Leadership and business management Course
5 hours, 15 minutes
Syllabus
Applying security principles into product development and project management: Analyzing the relationship between project time, scope and cost for the security program
Video - 00:04:00
Applying security principles into product development and project management: Identifying and applying the appropriate project management methodology
Video - 00:04:00
Applying security principles into product development and project management: Incorporating security into the project life cycle
Video - 00:05:00
Managing the security program: Integrating security into the Human Resource (HR) processes
Video - 00:06:00
Managing the security program: Identifying communications issues including bottlenecks and barriers
Video - 00:03:00
Managing the security program: Resolving conflicts between security and the organization
Video - 00:03:00
Managing the security program: Understanding and building cross-functional relationships
Video - 00:09:00
Managing the security program: Determining and managing security team accountability
Video - 00:04:00
Managing the security program: Defining roles and responsibilities
Video - 00:10:00
Preparing, obtaining and administering the security program budget: Manage and report on the financial responsibilities of security
Video - 00:06:00
Preparing, obtaining and administering the security program budget: Adjust the budget based on changes in risk and/or threats
Video - 00:07:00
Preparing, obtaining and administering the security program budget: Prepare and gain approval for the annual budget
Video - 00:06:00
Defining, measuring and reporting the security metrics: Using metrics as the driver for program development and operations
Video - 00:05:00
Defining, measuring and reporting the security metrics: Correlating the KPIs to the organization's risk posture
Video - 00:04:00
Defining, measuring and reporting the security metrics: Identifying Key Performance Indicators (KPIs)
Video - 00:03:00
Managing the security awareness and training program: Monitoring and reporting on the effectiveness of the training program
Video - 00:04:00
Managing the security awareness and training program: Identifying the security awareness training needs and implemented targeted training
Video - 00:06:00
Managing the security awareness and training program: Promoting the security awareness program to the organization
Video - 00:07:00
Managing the security requirements in third-party contracts and agreements: Monitoring and enforcing compliance with contractual agreements
Video - 00:04:00
Managing the security requirements in third-party contracts and agreements: Ensuring that the appropriate regulatory compliance statements and requirements are included
Video - 00:08:00
Managing the security requirements in third-party contracts and agreements: Managing the impact of organizational change
Video - 00:06:00
Governing managed services
Video - 00:04:00
Managing the security requirements in third-party contracts and agreements: Evaluating the service management agreements
Video - 00:08:00
Managing the security requirements in third-party contracts and agreements: Ensuring the security policy framework is periodically reviewed
Video - 00:09:00
Defining and maintaining the security policy framework: Developing standards, procedures, baselines and guidelines
Video - 00:09:00
Defining and maintaining the security policy framework: Advocate for and obtain the organization's support for the security policies
Video - 00:09:00
Defining and maintaining the security policy framework: Establishing internal security policies
Video - 00:08:00
Defining and maintaining the security policy framework: Determining the data classification and protection requirements
Video - 00:08:00
Defining and maintaining the security policy framework: Determining any applicable external standards
Video - 00:05:00
Defining and implementing the information security strategies: Recommend the security architecture and engineering theories, concepts and methodology
Video - 00:08:00
Defining and implementing the information security strategies: Review the security strategies and maintain them
Video - 00:07:00
Defining and implementing the information security strategies: Manage the Implementation of the security strategies
Video - 00:04:00
Defining and implementing the information security strategies: Evaluate the organization's capacity and capability to implement the security strategies
Video - 00:06:00
Defining and implementing the information security strategies: Identify the security requirements from the business initiatives
Video - 00:05:00
Aligning the information security program with the organization's governance structure: Advocate and obtain support for the security initiatives from your organization
Video - 00:07:00
Aligning the information security program with the organization's governance structure: Confirm and validate the sources and boundaries of authorization
Video - 00:08:00
Aligning the information security program with the organization's governance structure: Confirm and validate the roles of key stakeholders
Video - 00:09:00
Aligning the information security program with the organization's governance structure: Identify and navigate your organization's governance structure
Video - 00:09:00
Establish security's role in the organizational culture, vision and mission: Define the relationship between the organization's culture and information security
Video - 00:07:00
Establish security's role in the organizational culture, vision and mission: Define information security's relationship with the overall business processes
Video - 00:06:00
Establish security's role in the organizational culture, vision and mission: Align the information security program with the organization's goals, objectives and values
Video - 00:04:00
Establish security's role in the organizational culture, vision and mission: Define the information security program's vision and mission
Video - 00:09:00
Introduction to leadership and business management
Video - 00:08:00
ISSMP Domain 1 Practice Exam
Assessment - 86 questions
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps