This course emphasizes the relationship between an information security program and broader business goals and objectives. While focusing on the relationship between key IT management areas, it also focuses on advanced risk management, compliance and security management operations.
The following topics will be covered in this course:
- Information Security Governance
- Information Risk Management and Compliance
- Information Security Program Development and Management
- Information Security Incident Management
Who Should Attend?
Experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.
Five years of experience with audit, IT systems, and security of information systems; systems administration experience; familiarity with TCP/IP; and an understanding of UNIX, Linux, and Windows along with intermediate knowledge of IT Security.
The next course is being scheduled. Typically it is from 8:00 am to 5:00 pm with a one hour break for lunch.
Provided Materials / Facilities
Lecture and reference materials are provided.
Courses hosted in CIAS facilities.
Similar courses you may be interested in:
Brought to you by a partnership between the Office of Extended Education and CIAS.