Blueprint for Information Security

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
Contact
Angela Ayers
Distance Learning and Professional Education
Contact Angela Ayers
404-385-3525
Summaries

Summary Sentence: Blueprint for Information Security

Full Summary: This one day course will provide an understanding of the threat to information resources, how to assess current risk levels, and the process to manage risk. You will learn the key elements of how to build and implement an effective information protection

The headlines continue to tell of the risk to digital information resources: "New Virus!", "Denial of Service Attack!", Financial Data Stolen!" and now "Data Resources Destroyed!" What can you do to manage the risk to your organization's critical data assets? Are you ready to meet your obligation to your stakeholders to protect their interests?

About The Course

This one day course will provide an understanding of the threat to information resources, how to assess current risk levels, and the process to manage risk. You will learn the key elements of how to build and implement an effective information protection program.

Who Should Attend

Individuals at all levels who are charged with protecting digital data resources and want to learn more about their responsibilities and options.

Prerequisites

A basic knowledge of business information systems (operating systems, networks, and databases) will be helpful to gain the maximum benefit from this program but is not mandatory.

Course Objectives

This course is an effective stand-alone overview for those who seek a broad perspective of information security. It also will provide a solid foundation for those who want to pursue further study on the details of building and implementing an information security environment or secure professional certification in this discipline.

You will learn:
The nature of the treat to information resources How to assess the risk to your organization The elements of the process needed to manage this risk including:

Policy
Planning
Implementation

Fundamentals of information contingency planning including:

Incident response and business continuity plans.

Related Links

Additional Information

In Campus Calendar
No
Groups

Professional Education

Invited Audience
No audiences were selected.
Categories
Career/Professional development
Keywords
methods, user requirements
Status
  • Created By: Eric Huffman
  • Workflow Status: Published
  • Created On: Jul 4, 2006 - 8:00pm
  • Last Updated: Oct 7, 2016 - 9:48pm