Welcome to the IT Security Governance Certification Course

What is IT Security Governance?
IT Security Governance is a type of risk management process that can be applied to business operations, identifying critical information and protecting that information from enemies.

Why do I need this certification?
Security Governance is essential for every business, as critical data is created, shared, stored, etc. across departments internally and across industries externally.

What will I learn?
  • Layered security
  • Open source vs. closed source design
  • Why closed source is not a good form of security
  • Fail safe vs. fail secure

Get your IT Security Governance Certification Today: 
With its roots in military missions, IT Security Governance is a type of risk management process that can be applied to business operations, identifying critical information and protecting that information from enemies. Like many of the micro certifications, Security Governance is essential for every business, as critical data is created, shared, stored, etc. across departments internally and across industries externally. It surrounds the day-to-day aspect of providing security through methods such as data backups and network monitoring.

The IT Security Governance Micro certification focuses on short term IT security control mechanisms and how they can be utilized to maximize corporate asset security. Knowledge of the investigations process, the incidence response framework, the change management process, BCP/DR processes, and physical security are essential for success in an operational security role.

One must understand open source vs. closed source design, and why closed is not a good form of security, as well as the difference between fail safe and fail secure. A deep dive into layered security, this exam questions on a variety of security control mechanisms and how to deploy those mechanisms to strike a balanced approach in physical operations security. Likewise, individuals are required to know the general principles of simplicity, separation of privilege and incident reporting. It is recommended to supplement your learning with a review of log management, incident response, and recovery strategies.
Join Cybrary

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel