Earn these career-relevant skills in weeks, not years.
- Outline Information Security Portfolio Planning.
- Recognize organizational structure, culture, and leadership approaches.
- Align an information security portfolio to goals, objectives, and outcomes.
- Identify and support key vendors and stakeholders.
- Plan the organization of a security portfolio.
- Define program management.
- Illustrate an information security program development model.
- Plan security assessment activities to measure the effectiveness of the program.
- Categorize resource planning to include stakeholders, personnel, and technology.
- Model project management phases.
- Evaluate the triple constraints in project management.
- Complete a project charter.
- Provide a thorough project scope statement.
- Manage scheduling, cost, teams, and quality of a project.
- Resolve personnel and teamwork issues within time, cost, and quality constraints.
- Illustrate the information security portfolio hierarchy.
- Describe security operations center and personnel.
- Differentiate security operations processes, policies, and procedures.
- Assess the effectiveness of changes and improvements to the information systems processes.
- Analyze the conflicting roles of security operations personnel in reporting of audit findings.
- Identify incident response tools.
- Illustrate security operations program activities.
- Exemplify event monitoring, detection, response, and recovery.
- Describe digital forensic investigation.