Information Security Management Fundamentals for NonTechies

Learn the Fundamentals of Information Security Management for Non-Techies
Information Security Management Fundamentals for NonTechies
File Size :
3.07 GB
Total length :
10h 11m



Alton Hardin | 150,000+ Enrollments Worldwide


Last update




Information Security Management Fundamentals for NonTechies

What you’ll learn

Understand the Fundamentals of Information Security Management
Have a Working Understanding of The Many Aspects of IT Security
Be Prepared for More Advanced Information Security Courses
Better Protect Your Business & I.T. Infrastructure

Information Security Management Fundamentals for NonTechies


A Basic Understanding of Computers
A Basic Understanding of Computer Networks
A Desire to Learn


***Entire Course Overhauled & Improved in Winter 2021***LEARN INFORMATION SECURITY FUNDAMENTALS FROM ONE OF UDEMY’S TOP IT INSTRUCTORSAre you looking to learn the basics of information security management? Are you a business or aspiring IT professional that needs to better understand how cybersecurity works? If so, this is the perfect course for you!In this 9.5-hour course, I’ll show you step-by-step, the fundamentals of information security management, teaching you essential cybersecurity core principles you need to know.If you’re looking to advance or begin your career in Information Technology (IT), this course is a must!WHAT YOU’LL RECEIVE IN THIS COURSE9.5 Hours of Lecture & Live Demonstration Videos14 Section Quizzes & Two Mini-Case ScenariosEdited Closed Caption Subtitles and Video TranscriptsDownloadable Course Videos for Offline Viewing with Udemy Mobile App and PDF Lectures of All Course PowerPoint SlidesWHAT STUDENTS ARE SAYING”Well prepared and presented course! Highly recommend this for anyone who wants to get an entire picture of cybersecurity and how it affects the various domains (from access and asset management to Incident Response). The quiz questions are very interesting too; its scenario-based and gets you to think as an IT admin or manager.”-Sherin”The explanations and course content are really easy to follow, useful and perfect for instant real-world use. This is a great refresher and beginner course on information/cyber security.”-James”I would recommend this course even to experienced IT person as this is the fundamental and in my view cover all of the security. An exceptional well-structured course. After completing this course, I am determined to continue to study/reading on Security for knowledge purposes. This course is definitely going to aid me in my position as Project Manager. Thank so much.”-HarryKEY COURSE TOPICSCore Information Security PrinciplesRisk ManagementAccess ControlSecurity Malware ThreatsNetwork SecuritySecurity Assessments and TestingCryptographyIncident ResponseDisaster Recovery and Business ContinuityPersonnel PoliciesAnd Much MoreOnce you complete this course, you’ll understand the core principles of information security to help you better protect your IT and business infrastructure!SO WHAT ARE YOU WAITING FOR? ENROLL TODAY!PREVIEW OVER 1 HOUR OF THIS COURSE THROUGH MY 20 FREE LECTURES, JUST SCROLL DOWN BELOW AND CLICK THE BLUE PREVIEW BUTTONS.


Section 1: Course Introduction

Lecture 1 Welcome to the Course!

Lecture 2 Why Learn Information Security Management From Me?

Lecture 3 What This Course Is & What It Isn’t

Lecture 4 Course Curriculum Overview

Lecture 5 Course Lecture PDFs

Lecture 6 Familiarizing Yourself with Udemy’s Course Taking Interface

Lecture 7 How to Access Course Subtitles & Transcripts

Lecture 8 Join our Facebook Student Community

Lecture 9 Udemy Mobile App for iOS & Android – Download & Take Course Videos On the Go!

Lecture 10 Student Exercise: Introduce Yourself

Section 2: Getting Started in Information Security

Lecture 11 The Many Areas of Information Security

Lecture 12 The State of Cybersecurity in 2021

Lecture 13 The Most Valuable Beginner IT Security Certifications for 2023

Section 3: Core Information Security Principles

Lecture 14 Section Introduction

Lecture 15 The CIA Triad

Lecture 16 Authentication, Authorization, and Accounting (AAA)

Lecture 17 Defense in Depth

Lecture 18 Least Privilege

Lecture 19 Non-Repudiation

Lecture 20 Implicit Deny

Lecture 21 Legal and Regulatory Issues

Lecture 22 Information Security Governance

Lecture 23 Authentication Basics

Lecture 24 Identify Proofing

Lecture 25 General Password Rules

Section 4: Risk Management

Lecture 26 Section Introduction

Lecture 27 Introduction to Risk Management

Lecture 28 Exploring Risks and Threats

Lecture 29 Quantitative Risk Analysis

Lecture 30 Attack Surface Analysis

Section 5: Asset Management

Lecture 31 Section Introduction

Lecture 32 Identifying and Classifying Assets

Lecture 33 Understanding the Asset Lifecycle

Lecture 34 Data Retention

Lecture 35 Understanding Data States

Section 6: Access Control

Lecture 36 Section Introduction

Lecture 37 Access Control

Lecture 38 Physical and Logical Access Controls

Lecture 39 Access Control Models

Lecture 40 Student Activity: Analyzing Your Organization’s Access Control

Section 7: Security Malware Threats

Lecture 41 Section Introduction

Lecture 42 Buffer Overflows

Lecture 43 Viruses and Polymorphic Viruses

Lecture 44 Worms

Lecture 45 Trojan Horses

Lecture 46 Logic Bombs

Lecture 47 Spyware and Adware

Lecture 48 Ransomware

Lecture 49 Rootkits

Lecture 50 Zero Day Attacks

Lecture 51 Protecting Against Malware

Section 8: Additional Threats & Vulnerabilities

Lecture 52 Section Introduction

Lecture 53 Social Engineering

Lecture 54 Social Engineering Phone Impersonation Scenarios Overview

Lecture 55 Social Engineering Phone Call Impersonation Example #1

Lecture 56 Social Engineering Phone Call Impersonation Example #2

Lecture 57 Social Engineering Phone Call Impersonation Example #3

Lecture 58 Social Engineering Phone Impersonation Scenarios Discussion

Lecture 59 Email Spam, Spoofing, Phishing, and Pharming

Lecture 60 Protocol Spoofing

Lecture 61 Common Attack Methods

Section 9: Network Segmentation & Isolation

Lecture 62 Section Introduction

Lecture 63 Introduction to Network Isolation

Lecture 64 Demilitarized Zone (DMZ)

Lecture 65 Basic Network Zones

Lecture 66 Virtual LANs (VLANs)

Lecture 67 Routers

Lecture 68 Network Address Translation (NAT)

Lecture 69 Access Control Lists (ACLs)

Section 10: Network Security

Lecture 70 Section Introduction

Lecture 71 Virtual Private Networks

Lecture 72 Firewalls

Lecture 73 Web Proxy Servers

Lecture 74 Honeypots

Lecture 75 Intrusion Detection & Prevention Systems

Section 11: Wireless Networking Security

Lecture 76 Section Introduction

Lecture 77 Wireless Encryption Standards

Lecture 78 Wireless Equivalent Privacy (WEP)

Lecture 79 Wi-Fi Protected Access (WPA)

Lecture 80 Wi-Fi Protected Access 2 (WPA2)

Lecture 81 Wi-Fi Protected Access 3 (WPA3)

Lecture 82 WPA Enterprise vs. Personal Mode

Lecture 83 Wireless Network Vulnerabilities & Security

Lecture 84 Common Wireless Security Threats

Section 12: Security Assessments and Testing

Lecture 85 Section Introduction

Lecture 86 Vulnerability Assessments

Lecture 87 Penetration Testing

Lecture 88 Interview with a Professional Ethical Hacker Blog Article

Lecture 89 Security Assessments

Section 13: Security Assessment Tools

Lecture 90 Section Introduction

Lecture 91 Wireshark Network Sniffing

Lecture 92 Nmap Zenmap Network Scanner

Lecture 93 Tenable Nessus Vulnerability Scanner

Lecture 94 Ethical Hacking for Beginners (YouTube Series)

Section 14: Hardening End-User Systems and Servers

Lecture 95 Section Introduction

Lecture 96 Hardening End-User Systems

Lecture 97 Hardening Servers

Lecture 98 Patch and Change Management

Lecture 99 Separation of Services

Section 15: Introduction to Cryptography

Lecture 100 Section Introduction

Lecture 101 Introduction to Cryptography

Lecture 102 Symmetric Encryption

Lecture 103 Asymmetric Encryption

Lecture 104 Hashing Algorithms

Lecture 105 Digital Certificates and Certificate Authorities (Updated 2021 Lecture)

Lecture 106 Email Encryption Use Cases

Lecture 107 Windows Encrypted File System Use Case

Lecture 108 Revisiting VPN

Lecture 109 Software versus Hardware-Based Encryption

Section 16: Incident Response, Disaster Recovery & Business Continuity

Lecture 110 Section Introduction

Lecture 111 Understanding Incidents and Disasters

Lecture 112 Incident Response

Lecture 113 Disaster Recovery and Business Continuity

Section 17: Application Development Security

Lecture 114 Section Introduction

Lecture 115 Importance of IT Security in Application Development

Lecture 116 Software Development Lifecycle (SDLC)

Lecture 117 Static and Dynamic Testing

Lecture 118 Authorization to Operate (ATO)

Section 18: Personnel Policies

Lecture 119 Section Introduction

Lecture 120 Acceptable Use

Lecture 121 Code of Ethics

Lecture 122 Mandatory Vacations

Lecture 123 Separation of Duties

Lecture 124 Job Rotation

Lecture 125 Education and Training

Section 19: Class Mini-Case Scenarios

Lecture 126 Mini-Case Scenarios Overview

Lecture 127 Class Mini-Case Scenario #1: Small Tax Accounting Office

Lecture 128 Class Mini-Case Scenario #2: Growing Marketing Business

Section 20: Congratulations!

Lecture 129 Congratulations!

Lecture 130 How to Download Your Udemy Course Certificate of Completion

Lecture 131 Your Bonus Lecture

Non-Techies Wanting to Learn About Information Security,Business & IT Managers Needing a Working Knowledge of Information Security,Aspiring & Inexperienced IT Professionals,This Course Is NOT for Seasoned & Experienced IT & Cyber Security Professionals

Course Information:

Udemy | English | 10h 11m | 3.07 GB
Created by: Alton Hardin | 150,000+ Enrollments Worldwide

You Can See More Courses in the IT & Software >> Greetings from

New Courses

Scroll to Top