$79.00
Instructor:
MindEdge Learning
Contact Hours:
5 hours (0.5 CEUs)
Dates:
Open Enrollment; 90 day access to course content
Times:
Self-paced; 5 hours
Location:
Online
Cost:
$79 (discounts do not apply)

Course Description

Note: This course is one module within the Certificate in Cybersecurity.

This course covers the role of governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. The course also includes a look at how modern organizations manage information security risks and how to conduct a risk analysis. It concludes by examining the process for providing information security training and education. This course requires some basic understanding of IT concepts. 

Learning Outcomes

By the end of the course, learners will be able to:

  • Discuss the concept of security governance and understand the job of overseeing data security
    Describe the role of policy and procedure documents in information security
    Understand the key principles and terminology of information security governance and risk management
    Discuss different management practices for overseeing an effective information security function
    Identify common information security risks and threats
    Describe the process for conducting a risk assessment
    Understand the data classification process and properly classify data according to security needs
    Explain the process for providing information security training and education
    Discuss the concept of security governance and understand the job of overseeing data security
  • Describe the role of policy and procedure documents in information security
  • Understand the key principles and terminology of information security governance and risk management
  • Discuss different management practices for overseeing an effective information security function
  • Identify common information security risks and threats
  • Describe the process for conducting a risk assessment
  • Understand the data classification process and properly classify data according to security needs
  • Explain the process for providing information security training and education

Key Features

  • Mobile-friendly
  • Audio-enabled
  • Badge and credit-awarding
  • Real-world case studies
  • Fully accessible
  • Games & Flashcards
  • Expert-supported
  • Video content
 $79.00