Information Systems Security
Showing 13–24 of 60 results
Implementation of Security and Privacy Controls for CGRC
Security and privacy must be built into Information Systems. This course will teach you the process of implementing information security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.
Incident Response and Recovery for SSCP®
Incident response and recovery are essential capabilities for an organization to establish and maintain continuity given a shifting and destructive list of threats. This course highlights incident response capabilities needed for the SSCP exam.
Information and Cyber Security Governance, Risk and Compliance (GRC)
GRC determines the information and cyber security an organization does. This course will teach you the fundamentals of governance, risk, compliance with external obligations, and assurance, and how they work together to keep an organization secure.
Information and Cyber Security GRC: Commission and Manage Penetration Tests
Penetration testing is a proven tool in the fight against those who want to attack us. This course will teach you the steps to prepare for and what to expect during the pentest to make the most effective use of time and money.
Information and Cyber Security GRC: Compliance Assessment and Reporting
This course will teach you how to think about security compliance assessments and how to get started performing assessments.
Information and Cyber Security GRC: Compliance with External Factors
This course will teach you to identify, categorize, and apply laws, regulations, and standards to meet external requirements.
Information and Cyber Security GRC: Risk Management Frameworks and Structures
All organizations face varying risks related to their mission, strategies, and goals. This course will teach you the techniques used to manage risks and a selection of frameworks that can be used.
Information Security Risk Management Program for CGRC
This course will teach you the principles and standards of information security and risk management needed for the Certified in Governance, Risk, and Compliance Examination.
Information Systems Asset Protection: Asset Security
This course will provide you with one of the most important responsibilities of an information systems' auditor - the evaluation of whether the assets of the organization are adequately protected.
Information Systems Asset Protection: Monitoring
Auditors must be able to review and assess the controls put in place to instigate IT risk. This course will help you learn the techniques and methodologies used to gain insight into control effectiveness.
Information Systems Asset Protection: Securing System Components
This course will provide you with the knowledge needed to audit the many different components that secure information systems. The IT auditor needs a diverse range of skills and expertise as addressed in this course to evaluate systems' security.
Information Systems Auditing: Implementation
Far too many IT projects fail. The role of the auditor is to identify the symptoms of failure and allow management to address them in a timely manner. This course examines the processes of information systems implementation and operations.