certified: The ISC(2) ISSMP Audio Course
11:24
Episode 37 — Define Security Roles and Responsibilities Across Teams and Third Parties
Certified: The ISC(2) ISSMP Audio Course
11:27
Episode 38 — Create Team Accountability That Works in Real Organizational Friction
Certified: The ISC(2) ISSMP Audio Course
11:01
Episode 39 — Build Cross-Functional Relationships That Keep Security Embedded and Trusted
Certified: The ISC(2) ISSMP Audio Course
10:24