Experts Available Now Call (888) 752-7542

Search
Close this search box.

Experts Available Now

Call (888) 752-7542

Overview

This is a 3-day class.

In this course, students will establish processes to ensure that information security measures align with established business needs.

[ucaddon_uc_super_clean_tabs heading_active=”#ec1f35″ uc_items_data=”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” uc_fonts_data=”JTdCJTIydWNfaXRlbXNfYXR0cmlidXRlX3RpdGxlJTIyJTNBJTdCJTIyZm9udC1mYW1pbHklMjIlM0ElMjJNb250c2VycmF0JTIyJTJDJTIyZm9udC13ZWlnaHQlMjIlM0ElMjJCb2xkJTIyJTJDJTIyZm9udC1zaXplJTIyJTNBJTIyMjBweCUyMiU3RCUyQyUyMnVjX2l0ZW1zX2F0dHJpYnV0ZV9jb250ZW50JTIyJTNBJTdCJTIyZm9udC1mYW1pbHklMjIlM0ElMjJMYXRvJTIyJTJDJTIyZm9udC13ZWlnaHQlMjIlM0ElMjJOb3JtYWwlMjIlMkMlMjJmb250LXNpemUlMjIlM0ElMjIxNXB4JTIyJTJDJTIybGluZS1oZWlnaHQlMjIlM0ElMjIxZW0lMjIlMkMlMjJjb2xvciUyMiUzQSUyMiUyMzYyNjI2MiUyMiU3RCU3RA==”]

Course Outline

1    Information Security Governance
  • Develop an Information Security Strategy
  • Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements
  • Justify Investment in Information Security Identify Drivers Affecting the Organization
  • Obtain Senior Management Commitment to Information Security
  • Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels
2    Information Risk Management
  • Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs
  • Identify and Evaluate Risk Mitigation Strategies
  • Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk
1    Information Security Program Development
  • Develop Plans to Implement an Information Security Strategy Security Technologies and Controls
  • Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions
  • Identify Resources Needed for Information Security Program Implementation
  • Develop Information Security Architectures Develop Information Security Policies
  • Develop Information Security Awareness, Training, and Education Programs
  • Develop Supporting Documentation for Information Security Policies
2    Information Security Program Implementation
  • Integrate Information Security Requirements into Organizational Processes
  • Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics
3    Information Security Program Management
  • Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls
  • Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance
  • Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues
4    Incident Management and Response
  • Develop an Information Security Incident Response Plan Establish an Escalation Process
  • Develop a Communication Process Integrate an IRP
  • Develop IRTs Test an IRP
  • Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews