-
Course
- Security
Scope of the Information System for CGRC
Risk and Security programs require the determination of the boundaries of an Information System. This course will teach you the skills needed to determine the scope of the Information System needed for the Certified in Governance, Risk and Compliance exam.
What you'll learn
One of the hardest challenges in risk and security management is to determine the scope of the risk management initiative. In this course, Scope of the Information System for CGRC™, you’ll learn to determine the boundary for the Authorization of an Information System. The determination of boundaries is an essential step in Systems Authorization. First, you’ll explore system scoping. Next, you’ll discover systems architecture. Finally, you’ll learn how to categorize the Information System according to the data and services it supports. When you’re finished with this course, you’ll have the skills and knowledge of Information Systems scoping needed for the Certified in Governance, Risk and Compliance examination.
Table of contents
About the author
Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.
More Courses by Kevin