Selection and Approval of Security and Privacy Controls for CGRC
Risk is managed through controls and this course will teach you how to select the controls required to protect an Information System as needed for the Certified in Governance, Risk and Compliance examination.
The objective of risk management is to ensure that adequate controls are in place to protect information and information systems. In this course, Selection and Approval of Security and Privacy Controls for the Certified in Governance, Risk and Compliance certification, you’ll learn to select and document the security controls needed in an Information system and documented in the System Security Plan. First, you’ll explore control requirements. Next, you’ll discover allocation of baseline and inherited controls. Finally, you’ll learn how to prepare system documentation to obtain approval for the system security plan. When you’re finished with this course, you’ll have the skills and knowledge of selection and approval of security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.
Author Name: Kevin Henry
Author Description:
Kevin Henry is a well-known and respected educator and lecturer in the fields of information security and audit. Kevin uses his more than 30 years of practical experience as a network technician, computer programmer, and information systems auditor to deliver outstanding presentations that make each topic interesting, relevant, and useful. Often described by students as “The best instructor I have ever had,” Kevin has the ability to provide quality instruction that engages the audience and provi… more
There are no reviews yet.