This course provides an in-depth look at risk factor analysis that must be performed in order to design a flexible and comprehensive security plan. Topics include assessing threats, developing countermeasures, protecting information and security designs processes. Auditing practices used to verify compliance with policies and procedures, as well as for building a case for presentation in private and public settings, are also covered.
Given an organization which needs a general security policy, understand what is needed to get a policy implemented and how to gain acceptance for the policy.
Given an organization which needs a general security policy, understand what is needed to create an effective policy.
Given an organization that needs security, be able to appropriately classify the assets that need protecting.
Be able to address personnel security issues in a given organization.
Be able to implement physical and environmental security policies and procedures.
Implement operations security and explain how it impacts information security.
Given an organization requiring security polices, define access control policies for that organization.
Be able to integrate systems development issues into the security plan.
Given a financial institution, be able to address the regulatory requirements for its information security.
Given a health care organization, be able to address the regulatory requirements for its information security.
Given an organization with a critical infrastructure, be able to address the regulatory requirements for its information security.
Given a small business, be able to completely set up security policies for that business.
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.