Imate žicu za učenje?

Overview/Description Information risk management and compliance is a pivotal part of the role of an information security manager. This course will provide an overview of information risk management and compliance, as well as examine the elements that come into play when creating an information risk management plan and the frameworks and methodologies that are used. This course also examines risk assessment, with special attention to methods of risk identification, risk analysis, compliance, and the calculations used for risk impact analysis. This course prepares you for the Certified...
Overview/Description Managing incidents, and the response that is put forward by an organization falls directly under the duties of a CISM. Organizations must have a plan in place, and must know the steps they will take to deal with incidents when they occur. This course examines what incident management is, how responses are prepared, and concepts and technologies that are used when dealing with incidents. This course also looks at the principles, importance of, and outcomes of incident management and how the information security manager, with the approval of senior management, prepares...
Overview/Description Analysis, mitigation, and monitoring play an extremely important role in information risk management and compliance. This course examines how to properly classify and valuate information assets, perform a business impact analysis, and the principles of disaster recovery. You will learn about the options available to deal with risk, effective controls, and ways to ensure your risk management program is integrated into your organization's other life-cycle processes. You will also examine the many responsibilities of an Information Security Manager related to risk...
Overview/Description Preparing incident response and recovery plans is a very important part of a CISM's role. This course examines how to identify the current state of incident response capability, identifies the elements of incident response and recovery plans, and discusses principles for effectively managing the plans. This course also examines the importance of testing, documentation, and how to physically prepare recovery sites and related offsite resources. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate...
Overview/Description An information security program is the foundation of an information security manager's daily work. This course examines the purpose and fundamentals of IS program development and management, along with the objectives, concepts, and tasks that make up an IS program. This course also examines the scope and charter of an IS program, and how the IS Manager must understand the scope of the program, and things such as chain of command, corporate culture, existing functions, current state of security, and industry standards for information security. It outlines the steps for...
Overview/Description An information security framework represents the entire IS management structure. This course examines governance frameworks such as COBIT 5 and industry standards like ISO/IEC 27001:2013. This course also examines the components of a security framework: operational components, management components, administrative components, and education and informational components. The course then explains how an IS program road map is defined, and the elements that make up the road map. Finally, the course describes the security architectures and how they are implemented. This...
Overview/Description Information security managers are responsible for all administrative activities related to the development and management of an information security program. Those activities include such things as assigning and training security personnel, overseeing the creation and distribution of policies and other documentation, and monitoring the effectiveness of the security program itself. This course examines the many activities that an information security manager is responsible for and the skills required to perform them. This course prepares you for the Certified Information...
Overview/Description Information security programs typically have numerous operational responsibilities and provide a variety of security services. While programs vary from organization to organization, there are operations and services that are typically found in all well conceived security programs. This course examines the activities and responsibilities of an information security manager related to operations and services within an organization. The course will examine different organizational units such as IT, HR, and Legal that are affected by security programs, and how their needs are...
Overview/Description Security programs require strong controls and countermeasures to ensure that security activities are carried out and measures exist to deal with issues that may arise while a security program is being implemented. This course examines control categories, control design considerations, and the control methods and recommendations that a security manager should implement. This course will also discuss the metrics and monitoring practices that should be used put in place as part of a security program. Finally, this course will examine common information security program...
Overview/Description Cryptography has been used for thousands of years to secure messages and hide information from those who would seek to steal it. In this course, you'll learn about cryptographic concepts and techniques along with examining the security implications associated with enterprise storage. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam. Target Audience Security candidates looking to certify their technical knowledge and skills required to conceptualize,...

Koraci do učenja

1Prijavi se

Prijavite se, a ako nemate korisničko ime, registrirajte se.

2Pronađi i upiši program

Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.

3Uči

Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

»Detaljne upute

Trebate pomoć?