ISO-IEC 27002: Information Technology Security Threats And Risks
This course is designed for those interested to learn the basic knowledge you need to assign the appropriate level of value to your information. Also, for those who want to become aware of the risks and threats that could compromise your information and learn the practical steps to protect your valuable information assets.
About This CourseBeginner
This course is an entry-level Information Security course that is designed for everyone who utilizes computer technology in their daily life. Whether you use technology for business or personal reasons, this course will provide you with the basic knowledge you need to assign the appropriate level of value to your information, become aware of the risks and threats that could compromise your information, and take some practical steps to protect your valuable information assets.
What you’ll learn:
This course will provide the basic knowledge you need to assign the appropriate level of value to your information and become aware of the risks and threats that could compromise your information.
Who this course is for:
This course is designed for IT professionals.
Our Promise to You
By the end of this course, you will have learned about information technology security threats and risks that could compromise your information and also learn how to protect this valuable information.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about the information technology security threats and risks.
Section 1 - Introduction
Setting The Stage
Course Flow Overview
Module Content Overview
Section 2 - Understanding Basic Information Concepts
Understanding The Value Of DIKW
How Information Systems Add Value
Managing Information Lifecycle
Exercise Your Knowledge Of DIKW
Section 3 - Determining The Value Of Information Assets
Information As A Business Asset
Information As A Production Factor And A Product
Using Process To Manage Assets
Section 4 - Leveraging Operational Process Types to Manage Assets
Leveraging Operational Process Types To Manage Assets
Creating Value Stream
Section 5 - Achieving Information Reliability Through Security
Using The CIA Principles Of Information Security
The Attributes Of Information Reliability
Developing An Asset Classification Criteria
Classifying Assets To Apply Proper Level Of Security
Section 6 - Preparing To Manage Threats And Risks
Defining Threats, Vulnerabilities, And Risks
Incident And Disasters
Section 7 - Categorizing Threats, Identifying Damage, And Calculating Loss
Section 8 - Analyzing Risk To Help Drive Information Security Decisions
Reviewing Risk As A Concept
Risk Analysis Process
Risk Assessment Process
Risk Management Process
Types Of Risk Analysis
Section 9 - Using Risk Mitigation Strategies To Minimize The Impact Of Risk
Identifying Risk Strategy
Selecting Risk Treatment
Understanding Security Controls
Selecting Risk Measures
No Reviews found for this course.