About this Paths
In this series, you will develop the skills necessary to assess, design, and implement an enterprise-level information security strategy. You’ll also learn how to establish the programs and policies that best fit your organization’s needs.
What You'll Learn
From | Pluralsight |
---|---|
Hours | 32 |
Instructors | Kevin Henry, Christopher Rees, Paul Mealus, Bobby Rogers, Prashant Pandey, Jeremy Turner |
Language | English |
Subjects | IT & Networking |
Similar Courses
Sorted by relevance
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).
INFORMATION SECURITY DEVELOPER_INDENT - IT Security $47k
Information Security Office $71k
Information Security 1 $72k
Head, Information Security $72k
Information Security Analyst 2 3 $81k
Information Security Apprentice $84k
Engineer, Information Security $89k
Security Information Analyst $91k
Information Security Administration $108k
Information Technology/ Security $113k
Information Security - IT Specialist $121k
Information Security Expert $130k
Courses in this Paths
Listed in the order in which they should be taken
Starts | Course Information | |
---|---|---|
On Demand |
As a Security Manager you play a critical role in setting up an effective security program that will protect the assets of the organization in a cost-effective way. In this course... Pluralsight |
Save
|
On Demand |
The Governance of Information Security Many managers in information security are frustrated by a lack of senior management support and understanding. This course, The Governance of Information Security, will help you... Pluralsight |
Save
|
On Demand |
Security professionals need to know how to comply with laws and standards in information protection. In this course, Information Classification, you will learn foundational... Pluralsight |
Save
|
On Demand |
As a Security Professional you will have to work with people both within and outside of the organization. In this course, Personnel Security, you will first learn how to build a... Pluralsight |
Save
|
On Demand |
Risk Assessment and Management Security Professionals rely on risk management to justify and develop an Information Security program. In this course, Risk Assessment and Management, you will learn comprehensive... Pluralsight |
Save
|
On Demand |
Security Controls and Control Frameworks It can be challenging to evaluate and select the best controls for an organization. Through this course, Security Controls and Control Frameworks, you will gain an understanding... Pluralsight |
Save
|
On Demand |
Investigations and Incident Management The use of risk management and control frameworks should help an organization to avoid and reduce the impact of incidents, but despite all of that, the information security... Pluralsight |
Save
|
On Demand |
Business Continuity Management Business success depends on being prepared for any incident that could affect business operations. The art and science of Business Continuity Management is essential to handling... Pluralsight |
Save
|
On Demand |
All the elements of a security program come down to the need to have a secure operations process. In this course, Security Operations, you will explore the core requirements of... Pluralsight |
Save
|
On Demand |
Security assessment is an important but often misunderstood integral part of an information security management program. Many tests and audits fail to provide value or adequate... Pluralsight |
Save
|
On Demand |
Law, Ethics, and Security Compliance Management Businesses of all sizes can operate on a global scale. Privacy laws and data protection laws continue to evolve and become more restrictive. It's important for leaders to... Pluralsight |
Save
|
On Demand |
Evaluating Your Organization’s Security Posture Assessing your organization’s security is a long process consisting of many moving parts. In this course, Evaluating Your Organization’s Security Posture, you will gain the... Pluralsight |
Save
|
On Demand |
Running the Business of Information Security Most people know that information security is about protecting information systems and data, managing cyber risk, and ensuring compliance with governance. However, the security... Pluralsight |
Save
|
On Demand |
Developing and Implementing Vulnerability Management Programs Developing a vulnerability management program is as much a challenge as implementing the same. In this course, Developing and Implementing Vulnerability Management Programs, you... Pluralsight |
Save
|
On Demand |
Building and Implementing a Security Awareness Training Program Did you know that the biggest threat to an organization is its own employees? Have you tried phishing simulations or basic information security awareness training lectures at your... Pluralsight |
Save
|
On Demand |
Security Management: A Case Study (You were viewing this course) Implementing a security program can be a daunting task. There are a lot of pieces to the puzzle that must be addressed ranging from knowing what assets and data you want to... Pluralsight |
Save
|
From | Pluralsight |
---|---|
Hours | 32 |
Instructors | Kevin Henry, Christopher Rees, Paul Mealus, Bobby Rogers, Prashant Pandey, Jeremy Turner |
Language | English |
Subjects | IT & Networking |
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).
INFORMATION SECURITY DEVELOPER_INDENT - IT Security $47k
Information Security Office $71k
Information Security 1 $72k
Head, Information Security $72k
Information Security Analyst 2 3 $81k
Information Security Apprentice $84k
Engineer, Information Security $89k
Security Information Analyst $91k
Information Security Administration $108k
Information Technology/ Security $113k
Information Security - IT Specialist $121k
Information Security Expert $130k
Similar Courses
Sorted by relevance