Risk is managed through controls and this course will teach you how to select the controls required to protect an Information System as needed for the Certified in Governance, Risk and Compliance examination.
The objective of risk management is to ensure that adequate controls are in place to protect information and information systems. In this course, Selection and Approval of Security and Privacy Controls for the Certified in Governance, Risk and Compliance certification, you’ll learn to select and document the security controls needed in an Information system and documented in the System Security Plan. First, you’ll explore control requirements. Next, you’ll discover allocation of baseline and inherited controls. Finally, you’ll learn how to prepare system documentation to obtain approval for the system security plan. When you’re finished with this course, you’ll have the skills and knowledge of selection and approval of security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.
The objective of risk management is to ensure that adequate controls are in place to protect information and information systems. In this course, Selection and Approval of Security and Privacy Controls for the Certified in Governance, Risk and Compliance certification, you’ll learn to select and document the security controls needed in an Information system and documented in the System Security Plan. First, you’ll explore control requirements. Next, you’ll discover allocation of baseline and inherited controls. Finally, you’ll learn how to prepare system documentation to obtain approval for the system security plan. When you’re finished with this course, you’ll have the skills and knowledge of selection and approval of security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.