Earn these career-relevant skills in weeks, not years.
- Outline the essential components of a viable information security governance program.
- Illustrate the drivers that influence information security governance.
- Establish the desired outcomes of information security governance.
- Compare and contrast the differences between corporate, IT, and information security governance.
- Differentiate the major components of an information security program.
- Appraise the organizational challenges for implementing an information security program.
- Deconstruct the roles and responsibilities of key stakeholders responsible for an information security program.
- Compare and contrast the roles and focus of the Chief Information Officer (CIO) and Chief Information Security Officer (CISO).
- Assess regulatory requirements and their influence on business from an information security governance perspective.
- Examine the impact of the Payment Card Industry (PCI) Data Security Standard on organizations that handle branded credit cards.
- Differentiate the mandated regulatory and compliance requirements for the healthcare industry.
- Appraise the NIST provisions for meeting regulatory and compliance requirements.
- Analyze the purpose of distinct information security policy components.
- Illustrate how critical controls drive the creation of security policies.
- Compare and contrast the information security strategic plan with an information security policy.
- Compare and contrast risk assessment methods and practices.
- Describe the major components of the NIST risk management framework.
- Describe the interdependencies of the NIST security control families and how they apply to an organization.
- Assess the purpose and challenges for an organization to maintain a plan of actions and milestones (POA&M).