Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Risk and Security programs require the determination of the boundaries of an Information System. This course will teach you the skills needed to determine the scope of the Information System needed for the Certified in Governance, Risk and Compliance exam.
One of the hardest challenges in risk and security management is to determine the scope of the risk management initiative. In this course, Scope of the Information System for CGRC™, you’ll learn to determine the boundary for the Authorization of an Information System. The determination of boundaries is an essential step in Systems Authorization. First, you’ll explore system scoping. Next, you’ll discover systems architecture. Finally, you’ll learn how to categorize the Information System according to the data and services it supports. When you’re finished with this course, you’ll have the skills and knowledge of Information Systems scoping needed for the Certified in Governance, Risk and Compliance examination.
One of the hardest challenges in risk and security management is to determine the scope of the risk management initiative. In this course, Scope of the Information System for CGRC™, you’ll learn to determine the boundary for the Authorization of an Information System. The determination of boundaries is an essential step in Systems Authorization. First, you’ll explore system scoping. Next, you’ll discover systems architecture. Finally, you’ll learn how to categorize the Information System according to the data and services it supports. When you’re finished with this course, you’ll have the skills and knowledge of Information Systems scoping needed for the Certified in Governance, Risk and Compliance examination.