Certified Information Security Manager CISM, Part 3 of 4: Security Program Development

with expert Kenneth Mayer

This course covers how to plan, design, and implement an Information Security policy and to coordinate a set of activities, project and initiatives to implement the Information Security strategy. This course is part of a series covering the ISACA Certified Information Security Manager (CISM).


Intermediate | 4h 5m | March 12, 2018

Security

Course Outline


Kenneth Mayer

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.




Explore Our Blogs, Courses and Webinars