CISSP 2013 Domain: Information Security Governance and Risk Management New Horizons Jordan
Price: TBA
  • Duration: 3 Hours

Course details

Information Security Governance and Risk Management is an all encompassing domain that the information security professional must constantly be aware of. This course examines the frameworks and planning structures used to make sure that information assets are protected within an organization. This course also examines the governance, organizational structures and cultures, and the awareness training that should be imparted to employees at all levels. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

  • recognize responsibilities related to information security risk management
  • match information security principles with examples of controls used to apply them
  • match the components of a policy framework with their corresponding descriptions
  • identify methodological frameworks for implementing and auditing security controls
  • identify methodological frameworks for performing information security risk assessment
  • distinguish between the results of qualitative and quantitative risk assessments
  • match stages of the risk assessment process with corresponding descriptions
  • label examples of actions taken by a company in response to a risk as either avoidance, transfer, mitigation, or acceptance
  • recognize the appropriate application of risk management concepts
  • distinguish between risk assessment and control methodologies
  • identify responsibilities of an Information Security Officer
  • recognize the advantages and disadvantages of various reporting models
  • recognize how various personnel security strategies work to minimize employee risk
  • recognize strategies for implementing information security training
  • recognize the topics a computer ethics program should address
  • match common computer ethics fallacies to the corresponding correct views
  • recognize the ethical principles that all information security professionals should apply as they do their jobs
  • recognize how to handle organizational issues
  • recognize appropriate actions to implement security awareness training in your organization
  • recognize ethical principles that all information security professionals mu
Updated on 19 February, 2018

About New Horizons Jordan

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. For 30 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer ctheirses and certifications. they’re now the world’s largest independent IT training company, and they continue to lead:
  • 300 computer training centers in 70 countries (and counting)
  • Largest Guaranteed-to-Run ctheirse schedule in the world
  • Ranked in the top 5% of the industry for training quality and customer satisfaction
  • Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
  • Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
  • World’s largest Cisco-authorized training partner
See all New Horizons Jordan courses
Are you from New Horizons Jordan ? Claim your course!
Courses you can instantly connect with... Do an online course on CISSP starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or