• No products in the cart.

Course Overview

Corporate governance ensures your team’s work is aligned with business objectives and external requirements. The topics include:

  • developing policies, business cases, and other key components of a security governance program
  • implementing an information security strategy
  • developing a governance framework and integrating that framework into corporate governance practices.

Course Reviews

4.7

4.7
19 ratings
  • 5 stars14
  • 4 stars4
  • 3 stars1
  • 2 stars0
  • 1 stars0
  1. Security Policy

    5

    All basic and very useful information covered. Kudos…very simple and straight to the points.

  2. wonderful

    5

    wonderful! the course is really helpful.

  3. Cousre Revieww

    5

    Nice content and easy to understand

  4. Course Evaluation

    5

    Course is Self Explainable and its easy to understand the Policy Ethics and Behaviour

  5. Security awareness

    5

    these videos are very helpful.

  6. Title

    5

    very helpful and good learning

  7. security policy and risk management

    4

    Which term stems from the documentation related to a completed incident?

    Incident log
    Incident repository
    Lessons learned
    Risk assessment

  8. Good

    4

    Informative and Good Course

  9. nice training on several aspects of information security involved in a IT place.

    5

    nice training on several aspects of information security involved in a IT place.

  10. Great learning

    5

    interesting to learn and easy to access

  11. Useful info

    4

    Useful information regarding security, sensitive data and IT guidelines

  12. Good content

    5

    Good content and interesting.

  13. Informative

    5

    Informative and helping

  14. Security wonderful training course

    5

    The information was great. This session was very useful.

  15. Information Governance

    3

    Short and to the point.

  16. Pretty good overview, but test questions have odd wording

    4

    The term “manipulating users” is a very odd way of phrasing the purpose of a response plan.

  17. Information Governance

    5

    The training and course was very helpful.

  18. Great course

    5

    Easy to follow and understand

  19. Informative Risk managment

    5

    Good to understand the Security and Risk management