Virtual - Can be taken from Any Location, Any Time according to Your Schedule
COST:
Contact Learn@AristaLearn.com for $
TESTING VOUCHER or CERTIFICATE OF COMPLETION?
Certificate of Completion
TARGET STUDENT:
This course is best suited for beginning to intermediate security managers
PREREQUISITES:
There are no prerequisites for this course
COURSE MATERIALS INCLUDE:
Access to on-line Learning Portal
Videos, training content, examples, quizzes, labs, and all items needed to learn the material and successfully pass this course!
HOW TO ENROLL:
Email Learn@AristaLearn for a Quote & Detailed Upload instructions
COURSE OVERVIEW
This course teaches students about information security governance, information risk management, information security program development, and information security incident management.
DOMAIN 01 - Information Risk Management
Lesson 1: Information Security Governance Overview
Information Security Governance Overview
Importance of Information Security Governance
Outcomes of Information Security Governance
Lesson 2: Effective Information Security Governance
Business Goals and Objectives
Roles and Responsibilities of Senior Management
Governance, Risk Management and Compliance
Business Model for Information Security
Dynamic Interconnections
Lesson 3: Information Security Concepts and Technologies
Information Security Concepts and Technologies
Lesson 4: Information Security Manager
Responsibilities, Senior Management Commitment
Obtaining Senior Management Commitment
Establishing Reporting and Communication Channels
Lesson 5: Scope and Charter of Information Security Governance
Assurance Process Integration and Convergence
Governance and Third-Party Relationships
Lesson 6: Information Security Governance Metrics
Metrics, Effective Security Metrics
Security Implementation Metrics
Strategic Alignment, Risk Management
Value Delivery, Resource Management
Performance Measurement
Assurance Process Integration/Convergence
Lesson 7: Information Security Strategy Overview
Lesson 8: Creating Information Security Strategy
Information Security Strategy, Common Pitfalls
Objectives of the Information Security Strategy
What is the Goal?
Defining Objectives, Business Linkages
Business Case Development, Business Case Objectives
The Desired State, COBIT, COBIT Controls, COBIT Framework
Capability Maturity Model, Balanced Scorecard
Architectural Approaches, ISO/IEC 27001 and 27002
Risk Objectives
Lesson 9: Determining Current State Of Security
Current Risk, BIA
Lesson 10: Information Security Strategy Development