Content-type: text/html Training and Education

Training and Education

Copyright(c), 1995 - Management Analytics and Others - All Rights Reserved


Check all that apply:



Users are trained who to call about, when to call about, and how to recognize incidents.
Users are trained in the use of any tools they will have to use as a part of the incident response process.
Programmers and analysists are trained about typical programming errors and the impacts of errors and ommissions on the organization.
Programmers and analysists are trained on how to design for integrity and availability.
Programmers and analysists are trained on the rules of the road for IT employees.
Managers are trained on how to make prudent protection decisions.
Managers are trained on how to react to incidents and how to evalkuate decisions in these situations.
Managers are trained on how the protection process works, the role that firewalls play and don't play, and how their part of the organization interacts with the firewall and the people who operate it.
Incident response teams are trained on all aspects of information protection.
Adequate measures are made of the effectiveness of training and they show that the training is working as it is supposed to.
With maximum value of