Please ensure Javascript is enabled for purposes of website accessibility

About This Course

Information security is everyone’s responsibility. Everyone in an organization plays a part in establishing good security practices. However, in your personal life, securing your personal information is completely up to you. Nobody else is going to do it for you.

Therefore, whether you are concerned about protecting your personal information or your business information, a solid awareness of information security incident concepts is an essential place to start.

In this course, you’ll learn about getting prepared for the inevitability of having to manage information security incidents.

First, you’ll learn about building the information security organization, and establishing security policies and a code of conduct concepts. Next, you’ll learn about enabling information security with people, processes, and technology. Finally, you’ll learn about improving security using a formal audit program. After watching this course, you’ll have a solid foundation of the concepts and knowledge needed to properly manage information security incidents.

What you’ll learn:

  • By the time you complete this course, you will be well prepared to participate as an active member of any information security team.

Requirements and prerequisites:

  • Before beginning the course, you should be familiar with the basic concepts that are outlined in the Information Security Threats and Risks ISO/IEC 27002 course.

Who this course is for:

  • This course is designed for business and IT professionals.

Our Promise to You

By the end of this course, you will have learned about information security.

30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.

Get started today and learn more about information security.

Course Curriculum


Section 1 - Understanding Your Executives
Cloud Computing History 00:00:00
IT-As-A-Service – Cloud Service Capabilities 00:00:00
Key Cloud Computing Characteristics 00:00:00
Cloud Computing Definitions 00:00:00
Why Use Cloud Computing 00:00:00
Why You Shouldn’t Use Cloud Computing 00:00:00
Cloud Data Security 00:00:00
Transparency Reports Database 00:00:00
Section 2 - Explaining Cloud Computing
Cloud Deployment Models 00:00:00
Cloud Service Models 00:00:00
NIST Cloud Reference Model And Key Ecosystem Roles 00:00:00
Cloud Computing Team Functions 00:00:00
Cloud Cross-cutting Aspects 00:00:00
Section 3 - Using Cloud Computing Components
Technology Services 00:00:00
Notional Cloud Service Provide 00:00:00
Section 4 - Recognizing Cloud Computing Threats
Design Principles Of Secure Cloud Computing 00:00:00
Risk Management 00:00:00
Stride Threat Model And Top Threats 00:00:00
Treacherous 00:00:00
Cloud Attack Vectors And Security Considerations By Service Model 00:00:00
Template Design © VibeThemes. All rights reserved.

Setup Menus in Admin Panel



Enter your Name and Email for a chance to win Lifetime Access to all courses!
Promotion ends today.



Enter your Name and Email for a chance to win Lifetime Access to all courses!
Promotion ends today.

Success! You are now entered to win lifetime access to all courses. Winners are selected at the beginning of each month. 

P.S. Look out for our exclusive sales only shown to students on our email list!