We may earn an affiliate commission when you visit our partners.
Kevin Henry, Christopher Rees, Bobby Rogers, Jeremy Turner, Paul Mealus, Prashant Pandey, and Big Data LDN

In this series, you will develop the skills necessary to assess, design, and implement an enterprise-level information security strategy. You’ll also learn how to establish the programs and policies that best fit your organization’s needs.

Enroll now

Share

Help others find Paths from Pluralsight by sharing it with your friends and followers:

What's inside

Two courses

Evaluating Your Organization’s Security Posture

(3 hours)
This course teaches you how to complete a holistic security evaluation to create a map of your company's security posture. You will learn about security evaluation practices, tools, and techniques, and how to manage the work, evidence, and data collection required for an assessment.

Building and Implementing a Security Awareness Training Program

(2 hours)
People are the weakest link in IT security. This course teaches how to build an effective information security awareness training program from start to finish.

Learning objectives

  • Develop an information security strategy in alignment with organizational goals and objectives
  • Design an information security governance framework to guide activities that support the information security strategy
  • Develop the information security program in alignment with the information security strategy
  • Design security policies to guide the development of standards, procedures and guidelines in alignment with enterprise goals
  • Develop a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value
  • Develop information security processes and resources to execute the information security program in alignment with the organization’s business goals
  • Ensure that risk assessments, vulnerability assessments, and threat analyses are conducted to identify and assess risk to the organization’s information
  • Assess risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite
  • Facilitate the integration of information risk management into business and it processes
  • Evaluate methods to design and implement information security controls
  • Design an incident response plan to ensure an effective and timely response to information security incidents
  • Develop processes for security incident identification, investigation, notification and escalation
  • Compile and present reports to key stakeholders on the activities, trends, and overall effectiveness of the information security program
  • Cultivate an environment aligned with laws, ethics, and compliance
  • Prepare, obtain, and administer the information security budget
  • Develop comprehensive vulnerability management programs
  • Cultivate commitment from senior leadership and other stakeholders to support the information security strategy and program

Save this collection

Save Security Management to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser