IT Security Governance

Cybrary
MicroCourse

IT Security Governance is a type of risk management process that can be applied to business operations, identifying critical information and protecting that information from enemies

Time
3 hours 47 minutes
Difficulty
Beginner
CEU/CPE
3
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

MicroCourse Description

What is IT Security Governance? IT Security Governance is a type of risk management process that can be applied to business operations, identifying critical information and protecting that information from enemies. Why do I need this certification? Security Governance is essential for every business, as critical data is created, shared, stored, etc. across departments internally and across industries externally. What will I learn? Layered security Open source vs. closed source design Why closed source is not a good form of security Fail safe vs. fail secure Get your IT Security Governance Certification Today: With its roots in military missions, IT Security Governance is a type of risk management process that can be applied to business operations, identifying critical information and protecting that information from enemies. Like many of the micro certifications, Security Governance is essential for every business, as critical data is created, shared, stored, etc. across departments internally and across industries externally. It surrounds the day-to-day aspect of providing security through methods such as data backups and network monitoring. The IT Security Governance Micro certification focuses on short term IT security control mechanisms and how they can be utilized to maximize corporate asset security. Knowledge of the investigations process, the incidence response framework, the change management process, BCP/DR processes, and physical security are essential for success in an operational security role. One must understand open source vs. closed source design, and why closed is not a good form of security, as well as the difference between fail safe and fail secure. A deep dive into layered security, this exam questions on a variety of security control mechanisms and how to deploy those mechanisms to strike a balanced approach in physical operations security. Likewise, individuals are required to know the general principles of simplicity, separation of privilege and incident reporting. It is recommended to supplement your learning with a review of log management, incident response, and recovery strategies.

Instructed By
Kelly Handerhan
Kelly Handerhan
Senior Instructor
Provider
Cybrary
Course Components
On Demand Videos to learn from industry leaders
Assessments to gauge understanding and comprehension
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a IT Security Governance Certificate of Completion