Overview/Description
The implementation of an information security program can be time consuming but, if done properly, it will ensure that your company is able to meet its security objectives. This course examines the elements necessary for implementing and measuring the success of an information security program, assuming you have created a sound strategy and the resources necessary for program implementation are in place. This course looks at policy and standards compliance, training and education, controls, life cycle integration, monitoring and communication, and the documentation that should be done at all stages of program implementation and monitoring. This course also examines what metrics are, how they should be used, and the types of metrics that play a role in monitoring an information security program. This course prepares you for the Certified Information Security Manager (CISM) exam.
Target Audience
Experienced IT security professionals seeking to pass the Certified Information Security Manager (CISM) exam or otherwise gain knowledge in managing, designing, and overseeing an enterprise's information security