Certified Information Security Manager CISM, Part 1 of 4: Governance

with expert Kenneth Mayer

The goal of this domain is to give an overview of what it takes in planning, development, implementation and management to meet objectives in alignment with business goals. Topics covered include: Information Security concepts, metrics, resources, constraints and a plan to implement them. This course is part of a series covering the ISACA Certified Information Security Manager (CISM).


Intermediate | 3h 48m | March 12, 2018

Security

Course Outline


Kenneth Mayer

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.




Explore Our Blogs, Courses and Webinars