This course will teach you knowledge and application of information security governance, concepts, and principles needed for the Certified Information Security Manager (CISM) exam.
It can be stated that access control is the very heart of an information security program, and, therefore, it is a core responsibility of an information security manager. In this course, Information Security Governance for the CISM, you’ll learn to implement appropriate governance principles and security concepts into an organization. First, you’ll explore the nature of governance and its differentiation from management. Next, you’ll discover how to develop an enterprise-wide governance program. Finally, you’ll learn how to identify and comply with the factors of law, regulation and organizational culture in development of adequate oversight for the information security program. When you’re finished with this course, you’ll have the skills and knowledge of information security governance needed for the Certified Information Security Manager exam.
It can be stated that access control is the very heart of an information security program, and, therefore, it is a core responsibility of an information security manager. In this course, Information Security Governance for the CISM, you’ll learn to implement appropriate governance principles and security concepts into an organization. First, you’ll explore the nature of governance and its differentiation from management. Next, you’ll discover how to develop an enterprise-wide governance program. Finally, you’ll learn how to identify and comply with the factors of law, regulation and organizational culture in development of adequate oversight for the information security program. When you’re finished with this course, you’ll have the skills and knowledge of information security governance needed for the Certified Information Security Manager exam.