Certified Information Security Manager CISM, Part 1 of 4: Governance
with expert Kenneth Mayer
The goal of this domain is to give an overview of what it takes in planning, development, implementation and management to meet objectives in alignment with business goals. Topics covered include: Information Security concepts, metrics, resources, constraints and a plan to implement them. This course is part of a series covering the ISACA Certified Information Security Manager (CISM).
Intermediate | 3h 48m | March 12, 2018
Course OutlineKenneth Mayer
As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.