|Information Systems Certification and Accreditation Professional (ISCAP) Online Training Series|
Membership Benefits include Free Unlimited Access to All Project Management, Business Skills, IT Service Management, IT Networking and Cyber Security Online Training Series and more. Become a Member Today!
Training Series Overview
This series covers everything you need to know about becoming an Information Systems Certification and Accreditation Professional. Students will learn about the risk management framework, software development life cycle, categorizing information systems, selecting security controls, implementing security controls, assessing security controls, authorizing information systems, and monitoring security controls.
Career Path: Professional roles include, but are not limited to Security Consultants, Security Auditors, System Administrators, and Chief Security Officers.
Series Taught By:
This certifications verifies that you have the skills needed for the practice of certifying, reviewing and accrediting the security of information systems. Individuals who are responsible for creating and implementing the processes used to evaluate risk and institute security baselines and requirements are likely to gain the most from this certification. This will be essential in making sure that the security of the information systems outweighs the potential risks to an organization from any threats. This certification is designed to provide complete guide to establishing a certified and accredited information system in any organization.
Certification Exam Details:
Does this training qualify for college credits?
Available CEUs for Course Series Completion: 6
Access Training Courses Below
Click any of the titles below to launch your videos:
Topic: Introduction to the Risk Management Framework
Topic: The Software Development Life Cycle
Topic: Categorize Information System
Topic: Select Security Controls
Topic: Implement Security Controls
Topic: Assess Security Controls
Topic: Authorize Information System
Topic: Monitor Security Controls