Understand information security governance strategies and responsibilities
Review information risk management and compliance
Discover information security program development and management fundamentals
Learn how to use and apply information security incident management
Information Security Governance
Information Risk Management
Information Security Program Development & Management
Information Security Incident Management
75
No
None
None
No
While there are no prerequisites to take this course, the Information Systems Audit and Control Association (ISACA) recommends at least five years of work experience in information security. The work experience must be gained within the 10-year period preceding the application date for certification.
Hardware requirements:
This course can be taken on either a PC, a Mac or a Chromebook.
Software requirements:
PC: Windows 10 or later
Mac: macOS 12 or later
Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
Virtual Labs (included with course)
Microsoft Word Online
Adobe Acrobat Reader
Software must be installed and fully operational before the course begins.
Other:
Email capabilities and access to a personal email account
Instructional material requirements:
The instructional materials required for this course are included in enrollment: Study guide, practice exams and the following textbook, which will be shipped to you approximately seven to 10 business days after enrollment: "Principles of Information Security, 7th Edition"
N/A
90% attendance
N/A
This course is intended for anyone with an interest in becoming a Certified Information Security Manager.
N/A
N/A
To be notified when this course becomes available, please use
Wake Tech's Notify Me service.
Requisites: None
To view information on this course and additional non-degree course offerings, visit the Workforce Continuing Education Catalog