Information Security Policy and Management

Learn about information security policies, security governance, and contingency planning in this two-week course from Coventry University.

Duration

2 weeks

Weekly study

5 hours

100% online

How it works

Included in an ExpertTrack

Course 3 of 5

Get full ExpertTrack access

Find out more

Established

1992

Location

Coventry

Discover the influence of policy, plan and procedure on digital security

Information Security policies are designed to help individuals within an organisation practice behaviours which reduce the risk of a breach to digital security.

On this course, you’ll explore the key terms and critical concepts of information security, enabling you to successfully navigate and even create company data security policies at work.

Understand security policies

You’ll look at the reasons organisations create Information Security Policies, which may include detecting and forestalling the compromise of information security such as misuse of data, networks, computer systems, and applications

You’ll consider the five goals of security governance: * Strategic alignment * Risk management * Resource management * Performance measurement * Value delivery

You’ll also look at the Information Security Management System (ISMS), a systematic approach to managing sensitive company information so that it remains secure.

Discover access control

Study the key principles of access control, including control architecture models, password security issues, and biometrics (a way of identifying and authenticating individuals through the use of unique biological characteristics).

You’ll unpack contingency planning (CP), the process of positioning an organisation to prepare for, detect, react to, and recover from man-made or natural threats to information security assets.

Examine incident response strategies

Finally, you’ll explore incident response; the methodology an organisation uses to respond to and manage a cyber-attack.

You’ll look at the goals of an incident response strategy, the different stages and the various teams involved. You’ll conclude by considering how to develop an effective incident response planning policy.

  • Week 1

    Information Security Planning and Governance

    • Information Security Policy (ISP)

      Welcome to Week 1 of this course on digital security policy and management.

    • Information System Governance (ISG)

      Governance refers to a set of responsibilities and practices exercised by the board and executive management.

    • Information Security Management Systems (ISMS)

      An ISMS is a systematic approach to managing sensitive company information so that it remains secure.

    • Access control

      Access control is a technique by which systems determine if and how to allow a user into a trusted area of the organisation.

    • Summary and reflection

      Reflect on what you have learned and see what's coming up next.

  • Week 2

    Contingency Planning and Incident Response

    • What is contingency planning?

      Contingency planning (CP) is a process of positioning an organisation to prepare for, detect, react to and recover from man-made or natural threats to information security assets.

    • Contingency planning

      Contingency planning is achieved by exploring the differences among its various components and examining the role of each that comes into play.

    • Incident response

      Incident response is the methodology an organisation uses to respond to and manage a cyber-attack.

    • Summary and reflection

      Reflect on what you have learned and see what's coming up next.

More courses you might like

Learners who joined this course have also enjoyed these courses.

©2025  onlincourse.com. All rights reserved