Vi ste ovdje
Overview/Description
Many companies realize that their information security is not in the state that it should be. As an information security manager, it will be your role to guide your organization to where information-related risks are controlled and sound information security processes are being followed by each and every employee. In order to move a company from a current state, to a desired state, there are many steps that must be taken. This course examines what an information security strategy is, frameworks and models you can use to build your strategy, who the strategy participants...
Overview/Description
In order for information security governance to succeed, there must be an action plan put into place to lay the groundwork for success. This course examines the assets, departments, resources, and people that play a role in bringing an action plan to life. This course will also examine the components and constraints of an action plan, along with providing a sample information security strategy to bring it all together. This course prepares you for the Certified Information Security Manager (CISM) exam.
Target Audience
Experienced IT security professionals seeking to pass...
Overview/Description
Managing incidents, and the response that is put forward by an organization falls directly under the duties of a CISM. Organizations must have a plan in place, and must know the steps they will take to deal with incidents when they occur. This course examines what incident management is, how responses are prepared, and concepts and technologies that are used when dealing with incidents. This course also looks at the principles, importance of, and outcomes of incident management and how the information security manager, with the approval of senior management, prepares the...
Overview/Description
Preparing incident response and recovery plans is a very important part of a CISM's role. This course examines how to identify the current state of incident response capability, identifies the elements of incident response and recovery plans, and discusses principles for effectively managing the plans. This course also examines the importance of testing, documentation, and how to physically prepare recovery sites and related offsite resources. This course prepares you for the Certified Information Security Manager (CISM) exam.
Target Audience
Experienced IT security...
Overview/Description
An information security program is the foundation of an information security manager's daily work. This course examines the purpose and fundamentals of IS program development and management, along with the objectives, concepts, and tasks that make up an IS program. This course also examines the scope and charter of an IS program, and how the IS Manager must understand the scope of the program, and things such as chain of command, corporate culture, existing functions, current state of security, and industry standards for information security. It outlines the steps for...
Overview/Description
An information security framework represents the entire IS management structure. This course examines governance frameworks such as COBIT and industry standards like ISO/IEC 27001. This course also examines the components of a security framework: operational components, management components, administrative components, and education and informational components. The course then explains how an IS program road map is defined, and the elements that make up the road map. Finally, the course describes the security architectures and how they are implemented. This course...
Overview/Description
Information security managers are responsible for all administrative activities related to the development and management of an information security program. Those activities include such things as assigning and training security personnel, overseeing the creation and distribution of policies and other documentation, and monitoring the effectiveness of the security program itself. This course examines the many activities that an information security manager is responsible for and the skills required to perform them. This course prepares you for the Certified Information...
Overview/Description
Information security programs typically have numerous operational responsibilities and provide a variety of security services. While programs vary from organization to organization, there are operations and services that are typically found in all well conceived security programs. This course examines the activities and responsibilities of an information security manager related to operations and services within an organization. The course will examine different organizational units such as IT, HR, and Legal that are affected by security programs, and how their needs are...
Overview/Description
Security programs require strong controls and countermeasures to ensure that security activities are carried out and measures exist to deal with issues that may arise while a security program is being implemented. This course examines control categories, control design considerations, and the control methods and recommendations that a security manager should implement. This course will also discuss the metrics and monitoring practices that should be used put in place as part of a security program. Finally, this course will examine common information security program...
Overview/Description
This course focuses on the need for access control mechanisms to secure an organization's network and minimize its vulnerability to attacks or intrusion. It covers various access control models, techniques, mechanisms, and methodologies. You will learn about the latest in authentication strategies and intrusion detection and prevention techniques. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP)...