• Online, Instructor-Led
Course Description

In this course, students transform high-level policies and procedures into quantifiable and measurable controls and mechanisms that enforce data and process integrity, availability and confidentiality

Learning Objectives

By the end of this course, the student will be able:

  1. To analyze the factors influencing the need for an information security program and what a program consists of.
  2. To evaluate information security governance and risk management.
  3. To evaluate information security models and management practices.
  4. To analyze information security policies and contingency planning.
  5. To evaluate personnel security and protection mechanism.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Risk Management
  • Vulnerability Assessment and Management
  • Program/Project Management and Acquisition
  • Strategic Planning and Policy

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.