This course provides an in-depth look at risk factor analysis that must be performed in order to design a flexible and comprehensive security plan. Topics include assessing threats, developing countermeasures, protecting information and security designs processes. Auditing practices used to verify compliance with policies and procedures, as well as for building a case for presentation in private and public settings, are also covered.
Learning Objectives
- Given an organization which needs a general security policy, understand what is needed to get a policy implemented and how to gain acceptance for the policy.
- Given an organization which needs a general security policy, understand what is needed to create an effective policy.
- Given an organization that needs security, be able to appropriately classify the assets that need protecting.
- Be able to address personnel security issues in a given organization.
- Be able to implement physical and environmental security policies and procedures.
- Implement operations security and explain how it impacts information security.
- Given an organization requiring security polices, define access control policies for that organization.
- Be able to integrate systems development issues into the security plan.
- Given a financial institution, be able to address the regulatory requirements for its information security.
- Given a health care organization, be able to address the regulatory requirements for its information security.
- Given an organization with a critical infrastructure, be able to address the regulatory requirements for its information security.
- Given a small business, be able to completely set up security policies for that business.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Training, Education, and Awareness
- Systems Administration
- Systems Development
- Systems Requirements Planning
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.