This course is designed for those interested to learn the basics of information security and have a solid foundation of the concepts and knowledge needed to properly manage information security incidents. Read more.
Mclearn team was started in 2018 with a vision to empower people and businesses worldwide with great learning - any time, any place and on any device.
Access all courses in our library for only $9/month with All Access Pass
Get Started with All Access PassBuy Only This CourseAbout This Course
Who this course is for:
- This course is designed for business and IT professionals.
What you’ll learn:
- By the time you complete this course, you will be well prepared to participate as an active member of any information security team.
Requirements:
- Before beginning the course, you should be familiar with the basic concepts that are outlined in the Information Security Threats and Risks ISO/IEC 27002 course.
Information security is everyone’s responsibility. Everyone in an organization plays a part in establishing good security practices. However, in your personal life, securing your personal information is completely up to you. Nobody else is going to do it for you.
Therefore, whether you are concerned about protecting your personal information or your business information, a solid awareness of information security incident concepts is an essential place to start.
In this course, you’ll learn about getting prepared for the inevitability of having to manage information security incidents.
First, you’ll learn about building the information security organization, and establishing security policies and a code of conduct concepts. Next, you’ll learn about enabling information security with people, processes, and technology. Finally, you’ll learn about improving security using a formal audit program. After watching this course, you’ll have a solid foundation of the concepts and knowledge needed to properly manage information security incidents.
Our Promise to You
By the end of this course, you will have learned about information security.
10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about information security.
Course Curriculum
Section 1 - Introduction | |||
Preparing For Success | 00:00:00 | ||
Section 2 - Building The Information Security Organization | |||
An Intro To Planning An Information Security Organization | 00:00:00 | ||
Establishing Key Security Roles | 00:00:00 | ||
Establishing An Effective Security Practice | 00:00:00 | ||
Establishing Centralized Governance | 00:00:00 | ||
Reviewing The Security Organization | 00:00:00 | ||
Section 3 - Establishing Security Policies And A Code Of Conduct | |||
Establishing The Security Policy | 00:00:00 | ||
Establishing Security Prior To And During Employment | 00:00:00 | ||
Establishing A Disciplinary Process | 00:00:00 | ||
Section 4 - Enabling Information Security With People, Process, And Technology | |||
Establishing The Information Security Management System | 00:00:00 | ||
Information Security Management System Roles | 00:00:00 | ||
The Deming Cycle | 00:00:00 | ||
Section 5 - Using the Security Incident Cycle to Improve Security Response | |||
Establishing An Incident Reporting And Response | 00:00:00 | ||
Reporting An Incident Or Weakness | 00:00:00 | ||
Security Incident Examples | 00:00:00 | ||
Using The Incident Response Cycle | 00:00:00 | ||
Section 6 - Logging And Managing Security Events And Incidents | |||
Leveraging Incident Management And The Help Desk | 00:00:00 | ||
The Value Of Establishing Incident Management Procedures | 00:00:00 | ||
Establishing Incident Categories And Priorities | 00:00:00 | ||
Implementing An Incident Escalation Process | 00:00:00 | ||
Section 7 - Complying With Regulatory, Legislative, And Organization Mandates | |||
Managing Statutory, Regulatory, And Contractual Obligations | 00:00:00 | ||
Securing Intellectual Property | 00:00:00 | ||
Protecting Organizational Records | 00:00:00 | ||
Protecting Private Information | 00:00:00 | ||
Section 8 - Improving Security With A Formal Audit Program | |||
Audit Benefits | 00:00:00 | ||
Establishing The Audit Scope | 00:00:00 | ||
Securing The Audit | 00:00:00 |
About This Course
Who this course is for:
- This course is designed for business and IT professionals.
What you’ll learn:
- By the time you complete this course, you will be well prepared to participate as an active member of any information security team.
Requirements:
- Before beginning the course, you should be familiar with the basic concepts that are outlined in the Information Security Threats and Risks ISO/IEC 27002 course.
Information security is everyone’s responsibility. Everyone in an organization plays a part in establishing good security practices. However, in your personal life, securing your personal information is completely up to you. Nobody else is going to do it for you.
Therefore, whether you are concerned about protecting your personal information or your business information, a solid awareness of information security incident concepts is an essential place to start.
In this course, you’ll learn about getting prepared for the inevitability of having to manage information security incidents.
First, you’ll learn about building the information security organization, and establishing security policies and a code of conduct concepts. Next, you’ll learn about enabling information security with people, processes, and technology. Finally, you’ll learn about improving security using a formal audit program. After watching this course, you’ll have a solid foundation of the concepts and knowledge needed to properly manage information security incidents.
Our Promise to You
By the end of this course, you will have learned about information security.
10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about information security.
Course Curriculum
Section 1 - Introduction | |||
Preparing For Success | 00:00:00 | ||
Section 2 - Building The Information Security Organization | |||
An Intro To Planning An Information Security Organization | 00:00:00 | ||
Establishing Key Security Roles | 00:00:00 | ||
Establishing An Effective Security Practice | 00:00:00 | ||
Establishing Centralized Governance | 00:00:00 | ||
Reviewing The Security Organization | 00:00:00 | ||
Section 3 - Establishing Security Policies And A Code Of Conduct | |||
Establishing The Security Policy | 00:00:00 | ||
Establishing Security Prior To And During Employment | 00:00:00 | ||
Establishing A Disciplinary Process | 00:00:00 | ||
Section 4 - Enabling Information Security With People, Process, And Technology | |||
Establishing The Information Security Management System | 00:00:00 | ||
Information Security Management System Roles | 00:00:00 | ||
The Deming Cycle | 00:00:00 | ||
Section 5 - Using the Security Incident Cycle to Improve Security Response | |||
Establishing An Incident Reporting And Response | 00:00:00 | ||
Reporting An Incident Or Weakness | 00:00:00 | ||
Security Incident Examples | 00:00:00 | ||
Using The Incident Response Cycle | 00:00:00 | ||
Section 6 - Logging And Managing Security Events And Incidents | |||
Leveraging Incident Management And The Help Desk | 00:00:00 | ||
The Value Of Establishing Incident Management Procedures | 00:00:00 | ||
Establishing Incident Categories And Priorities | 00:00:00 | ||
Implementing An Incident Escalation Process | 00:00:00 | ||
Section 7 - Complying With Regulatory, Legislative, And Organization Mandates | |||
Managing Statutory, Regulatory, And Contractual Obligations | 00:00:00 | ||
Securing Intellectual Property | 00:00:00 | ||
Protecting Organizational Records | 00:00:00 | ||
Protecting Private Information | 00:00:00 | ||
Section 8 - Improving Security With A Formal Audit Program | |||
Audit Benefits | 00:00:00 | ||
Establishing The Audit Scope | 00:00:00 | ||
Securing The Audit | 00:00:00 |