National CAE Designated Institution
  • Online, Instructor-Led
Course Description

(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations.

Learning Objectives

After completing this course, students should be able to:

  • Evaluate and select solutions to support security policy requirements
  • Develop and implement security procedures and processes to support security policy requirements, including security program measures
  • Communicate policies, procedures, and processes to organizational stakeholders through a security education, training, and awareness program
  • Implement continuous change management processes to assess and update security controls' effectiveness

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cybersecurity Management
  • Executive Cyber Leadership
  • Language Analysis
  • Legal Advice and Advocacy
  • Program/Project Management and Acquisition
  • Risk Management
  • Strategic Planning and Policy
  • Training, Education, and Awareness

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.