About This Course

This course is an entry-level Information Security course that is designed for everyone who utilizes computer technology in their daily life. Whether you use technology for business or personal reasons, this course will provide you with the basic knowledge you need to assign the appropriate level of value to your information, become aware of the risks and threats that could compromise your information, and take some practical steps to protect your valuable information assets.

What you’ll learn:

This course will provide the basic knowledge you need to assign the appropriate level of value to your information and become aware of the risks and threats that could compromise your information.

Who this course is for:

This course is designed for IT professionals.

Our Promise to You

By the end of this course, you will have learned about information technology security threats and risks that could compromise your information and also learn how to protect this valuable information.

30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.

Get started today and learn more about the information technology security threats and risks.

Course Curriculum

Section 1 - Introduction
Setting The Stage 00:00:00
Course Flow Overview 00:00:00
Module Content Overview 00:00:00
Scenario Overview 00:00:00
Section 2 - Understanding Basic Information Concepts
Defining Information 00:00:00
Understanding The Value Of DIKW 00:00:00
How Information Systems Add Value 00:00:00
Managing Information Lifecycle 00:00:00
Exercise Your Knowledge Of DIKW 00:00:00
Section 3 - Determining The Value Of Information Assets
Information As A Business Asset 00:00:00
Information As A Production Factor And A Product 00:00:00
Using Process To Manage Assets 00:00:00
Section 4 - Leveraging Operational Process Types to Manage Assets
Leveraging Operational Process Types To Manage Assets 00:00:00
Creating Value Stream 00:00:00
Section 5 - Achieving Information Reliability Through Security
Using The CIA Principles Of Information Security 00:00:00
The Attributes Of Information Reliability 00:00:00
Developing An Asset Classification Criteria 00:00:00
Classifying Assets To Apply Proper Level Of Security 00:00:00
Section 6 - Preparing To Manage Threats And Risks
Defining Threats, Vulnerabilities, And Risks 00:00:00
Risk Management 00:00:00
Risk Treatment 00:00:00
Incident And Disasters 00:00:00
Section 7 - Categorizing Threats, Identifying Damage, And Calculating Loss
Module Overview 00:00:00
Categorizing Threats 00:00:00
Non-human Threats 00:00:00
Identifying Damage 00:00:00
Calculating Loss 00:00:00
Section 8 - Analyzing Risk To Help Drive Information Security Decisions
Reviewing Risk As A Concept 00:00:00
Risk Analysis Process 00:00:00
Risk Assessment Process 00:00:00
Risk Management Process 00:00:00
Types Of Risk Analysis 00:00:00
Section 9 - Using Risk Mitigation Strategies To Minimize The Impact Of Risk
Identifying Risk Strategy 00:00:00
Selecting Risk Treatment 00:00:00
Understanding Security Controls 00:00:00
Selecting Risk Measures 00:00:00
Template Design © VibeThemes. All rights reserved.

Setup Menus in Admin Panel