About This Course
Who this course is for:
- This course is designed for IT professionals
What you’ll learn:
- This course will provide the basic knowledge you need to assign the appropriate level of value to your information and become aware of the risks and threats that could compromise your information.
This course is an entry-level Information Security course that is designed for everyone who utilizes computer technology in their daily life. Whether you use technology for business or personal reasons, this course will provide you with the basic knowledge you need to assign the appropriate level of value to your information, become aware of the risks and threats that could compromise your information, and take some practical steps to protect your valuable information assets.
Our Promise to You
By the end of this course, you will have learned about information technology security threats and risks that could compromise your information and also learn how to protect this valuable information.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about the information technology security threats and risks.
Course Curriculum
1h 17m
Section 1 - Introduction | |||
Setting The Stage | 00:00:00 | ||
Course Flow Overview | 00:00:00 | ||
Module Content Overview | 00:00:00 | ||
Scenario Overview | 00:00:00 | ||
Section 2 - Understanding Basic Information Concepts | |||
Defining Information | 00:00:00 | ||
Understanding The Value Of DIKW | 00:00:00 | ||
How Information Systems Add Value | 00:00:00 | ||
Managing Information Lifecycle | 00:00:00 | ||
Exercise Your Knowledge Of DIKW | 00:00:00 | ||
Section 3 - Determining The Value Of Information Assets | |||
Information As A Business Asset | 00:00:00 | ||
Information As A Production Factor And A Product | 00:00:00 | ||
Using Process To Manage Assets | 00:00:00 | ||
Section 4 - Leveraging Operational Process Types to Manage Assets | |||
Leveraging Operational Process Types To Manage Assets | 00:00:00 | ||
Creating Value Stream | 00:00:00 | ||
Section 5 - Achieving Information Reliability Through Security | |||
Using The CIA Principles Of Information Security | 00:00:00 | ||
The Attributes Of Information Reliability | 00:00:00 | ||
Developing An Asset Classification Criteria | 00:00:00 | ||
Classifying Assets To Apply Proper Level Of Security | 00:00:00 | ||
Section 6 - Preparing To Manage Threats And Risks | |||
Defining Threats, Vulnerabilities, And Risks | 00:00:00 | ||
Risk Management | 00:00:00 | ||
Risk Treatment | 00:00:00 | ||
Incident And Disasters | 00:00:00 | ||
Section 7 - Categorizing Threats, Identifying Damage, And Calculating Loss | |||
Module Overview | 00:00:00 | ||
Categorizing Threats | 00:00:00 | ||
Non-human Threats | 00:00:00 | ||
Identifying Damage | 00:00:00 | ||
Calculating Loss | 00:00:00 | ||
Section 8 - Analyzing Risk To Help Drive Information Security Decisions | |||
Reviewing Risk As A Concept | 00:00:00 | ||
Risk Analysis Process | 00:00:00 | ||
Risk Assessment Process | 00:00:00 | ||
Risk Management Process | 00:00:00 | ||
Types Of Risk Analysis | 00:00:00 | ||
Section 9 - Using Risk Mitigation Strategies To Minimize The Impact Of Risk | |||
Identifying Risk Strategy | 00:00:00 | ||
Selecting Risk Treatment | 00:00:00 | ||
Understanding Security Controls | 00:00:00 | ||
Selecting Risk Measures | 00:00:00 |
Excellent
Excellent tutorial. Easy to digest materials