This course emphasizes the relationship between an information security program and broader business goals and objectives. While focusing on the relationship between key IT management areas, it also focuses on advanced risk management, compliance and security management operations.
The following topics will be covered in this course:
- Information Security Governance
- Information Risk Management and Compliance
- Information Security Program Development and Management
- Information Security Incident Management
Who Should Attend?
Experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.
Five years of experience with audit, IT systems, and security of information systems; systems administration experience; familiarity with TCP/IP; and an understanding of UNIX, Linux, and Windows along with intermediate knowledge of IT Security.
The next course will meet May 4 - 8, 2015. The course meets from 8:00 am to 5:00 pm with a one hour break for lunch.
Provided Materials / Facilities
Lecture and reference materials are provided.
Courses hosted in CIAS facilities.
Please have a valid credit card ready as you will be providing payment during the registration process.
If this time frame does not work for you, please consider the course happening August 10 - 14, 2015
Similar courses you may be interested in:
Brought to you by a partnership between the Office of Extended Education and CIAS.