The objective of risk management is to ensure that adequate controls are in place to protect information and information systems. In this course, Selection and Approval of Security and Privacy Controls for the Certified in Governance, Risk and Compliance certification, you’ll learn to select and document the security controls needed in an Information system and documented in the System Security Plan. First, you’ll explore control requirements. Next, you’ll discover allocation of baseline and inherited controls. Finally, you’ll learn how to prepare system documentation to obtain approval for the system security plan. When you’re finished with this course, you’ll have the skills and knowledge of selection and approval of security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.
Overview
The objective of risk management is to ensure that adequate controls are in place to protect information and information systems. In this course, Selection and Approval of Security and Privacy Controls for the Certified in Governance, Risk and Compliance certification, you’ll learn to select and document the security controls needed in an Information system and documented in the System Security Plan. First, you’ll explore control requirements. Next, you’ll discover allocation of baseline and inherited controls. Finally, you’ll learn how to prepare system documentation to obtain approval for the system security plan. When you’re finished with this course, you’ll have the skills and knowledge of selection and approval of security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.
Syllabus
- Course Overview 2mins
- Select and Tailor Information Security Controls 34mins
- Document and Approve Information Security Plans 14mins
- Domain Summary 8mins
Taught by
Kevin Henry