• Online, Instructor-Led
Course Description

Business and management aspects of information security: Legal and regulatory aspects; strategic planning process; security policies and management process for a secure information systems environment.

Learning Objectives

  • Translate business goals and regulatory requirements into necessary Information Technology security responsibilities.
  • Document security strategies as they relate to the business goals and objectives.
  • Identify a series of standard security policies and apply the policies to achieve key security initiatives.
  • Create a series of custom security policies applicable to specific business and regulatory environments, and explain the importance of the policies in achieving the necessary goals of the stated organizations.
  • Identify key management roles in I.T. security, and explain the responsibilities of each individual in their role in security management.
  • Verify the steps necessary in creating a secured management environment, with proper monitoring, alerting, notification, identification, and remediation tasks.
  • Write an actual I.T Security Strategy document.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cybersecurity Management
  • Strategic Planning and Policy

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.