Compliance and Operational Security Scenarios (DCO02)
This course contains a discussion of the role of security governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. This course also features a number of fictional scenarios based on compliance and operational security to allow you to practice the concepts learned in the material. This course requires some basic understanding of IT concepts.
Estimated length: 5 hrs
Access Time: 90 days
Our online courses allow you to invest in your career and personal interests anytime and anywhere. Courses are either stand-alone or may belong to a certificate. Please see the certificate section for more information. Access time to the course is listed above. If you require longer, you can request an extension; however, please note that doing so will incur additional fees. To request an extension, please contact the Continuing Education department at email@example.com, or 780-539-2975.
You may request a refund up to 5 days from the purchase date. The registration fee will only be refunded if less than 10% of the course has been completed. Completion percentage can be viewed on the Course Progress page from within the course.