Course Content

Module 1: Introduction

07:16
1.1 Risk Intro

Module 2: Types of Policy

06:24
2.1 Risk Assessment
08:38
2.2 Risk Analysis
09:57
2.3 Risk Mitigation
04:53
2.4 Governance vs Management
12:58
2.5 Frameworks and Senior Management's Role
08:09
2.6 Policies Procedures Standards and Guidelines
04:37
2.7 Knowledge Transfer
10:28
2.8 Types of Laws
07:35
2.9 Specific Laws

Module 3: Policy Controls

09:50
3.1 Risk Related Concepts (part 1)
20:34
3.2 Risk Related Concepts (part 2)
02:54
3.3 Control Types
01:56
3.4 The Principle of Least Privilege
07:28
3.5 Security Implications of Integrating Systems (part 1)
06:31
3.6 Security Implications of Integrating Systems (part 2)
05:28
3.7 Appropriate Risk Mitigation Strategies
09:07
3.8 Basic Forensic Procedures
07:04
3.9 Incident Response Procedures
09:54
3.10 Importance of Security
12:45
3.11 Importance of Security Awareness and Training
16:05
3.12 Physical Security and Environmental Controls
22:33
3.13 Risk Management Best Practices
14:55
3.14 Goals of Security
00:00
3.15 IT Security Governance

Course Description

What is IT Security Governance? IT Security Governance is a type of risk management process that can be applied to business operations, identifying critical information and protecting that information from enemies. Why do I need this certification? Security Governance is essential for every business, as critical data is created, shared, stored, etc. across departments internally and across industries externally. What will I learn? Layered security Open source vs. closed source design Why closed source is not a good form of security Fail safe vs. fail secure Get your IT Security Governance Certification Today: With its roots in military missions, IT Security Governance is a type of risk management process that can be applied to business operations, identifying critical information and protecting that information from enemies. Like many of the micro certifications, Security Governance is essential for every business, as critical data is created, shared, stored, etc. across departments internally and across industries externally. It surrounds the day-to-day aspect of providing security through methods such as data backups and network monitoring. The IT Security Governance Micro certification focuses on short term IT security control mechanisms and how they can be utilized to maximize corporate asset security. Knowledge of the investigations process, the incidence response framework, the change management process, BCP/DR processes, and physical security are essential for success in an operational security role. One must understand open source vs. closed source design, and why closed is not a good form of security, as well as the difference between fail safe and fail secure. A deep dive into layered security, this exam questions on a variety of security control mechanisms and how to deploy those mechanisms to strike a balanced approach in physical operations security. Likewise, individuals are required to know the general principles of simplicity, separation of privilege and incident reporting. It is recommended to supplement your learning with a review of log management, incident response, and recovery strategies.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor

Provided By

Cybrary Logo

Course Components

On Demand Videos to learn from industry leaders
Assessments to gauge understanding and comprehension

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a IT Security Governance Certificate of Completion