Instructor:
MindEdge Learning
MindEdge Learning
Contact Hours:
5 hours (0.5 CEUs)
5 hours (0.5 CEUs)
Dates:
Open Enrollment; 90 day access to course content
Open Enrollment; 90 day access to course content
Times:
Self-paced; 5 hours
Self-paced; 5 hours
Location:
Online
Online
Cost:
$79 (discounts do not apply)
$79 (discounts do not apply)
Course Description
Note: This course is one module within the Certificate in Cybersecurity.
This course covers the role of governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. The course also includes a look at how modern organizations manage information security risks and how to conduct a risk analysis. It concludes by examining the process for providing information security training and education. This course requires some basic understanding of IT concepts.
Learning Outcomes
By the end of the course, learners will be able to:
-
Discuss the concept of security governance and understand the job of overseeing data securityDescribe the role of policy and procedure documents in information securityUnderstand the key principles and terminology of information security governance and risk managementDiscuss different management practices for overseeing an effective information security functionIdentify common information security risks and threatsDescribe the process for conducting a risk assessmentUnderstand the data classification process and properly classify data according to security needsExplain the process for providing information security training and educationDiscuss the concept of security governance and understand the job of overseeing data security
- Describe the role of policy and procedure documents in information security
- Understand the key principles and terminology of information security governance and risk management
- Discuss different management practices for overseeing an effective information security function
- Identify common information security risks and threats
- Describe the process for conducting a risk assessment
- Understand the data classification process and properly classify data according to security needs
- Explain the process for providing information security training and education
Key Features
- Mobile-friendly
- Audio-enabled
- Badge and credit-awarding
- Real-world case studies
- Fully accessible
- Games & Flashcards
- Expert-supported
- Video content