ISO-IEC 27002: Information Technology Security Threats And Risks

No Rating(0)
See all reviews

This course is designed for those interested to learn the basic knowledge you need to assign the appropriate level of value to your information. Also, for those who want to become aware of the risks and threats that could compromise your information and learn the practical steps to protect your valuable information assets.

Watch Free For 30 Days

start free access

-or-

buy single class $199
  • On Demand Video Lessons
  • Course Certificate
  • 24/7 Support

About This CourseBeginner

This course is an entry-level Information Security course that is designed for everyone who utilizes computer technology in their daily life. Whether you use technology for business or personal reasons, this course will provide you with the basic knowledge you need to assign the appropriate level of value to your information, become aware of the risks and threats that could compromise your information, and take some practical steps to protect your valuable information assets.

What you’ll learn:

This course will provide the basic knowledge you need to assign the appropriate level of value to your information and become aware of the risks and threats that could compromise your information.

Who this course is for:

This course is designed for IT professionals.

Our Promise to You

By the end of this course, you will have learned about information technology security threats and risks that could compromise your information and also learn how to protect this valuable information.

30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.

Get started today and learn more about the information technology security threats and risks.

Course Curriculum

Course Sections

Setting The Stage

Course Flow Overview

Module Content Overview

Scenario Overview

Defining Information

Understanding The Value Of DIKW

How Information Systems Add Value

Managing Information Lifecycle

Exercise Your Knowledge Of DIKW

Information As A Business Asset

Information As A Production Factor And A Product

Using Process To Manage Assets

Leveraging Operational Process Types To Manage Assets

Creating Value Stream

Using The CIA Principles Of Information Security

The Attributes Of Information Reliability

Developing An Asset Classification Criteria

Classifying Assets To Apply Proper Level Of Security

Defining Threats, Vulnerabilities, And Risks

Risk Management

Risk Treatment

Incident And Disasters

Module Overview

Categorizing Threats

Non-human Threats

Identifying Damage

Calculating Loss

Reviewing Risk As A Concept

Risk Analysis Process

Risk Assessment Process

Risk Management Process

Types Of Risk Analysis

Identifying Risk Strategy

Selecting Risk Treatment

Understanding Security Controls

Selecting Risk Measures

Reviews

No Reviews found for this course.