Experts Available Now Call 678-752-7542

Search
Close this search box.

Experts Available Now

Call 678-752-7542

[vc_row][vc_column][vc_single_image image=”2426″ img_size=”full” alignment=”center”][vc_empty_space][vc_custom_heading text=”Overview” font_container=”tag:h3|font_size:24|text_align:left|color:%23000000″ use_theme_fonts=”yes”][vc_column_text css=”.vc_custom_1532618841998{padding-top: 20px !important;padding-bottom: 15px !important;}”]
This is a 3-day class.

In this course, students will establish processes to ensure that information security measures align with established business needs.[/vc_column_text][ucaddon_uc_super_clean_tabs heading_active=”#ec1f35″ uc_items_data=”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” uc_fonts_data=”JTdCJTIydWNfaXRlbXNfYXR0cmlidXRlX3RpdGxlJTIyJTNBJTdCJTIyZm9udC1mYW1pbHklMjIlM0ElMjJNb250c2VycmF0JTIyJTJDJTIyZm9udC13ZWlnaHQlMjIlM0ElMjJCb2xkJTIyJTJDJTIyZm9udC1zaXplJTIyJTNBJTIyMjBweCUyMiU3RCUyQyUyMnVjX2l0ZW1zX2F0dHJpYnV0ZV9jb250ZW50JTIyJTNBJTdCJTIyZm9udC1mYW1pbHklMjIlM0ElMjJMYXRvJTIyJTJDJTIyZm9udC13ZWlnaHQlMjIlM0ElMjJOb3JtYWwlMjIlMkMlMjJmb250LXNpemUlMjIlM0ElMjIxNXB4JTIyJTJDJTIybGluZS1oZWlnaHQlMjIlM0ElMjIxZW0lMjIlMkMlMjJjb2xvciUyMiUzQSUyMiUyMzYyNjI2MiUyMiU3RCU3RA==”][vc_custom_heading text=”Course Outline” font_container=”tag:h3|font_size:24|text_align:left|color:%23000000″ use_theme_fonts=”yes” css=”.vc_custom_1532616682650{margin: 0px !important;border-width: 0px !important;padding: 0px !important;}”][vc_column_text css=”.vc_custom_1532618899419{padding-top: 20px !important;padding-bottom: 20px !important;}”]

1    Information Security Governance
2    Information Risk Management
1    Information Security Program Development
2    Information Security Program Implementation
3    Information Security Program Management
4    Incident Management and Response

[/vc_column_text][/vc_column][/vc_row]