Introduction to Information Security Management

by Dallas Baptist University Claim Listing

The primary emphasis of this course is to study the scope, impact, and magnitude of information technology security on business organizational structure; the use of information systems for developing corporate security strategies, both domestic and international

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Dallas Baptist University Logo

img Duration

Please Enquire

Course Details

The primary emphasis of this course is to study the scope, impact, and magnitude of information technology security on business organizational structure; the use of information systems for developing corporate security strategies, both domestic and international; and the growing impact of information systems security on global economic, legal, political, regulatory, and social structures. It will also serve as an introduction to IT Security for Managers concentration, paving the way for information security – risk management, strategy, and incidence response.

  • Dallas Branch

    3000 Mountain Creek Parkway, Dallas

Check out more ISMS (Information Security Management System) courses in USA

NYIM Training Logo

Cybersecurity & Networks (Intro)

Find out how computer communication and network security works in this beginner-friendly course. Develop an understanding of network models, security protocols, and how Linux and Python play into cybersecurity.

by NYIM Training [Claim Listing ]
Moore Norman Technology Center MNTC Logo

CompTIA Security+

CompTIA Security+ is a certification prep course. This course validates the baseline skills necessary to perform core security functions and pursue an IT security career. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecur...

by Moore Norman Technology Center MNTC [Claim Listing ]
Global Knowledge Logo

Check Point Certified Security Administration (CCSA)

In this course, you will learn the basic concepts and skills necessary to configure Check Point Next Generation Firewalls. During this course, you will configure a security policy and learn about managing and monitoring a secure network, upgrading and configuring a security gateway, and implementin...

by Global Knowledge [Claim Listing ]
Boson Logo

CCSP Certification

The Certified Cloud Security Professional (CCSP®) validates that you have the technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by the cybersecurity experts at (ISC)2®.

by Boson [Claim Listing ]
UC San Diego Extended Studies Logo

Governance of Enterprise IT

Cybersecurity governance refers to an organizations policies, procedures, and safeguards implemented by the IT Governance team on how to effectively detect, circumvent, and respond to cyber-attacks.

by UC San Diego Extended Studies [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy