Security and privacy must be built into Information Systems. This course will teach you the process of implementing information security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.
Many IT projects start with good intentions and a good security design but then the end product does not meet those design requirements. In this course, Implementation of Security and Privacy Controls for CGRC, you’ll learn to implement information and privacy controls into an information system according to the system security plan. First, you’ll explore control configuration. Next, you’ll determine compensating and inherited controls. Finally, you’ll learn how to verify and document the controls. When you’re finished with this course, you’ll have the skills and knowledge of Implementation of security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.
Many IT projects start with good intentions and a good security design but then the end product does not meet those design requirements. In this course, Implementation of Security and Privacy Controls for CGRC, you’ll learn to implement information and privacy controls into an information system according to the system security plan. First, you’ll explore control configuration. Next, you’ll determine compensating and inherited controls. Finally, you’ll learn how to verify and document the controls. When you’re finished with this course, you’ll have the skills and knowledge of Implementation of security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.