Mitigating Security Risks: Information Security Governance
IT Security
| Intermediate
- 20 Videos | 1h 23m 7s
- Includes Assessment
- Earns a Badge
Adequate risk management requires the policies, procedures, standards, and guidelines that encompass effective information security governance are in place. This course shows you how to incorporate security governance as part of a robust security strategy. Examine the many security governance elements. Outline how to design, implement, and continually evaluate your strategy based on best practices. Define how security governance relates to the CIA Triad and distinguish between security governance and security management. Furthermore, investigate IT governance frameworks and compare centralized, decentralized, and hybrid structures. After taking this course, you'll recognize what's needed to implement a sound and robust information security governance strategy at your organization.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedefine information security governancedescribe why security governance is neededlist the benefits of security governanceoutline the relationship between security governance and the CIA Triadlist the desired outcomes of security governancecompare security governance and security managementlist the elements of security governancedefine the role and importance of security policies, procedures, standards, and guidelineslist the types of IT governance frameworks
-
describe the role of senior management in security governancedescribe methods to create and deliver governancedescribe the senior management roles and responsibilities in security governancelist methods to review governancedescribe the signs of security governanceoutline some examples of missing governancelist the reasons for ineffective security governancelist some security governance best practices and outline the method to implement security governancelist and describe the components of the security governance structuresummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 43sUP NEXT
-
2.Information Security Governance2m 42s
-
3.The Need for Security Governance4m 55s
-
4.The Benefits of Security Governance4m 38s
-
5.Security Governance and the CIA Triad2m 33s
-
6.Security Governance Outcomes2m 19s
-
7.Security Governance vs. Security Management3m 34s
-
8.The Elements of Security Governance6m 1s
-
9.The Role of a Security Policy2m 54s
-
10.IT Governance Frameworks12m 56s
-
11.The Role of Senior Management in Security Governance7m 15s
-
12.Methods to Create and Deliver Governance6m 33s
-
13.Senior Management Roles and Responsibilities5m 15s
-
14.Methods to Review Governance3m 43s
-
15.Signs of Security Governance3m 50s
-
16.Missing Security Governance2m 55s
-
17.Reasons for Ineffective Security Governance2m 35s
-
18.Methods to Implement Security Governance3m 5s
-
19.The Security Governance Structure2m 3s
-
20.Course Summary1m 38s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.