Master the CIA Triad: Essential CISM Domain 1 Preview ๐
Discover the fundamentals of cybersecurity with our in-depth look at the CIA Triadโcrucial for passing the CISM exam. Watch now and strengthen your security knowledge!

ThorTeaches.com: CISSP, CC, CISM, GenAI training
680 views โข Oct 14, 2021

About this video
THIS IS IT. This is the foundation of everything in cybersecurity. The CIA Triad.
Subscribe to my channel: https://www.youtube.com/@thorteaches/videos?sub_confirmation=1
โ ๐๐ผ๐ถ๐ป ๐ผ๐๐ฟ ๐๐๐ฆ๐ฆ๐ฃ, ๐๐๐ฆ๐ , ๐๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฒ๐ฑ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ผ๐บ๐บ๐๐ป๐ถ๐๐ถ๐ฒ๐:
๐ ๐๐ผ๐ถ๐ป ๐ข๐๐ฟ ๐๐ฎ๐ฐ๐ฒ๐ฏ๐ผ๐ผ๐ธ ๐ฆ๐๐๐ฑ๐ ๐๐ฟ๐ผ๐๐ฝ: https://www.facebook.com/groups/ThorTeaches
๐ ๐๐ผ๐ถ๐ป ๐ข๐๐ฟ ๐๐ถ๐๐ฐ๐ผ๐ฟ๐ฑ ๐ฆ๐๐๐ฑ๐ ๐๐ฒ๐ฟ๐๐ฒ๐ฟ: https://discord.com/invite/GT8fr3Q
โ ๐๐ผ๐ป๐ป๐ฒ๐ฐ๐ ๐๐ถ๐๐ต ๐บ๐ฒ:
๐ Connect with Me on LinkedIn: https://www.linkedin.com/in/thorpedersen/
๐ Connect with Me on Facebook: https://www.facebook.com/ThorPedersen0
โ ๐๐ฏ๐ผ๐๐ ๐บ๐ ๐ฐ๐ผ๐๐ฟ๐๐ฒ๐:
๐ ๐๐ฒ๐ ๐บ๐ ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ฆ๐ฆ๐ฃ, ๐๐๐ฆ๐ , ๐ฎ๐ป๐ฑ ๐๐ ๐ฏ๐๐ป๐ฑ๐น๐ฒ๐ โก๏ธ https://thorteaches.com/
๐ ๐๐ผ๐บ๐ฝ๐ฎ๐ฟ๐ฒ ๐๐ต๐ฎ๐ ๐๐ผ๐ ๐ด๐ฒ๐ ๐ผ๐ป ๐ง๐ต๐ผ๐ฟ๐ง๐ฒ๐ฎ๐ฐ๐ต๐ฒ๐.๐ฐ๐ผ๐บ ๐๐. ๐จ๐ฑ๐ฒ๐บ๐ โก๏ธ https://thorteaches.com/vs/
๐ ๐๐ฒ๐ ๐บ๐ ๐ฐ๐ผ๐๐ฟ๐๐ฒ๐ ๐ผ๐ป ๐จ๐ฑ๐ฒ๐บ๐ (Less questions, no flashcards, no glossary, no chatbot)โก๏ธ https://thorteaches.com/udemy/
โจThe CISM is widely recognized by recruiters and HR. It is one of the most required Cybersecurity certifications.
โจCISMs in North America, on average make, $152,037 a year,and globally it is $114,483. Meaning certified individuals make, on average, 35% more than their non-certified colleagues. (source: infosecinstitute)
โจThere are currently over 36,162 open CISM jobs in the US. (source: CyberSeek)
โจWe have 5.5 million filled Cybersecurity jobs worldwide and a 4.8 million workforce gap. Jobs grew 8.7% last year (440,000 jobs). (source ISC2)
๐จโ๐ฉโ๐งโ๐ฆ ๐๐,๐ฌ๐ฌ๐ฌ+ ๐๐๐ฆ๐ ๐๐ป๐ฟ๐ผ๐น๐น๐บ๐ฒ๐ป๐๐ โญ๐ฐ.๐ ๐ฅ๐ฎ๐๐ถ๐ป๐ด โ ๐๐๐น๐น๐ ๐ฎ๐ฌ๐ฎ๐ฐ ๐๐ ๐ฎ๐บ ๐จ๐ฝ๐ฑ๐ฎ๐๐ฒ๐ฑ
๐ https://cart.thorteaches.com/cism/
๐ง๐ผ ๐ฝ๐ฎ๐๐ ๐๐ผ๐๐ฟ ๐๐๐๐ ๐ฒ๐ ๐ฎ๐บ ๐๐ผ๐ ๐ป๐ฒ๐ฒ๐ฑ ๐๐ต๐ฒ ๐ธ๐ป๐ผ๐๐น๐ฒ๐ฑ๐ด๐ฒ ๐ฎ๐ป๐ฑ ๐๐ต๐ฒ ๐ฟ๐ถ๐ด๐ต๐ ๐ฎ๐ฝ๐ฝ๐ฟ๐ผ๐ฎ๐ฐ๐ต.
๐ ๐๐ฒ๐ฎ๐ฐ๐ต ๐๐ผ๐ ๐ฎ๐น๐น ๐ผ๐ณ ๐ถ๐ ๐ถ๐ป ๐บ๐ ๐ผ๐ป-๐ฑ๐ฒ๐บ๐ฎ๐ป๐ฑ ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐๐ ๐ฐ๐ผ๐๐ฟ๐๐ฒ, ๐๐ต๐ฒ๐ฟ๐ฒ ๐๐ผ๐ ๐ด๐ฒ๐:
โถ๏ธ 32+ hours of ๐๐๐๐ ๐๐ถ๐ฑ๐ฒ๐ผ๐
๐ 900 ๐๐๐๐ ๐พ๐๐ฒ๐๐๐ถ๐ผ๐ป๐
๐ 2,500 ๐๐๐๐ ๐ณ๐น๐ฎ๐๐ต๐ฐ๐ฎ๐ฟ๐ฑ๐
๐งพ A 200+ page ๐๐๐๐ ๐๐๐๐ฑ๐ ๐ด๐๐ถ๐ฑ๐ฒ
๐งพ A 120- page ๐๐๐๐ ๐ค๐๐ถ๐ฐ๐ธ ๐ฆ๐ต๐ฒ๐ฒ๐๐
๐ค The ThorBot (๐๐๐๐ ๐๐ต๐ฎ๐๐ฏ๐ผ๐)
๐ A 2,500-word ๐๐๐๐ ๐ด๐น๐ผ๐๐๐ฎ๐ฟ๐
๐ ๐๐๐๐ ๐ ๐ป๐ฒ๐บ๐ผ๐ป๐ถ๐ฐ๐
๐๏ธ A ๐๐๐๐ ๐๐๐๐ฑ๐ ๐ฝ๐น๐ฎ๐ป
๐ป ๐ฆ๐๐ฏ๐๐ถ๐๐น๐ฒ๐ ๐ถ๐ป ๐ด ๐น๐ฎ๐ป๐ด๐๐ฎ๐ด๐ฒ๐ (English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese and Hindi.)
๐๐ก๐๐ฉ๐ญ๐๐ซ๐ฌ:
00:03 - Introduction to the CIA Triad and its relevance.
00:28 - Overview of the three components: Confidentiality, Integrity, and Availability.
01:15 - Explanation of the CIA Triad as the foundation of IT security.
01:39 - Importance of balancing the CIA Triad based on what is being protected.
02:01 - Discussion on Confidentiality and common misconceptions.
02:27 - Common threats to Confidentiality, including cryptanalysis and social engineering.
03:19 - The security risks posed by the Internet of Things (IoT).
04:06 - Explanation of the different types of data: Data at rest, Data in motion, Data in use.
05:33 - Policies and training to protect Data in use, including clean desk policies and strong passwords.
08:30 - Introduction to Integrity and its relationship with Confidentiality.
The video covers how these principles form the foundation of IT security, with examples of threats like encryption attacks, social engineering, and the importance of securing data at rest, in motion, and in use. The speaker also emphasizes policies for protecting data, such as clean desk policies, strong passwords, and access controls.
If this video was helpful, please CLICK LIKE, SUBSCRIBE, and leave a comment.
Everything you learn from now on is all to keep the balance between confidentiality, integrity, and availability.
A little bit confused about what they are? Watch this video now!
โ ๐ข๐๐ต๐ฒ๐ฟ ๐ฉ๐ถ๐ฑ๐ฒ๐ผ๐ ๐ฌ๐ผ๐ ๐ ๐ถ๐ด๐ต๐ ๐๐ฒ ๐๐ป๐๐ฒ๐ฟ๐ฒ๐๐๐ฒ๐ฑ ๐๐ป ๐ช๐ฎ๐๐ฐ๐ต๐ถ๐ป๐ด:
๐ CISSP | Software Composition Analysis (SCA): https://youtu.be/057lIAaczQ4
๐ Certified in Cybersecurity (CC) - I failed the CC exam. Now what?: https://youtu.be/DVSMrxSwNQQ
๐ Certified in Cybersecurity (CC) - How to design your career and certification path: https://youtu.be/OD7UPvx8pHs
๐ CISSP | The exam CISSP itself and how to mentally prepare for it: https://youtu.be/gKBJHi9hVkU
๐ Certified in Cybersecurity (CC) - How to design your career and certification path: https://youtu.be/OD7UPvx8pHs
If this video helps you, please subscribe to my channel and like, comment, and share the video. https://www.youtube.com/@thorteaches/videos?sub_confirmation=1
๐ ๐ต๐ผ๐ฝ๐ฒ ๐ ๐ฐ๐ฎ๐ป ๐ต๐ฒ๐น๐ฝ ๐๐ผ๐ ๐ด๐ฒ๐ ๐ฐ๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฒ๐ฑ,
๐ง๐ต๐ผ๐ฟ ๐ฃ๐ฒ๐ฑ๐ฒ๐ฟ๐๐ฒ๐ป
@thorteaches
#cism #thorteachescomcissp #cc #cismandpmptraining #thorteachescom #pmptraining #training #pmp #cybersecurity #certification #informationsecurity #itsecurity #cism #ciatriad #cybersecurity #informationsecurity #dataprotection #confidentiality #integrity #availability #itsecurity #cyberawareness
Subscribe to my channel: https://www.youtube.com/@thorteaches/videos?sub_confirmation=1
โ ๐๐ผ๐ถ๐ป ๐ผ๐๐ฟ ๐๐๐ฆ๐ฆ๐ฃ, ๐๐๐ฆ๐ , ๐๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฒ๐ฑ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ผ๐บ๐บ๐๐ป๐ถ๐๐ถ๐ฒ๐:
๐ ๐๐ผ๐ถ๐ป ๐ข๐๐ฟ ๐๐ฎ๐ฐ๐ฒ๐ฏ๐ผ๐ผ๐ธ ๐ฆ๐๐๐ฑ๐ ๐๐ฟ๐ผ๐๐ฝ: https://www.facebook.com/groups/ThorTeaches
๐ ๐๐ผ๐ถ๐ป ๐ข๐๐ฟ ๐๐ถ๐๐ฐ๐ผ๐ฟ๐ฑ ๐ฆ๐๐๐ฑ๐ ๐๐ฒ๐ฟ๐๐ฒ๐ฟ: https://discord.com/invite/GT8fr3Q
โ ๐๐ผ๐ป๐ป๐ฒ๐ฐ๐ ๐๐ถ๐๐ต ๐บ๐ฒ:
๐ Connect with Me on LinkedIn: https://www.linkedin.com/in/thorpedersen/
๐ Connect with Me on Facebook: https://www.facebook.com/ThorPedersen0
โ ๐๐ฏ๐ผ๐๐ ๐บ๐ ๐ฐ๐ผ๐๐ฟ๐๐ฒ๐:
๐ ๐๐ฒ๐ ๐บ๐ ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ฆ๐ฆ๐ฃ, ๐๐๐ฆ๐ , ๐ฎ๐ป๐ฑ ๐๐ ๐ฏ๐๐ป๐ฑ๐น๐ฒ๐ โก๏ธ https://thorteaches.com/
๐ ๐๐ผ๐บ๐ฝ๐ฎ๐ฟ๐ฒ ๐๐ต๐ฎ๐ ๐๐ผ๐ ๐ด๐ฒ๐ ๐ผ๐ป ๐ง๐ต๐ผ๐ฟ๐ง๐ฒ๐ฎ๐ฐ๐ต๐ฒ๐.๐ฐ๐ผ๐บ ๐๐. ๐จ๐ฑ๐ฒ๐บ๐ โก๏ธ https://thorteaches.com/vs/
๐ ๐๐ฒ๐ ๐บ๐ ๐ฐ๐ผ๐๐ฟ๐๐ฒ๐ ๐ผ๐ป ๐จ๐ฑ๐ฒ๐บ๐ (Less questions, no flashcards, no glossary, no chatbot)โก๏ธ https://thorteaches.com/udemy/
โจThe CISM is widely recognized by recruiters and HR. It is one of the most required Cybersecurity certifications.
โจCISMs in North America, on average make, $152,037 a year,and globally it is $114,483. Meaning certified individuals make, on average, 35% more than their non-certified colleagues. (source: infosecinstitute)
โจThere are currently over 36,162 open CISM jobs in the US. (source: CyberSeek)
โจWe have 5.5 million filled Cybersecurity jobs worldwide and a 4.8 million workforce gap. Jobs grew 8.7% last year (440,000 jobs). (source ISC2)
๐จโ๐ฉโ๐งโ๐ฆ ๐๐,๐ฌ๐ฌ๐ฌ+ ๐๐๐ฆ๐ ๐๐ป๐ฟ๐ผ๐น๐น๐บ๐ฒ๐ป๐๐ โญ๐ฐ.๐ ๐ฅ๐ฎ๐๐ถ๐ป๐ด โ ๐๐๐น๐น๐ ๐ฎ๐ฌ๐ฎ๐ฐ ๐๐ ๐ฎ๐บ ๐จ๐ฝ๐ฑ๐ฎ๐๐ฒ๐ฑ
๐ https://cart.thorteaches.com/cism/
๐ง๐ผ ๐ฝ๐ฎ๐๐ ๐๐ผ๐๐ฟ ๐๐๐๐ ๐ฒ๐ ๐ฎ๐บ ๐๐ผ๐ ๐ป๐ฒ๐ฒ๐ฑ ๐๐ต๐ฒ ๐ธ๐ป๐ผ๐๐น๐ฒ๐ฑ๐ด๐ฒ ๐ฎ๐ป๐ฑ ๐๐ต๐ฒ ๐ฟ๐ถ๐ด๐ต๐ ๐ฎ๐ฝ๐ฝ๐ฟ๐ผ๐ฎ๐ฐ๐ต.
๐ ๐๐ฒ๐ฎ๐ฐ๐ต ๐๐ผ๐ ๐ฎ๐น๐น ๐ผ๐ณ ๐ถ๐ ๐ถ๐ป ๐บ๐ ๐ผ๐ป-๐ฑ๐ฒ๐บ๐ฎ๐ป๐ฑ ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐๐ ๐ฐ๐ผ๐๐ฟ๐๐ฒ, ๐๐ต๐ฒ๐ฟ๐ฒ ๐๐ผ๐ ๐ด๐ฒ๐:
โถ๏ธ 32+ hours of ๐๐๐๐ ๐๐ถ๐ฑ๐ฒ๐ผ๐
๐ 900 ๐๐๐๐ ๐พ๐๐ฒ๐๐๐ถ๐ผ๐ป๐
๐ 2,500 ๐๐๐๐ ๐ณ๐น๐ฎ๐๐ต๐ฐ๐ฎ๐ฟ๐ฑ๐
๐งพ A 200+ page ๐๐๐๐ ๐๐๐๐ฑ๐ ๐ด๐๐ถ๐ฑ๐ฒ
๐งพ A 120- page ๐๐๐๐ ๐ค๐๐ถ๐ฐ๐ธ ๐ฆ๐ต๐ฒ๐ฒ๐๐
๐ค The ThorBot (๐๐๐๐ ๐๐ต๐ฎ๐๐ฏ๐ผ๐)
๐ A 2,500-word ๐๐๐๐ ๐ด๐น๐ผ๐๐๐ฎ๐ฟ๐
๐ ๐๐๐๐ ๐ ๐ป๐ฒ๐บ๐ผ๐ป๐ถ๐ฐ๐
๐๏ธ A ๐๐๐๐ ๐๐๐๐ฑ๐ ๐ฝ๐น๐ฎ๐ป
๐ป ๐ฆ๐๐ฏ๐๐ถ๐๐น๐ฒ๐ ๐ถ๐ป ๐ด ๐น๐ฎ๐ป๐ด๐๐ฎ๐ด๐ฒ๐ (English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese and Hindi.)
๐๐ก๐๐ฉ๐ญ๐๐ซ๐ฌ:
00:03 - Introduction to the CIA Triad and its relevance.
00:28 - Overview of the three components: Confidentiality, Integrity, and Availability.
01:15 - Explanation of the CIA Triad as the foundation of IT security.
01:39 - Importance of balancing the CIA Triad based on what is being protected.
02:01 - Discussion on Confidentiality and common misconceptions.
02:27 - Common threats to Confidentiality, including cryptanalysis and social engineering.
03:19 - The security risks posed by the Internet of Things (IoT).
04:06 - Explanation of the different types of data: Data at rest, Data in motion, Data in use.
05:33 - Policies and training to protect Data in use, including clean desk policies and strong passwords.
08:30 - Introduction to Integrity and its relationship with Confidentiality.
The video covers how these principles form the foundation of IT security, with examples of threats like encryption attacks, social engineering, and the importance of securing data at rest, in motion, and in use. The speaker also emphasizes policies for protecting data, such as clean desk policies, strong passwords, and access controls.
If this video was helpful, please CLICK LIKE, SUBSCRIBE, and leave a comment.
Everything you learn from now on is all to keep the balance between confidentiality, integrity, and availability.
A little bit confused about what they are? Watch this video now!
โ ๐ข๐๐ต๐ฒ๐ฟ ๐ฉ๐ถ๐ฑ๐ฒ๐ผ๐ ๐ฌ๐ผ๐ ๐ ๐ถ๐ด๐ต๐ ๐๐ฒ ๐๐ป๐๐ฒ๐ฟ๐ฒ๐๐๐ฒ๐ฑ ๐๐ป ๐ช๐ฎ๐๐ฐ๐ต๐ถ๐ป๐ด:
๐ CISSP | Software Composition Analysis (SCA): https://youtu.be/057lIAaczQ4
๐ Certified in Cybersecurity (CC) - I failed the CC exam. Now what?: https://youtu.be/DVSMrxSwNQQ
๐ Certified in Cybersecurity (CC) - How to design your career and certification path: https://youtu.be/OD7UPvx8pHs
๐ CISSP | The exam CISSP itself and how to mentally prepare for it: https://youtu.be/gKBJHi9hVkU
๐ Certified in Cybersecurity (CC) - How to design your career and certification path: https://youtu.be/OD7UPvx8pHs
If this video helps you, please subscribe to my channel and like, comment, and share the video. https://www.youtube.com/@thorteaches/videos?sub_confirmation=1
๐ ๐ต๐ผ๐ฝ๐ฒ ๐ ๐ฐ๐ฎ๐ป ๐ต๐ฒ๐น๐ฝ ๐๐ผ๐ ๐ด๐ฒ๐ ๐ฐ๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฒ๐ฑ,
๐ง๐ต๐ผ๐ฟ ๐ฃ๐ฒ๐ฑ๐ฒ๐ฟ๐๐ฒ๐ป
@thorteaches
#cism #thorteachescomcissp #cc #cismandpmptraining #thorteachescom #pmptraining #training #pmp #cybersecurity #certification #informationsecurity #itsecurity #cism #ciatriad #cybersecurity #informationsecurity #dataprotection #confidentiality #integrity #availability #itsecurity #cyberawareness
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
680
Likes
5
Duration
11:50
Published
Oct 14, 2021
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now