In this course, you'll learn the foundations of effective security management and how to prevent a data breach. You'll also learn risk management and resilience.
Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this course, Security Management: The Big Picture, you'll gain solid foundational knowledge as well as skills you can use to effectively manage security in your organization. You'll learn how to organize and establish a security management function within your organization as well as the different roles and responsibilities involved in security management. You'll also learn about risk management and how it reduces the likelihood of data breaches and negative events. Finally, you'll learn about the components of organizational resilience, which include business continuity, incident response, and disaster recovery. By the end of this course, you should be able to understand the need for and establish a security management section within your organization.
Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this course, Security Management: The Big Picture, you'll gain solid foundational knowledge as well as skills you can use to effectively manage security in your organization. You'll learn how to organize and establish a security management function within your organization as well as the different roles and responsibilities involved in security management. You'll also learn about risk management and how it reduces the likelihood of data breaches and negative events. Finally, you'll learn about the components of organizational resilience, which include business continuity, incident response, and disaster recovery. By the end of this course, you should be able to understand the need for and establish a security management section within your organization.