e-Learning

Learn at your own pace with anytime, anywhere training.

Classroom Schedule

There are no classes currently scheduled

* Prices Inclusive of taxes

Virtual Schedule

There are no classes currently scheduled

* Prices Inclusive of taxes

Private / Corporate Training

Tell us a little about yourself:

Course Description

The intent of security is to manage risks and the extent of the loss after an incident. This simplistic definition does not do justice to the enormous scope of organizational security and the complexity of the processes required. The investment in security processes, automation and professionals has been significant for most organizations and continues to consume budgets on an ongoing basis, from physical security to the myriad of types of information security. Yet, organizational security is routinely rated poorly, especially with the rapidly growing threats to information security. At the same time, the consequences from these failures escalate as laws are put in place to protect individual privacy, create reporting requirements and demand accurate inventory information on which to build security processes. The responsibility for securing the organization and its data is a priority for most organizations and should be part of every employee’s responsibility.

Objectives

Please refer course overview.

Audience

N.A

Prerequisites

N.A

Content

Day 1- Course Outline

  • Introduction to IAITAM
  • Student Introductions
  • ITAM Code of Ethics
  • Description of a CAMSE
  • Overview of the ITAM Program
  • IAITAM Key Process Areas
  • Communication and Education
  • Policy and Procedures
  • ITAM Processes:
  • Request, Approval, and Purchasing
  • Receiving, Acceptance, and Inventory
  • Use and Inventory
  • Disposal Management
  • Documentation Management
  • Vendor Management
  • Financial Management
  • Program Management
  • Compliance Management
  • Legislation Management
  • Project Management

 

Day 2- Course Outline

  • Scope of Security and IT Asset Management
  • Communication and Education for Information Security
  • Policies for Information Security
  • ITAM Program Assessment for Security
  • General Security Program and Plan
  • Acquisition Management
  • Asset Identification Management and Inventory
  • Disposal Management
  • Updating the ITAM Program Roadmap
  • Security Emphasis by ITAM Role
  • Evaluating the ITAM Contribution to Security
  • IT Security Role Topics of Conversation
  • Laws and Standards Governing Information Security
  • Questions and Review Before Exam

 


Avail top-notch training on Anglepoint Software Asset Management courses from the best IT training institute in bangalore, Global Knowledge Technologies.