Information Security Management in a Nutshell

Click here to join the course.

Summary

Learn how to set up an information security program for your organization. You’ll learn why Information Security Management is needed and what exactly needs to be protected. You’ll learn about processes to implement and run an Information Security Management System.

Key Learnings

Unit 1 - Information Security Goals
Unit 2 - Security Risk Management
Unit 3 - Security Control Types
Unit 4 - Security Management Processes: Prevention, Detection, Response
Unit 5 - Security Awareness
Unit 6 - Organizational Requirements
Unit 7 - Legal Conditions for Certifying Security Management Systems
Unit 8 - Key Takeaways

Roger Tchalla

Technology Consultant and Project Manager with extensive experience leading SAP implementations using Activate Methodology.

Roger is continuously looking for ways to innovate, facilitate business transformation, optimize delivery and maximize value through efficient use of agile and collaborative techniques and tools.

https://www.linkedin.com/in/tchallaroger/
Previous
Previous

Enterprise Machine Learning in a Nutshell

Next
Next

Leadership in Digital Transformation