->
Lynda - Implementing an Information Security Program - 520232
Lynda - Implementing an Information Security Program
Building and operating an information security program at your organization can be challenging. The scope can be vast and complex. Thinking of all the ways an organization can fail and coming up with actionable measures you can take to prevent issues, mitigate risk, or recover from events is a large undertaking. In this course, Kip Boyle, president of Cyber Risk Opportunities, guides you through the entire process of creating an information security program, rolling it out to your organization, and maintaining it for continuous risk management.


Table of Contents

  • Introduction
  • 1. Information Security Program Goals
  • 2. Information Security Program Components
  • 3. Structure an Information Security Program
  • 4. Measure Information Risks
  • 5. Understand Information Risks
  • 6. Manage Information Risks
  • 7. Demonstrate Compliance and Progress
  • 8. Use a Workflow to Organize Work
  • Conclusion
  • Lynda - Implementing an Information Security Program


     TO MAC USERS: If RAR password doesn't work, use this archive program: 

    RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


     TO WIN USERS: If RAR password doesn't work, use this archive program: 

    Latest Winrar  and extract password protected files without error.


     Coktum   |  

    Information
    Members of Guests cannot leave comments.




    rss