Information Security Management Fundamentals for NonTechies
What you’ll learn
Understand the Fundamentals of Information Security Management
Have a Working Understanding of The Many Aspects of IT Security
Be Prepared for More Advanced Information Security Courses
Better Protect Your Business & I.T. Infrastructure
Requirements
A Basic Understanding of Computers
A Basic Understanding of Computer Networks
A Desire to Learn
Description
***Entire Course Overhauled & Improved in Winter 2021***LEARN INFORMATION SECURITY FUNDAMENTALS FROM ONE OF UDEMY’S TOP IT INSTRUCTORSAre you looking to learn the basics of information security management? Are you a business or aspiring IT professional that needs to better understand how cybersecurity works? If so, this is the perfect course for you!In this 9.5-hour course, I’ll show you step-by-step, the fundamentals of information security management, teaching you essential cybersecurity core principles you need to know.If you’re looking to advance or begin your career in Information Technology (IT), this course is a must!WHAT YOU’LL RECEIVE IN THIS COURSE9.5 Hours of Lecture & Live Demonstration Videos14 Section Quizzes & Two Mini-Case ScenariosEdited Closed Caption Subtitles and Video TranscriptsDownloadable Course Videos for Offline Viewing with Udemy Mobile App and PDF Lectures of All Course PowerPoint SlidesWHAT STUDENTS ARE SAYING”Well prepared and presented course! Highly recommend this for anyone who wants to get an entire picture of cybersecurity and how it affects the various domains (from access and asset management to Incident Response). The quiz questions are very interesting too; its scenario-based and gets you to think as an IT admin or manager.”-Sherin”The explanations and course content are really easy to follow, useful and perfect for instant real-world use. This is a great refresher and beginner course on information/cyber security.”-James”I would recommend this course even to experienced IT person as this is the fundamental and in my view cover all of the security. An exceptional well-structured course. After completing this course, I am determined to continue to study/reading on Security for knowledge purposes. This course is definitely going to aid me in my position as Project Manager. Thank so much.”-HarryKEY COURSE TOPICSCore Information Security PrinciplesRisk ManagementAccess ControlSecurity Malware ThreatsNetwork SecuritySecurity Assessments and TestingCryptographyIncident ResponseDisaster Recovery and Business ContinuityPersonnel PoliciesAnd Much MoreOnce you complete this course, you’ll understand the core principles of information security to help you better protect your IT and business infrastructure!SO WHAT ARE YOU WAITING FOR? ENROLL TODAY!PREVIEW OVER 1 HOUR OF THIS COURSE THROUGH MY 20 FREE LECTURES, JUST SCROLL DOWN BELOW AND CLICK THE BLUE PREVIEW BUTTONS.
Overview
Section 1: Course Introduction
Lecture 1 Welcome to the Course!
Lecture 2 Why Learn Information Security Management From Me?
Lecture 3 What This Course Is & What It Isn’t
Lecture 4 Course Curriculum Overview
Lecture 5 Course Lecture PDFs
Lecture 6 Familiarizing Yourself with Udemy’s Course Taking Interface
Lecture 7 How to Access Course Subtitles & Transcripts
Lecture 8 Join our Facebook Student Community
Lecture 9 Udemy Mobile App for iOS & Android – Download & Take Course Videos On the Go!
Lecture 10 Student Exercise: Introduce Yourself
Section 2: Getting Started in Information Security
Lecture 11 The Many Areas of Information Security
Lecture 12 The State of Cybersecurity in 2021
Lecture 13 The Most Valuable Beginner IT Security Certifications for 2023
Section 3: Core Information Security Principles
Lecture 14 Section Introduction
Lecture 15 The CIA Triad
Lecture 16 Authentication, Authorization, and Accounting (AAA)
Lecture 17 Defense in Depth
Lecture 18 Least Privilege
Lecture 19 Non-Repudiation
Lecture 20 Implicit Deny
Lecture 21 Legal and Regulatory Issues
Lecture 22 Information Security Governance
Lecture 23 Authentication Basics
Lecture 24 Identify Proofing
Lecture 25 General Password Rules
Section 4: Risk Management
Lecture 26 Section Introduction
Lecture 27 Introduction to Risk Management
Lecture 28 Exploring Risks and Threats
Lecture 29 Quantitative Risk Analysis
Lecture 30 Attack Surface Analysis
Section 5: Asset Management
Lecture 31 Section Introduction
Lecture 32 Identifying and Classifying Assets
Lecture 33 Understanding the Asset Lifecycle
Lecture 34 Data Retention
Lecture 35 Understanding Data States
Section 6: Access Control
Lecture 36 Section Introduction
Lecture 37 Access Control
Lecture 38 Physical and Logical Access Controls
Lecture 39 Access Control Models
Lecture 40 Student Activity: Analyzing Your Organization’s Access Control
Section 7: Security Malware Threats
Lecture 41 Section Introduction
Lecture 42 Buffer Overflows
Lecture 43 Viruses and Polymorphic Viruses
Lecture 44 Worms
Lecture 45 Trojan Horses
Lecture 46 Logic Bombs
Lecture 47 Spyware and Adware
Lecture 48 Ransomware
Lecture 49 Rootkits
Lecture 50 Zero Day Attacks
Lecture 51 Protecting Against Malware
Section 8: Additional Threats & Vulnerabilities
Lecture 52 Section Introduction
Lecture 53 Social Engineering
Lecture 54 Social Engineering Phone Impersonation Scenarios Overview
Lecture 55 Social Engineering Phone Call Impersonation Example #1
Lecture 56 Social Engineering Phone Call Impersonation Example #2
Lecture 57 Social Engineering Phone Call Impersonation Example #3
Lecture 58 Social Engineering Phone Impersonation Scenarios Discussion
Lecture 59 Email Spam, Spoofing, Phishing, and Pharming
Lecture 60 Protocol Spoofing
Lecture 61 Common Attack Methods
Section 9: Network Segmentation & Isolation
Lecture 62 Section Introduction
Lecture 63 Introduction to Network Isolation
Lecture 64 Demilitarized Zone (DMZ)
Lecture 65 Basic Network Zones
Lecture 66 Virtual LANs (VLANs)
Lecture 67 Routers
Lecture 68 Network Address Translation (NAT)
Lecture 69 Access Control Lists (ACLs)
Section 10: Network Security
Lecture 70 Section Introduction
Lecture 71 Virtual Private Networks
Lecture 72 Firewalls
Lecture 73 Web Proxy Servers
Lecture 74 Honeypots
Lecture 75 Intrusion Detection & Prevention Systems
Section 11: Wireless Networking Security
Lecture 76 Section Introduction
Lecture 77 Wireless Encryption Standards
Lecture 78 Wireless Equivalent Privacy (WEP)
Lecture 79 Wi-Fi Protected Access (WPA)
Lecture 80 Wi-Fi Protected Access 2 (WPA2)
Lecture 81 Wi-Fi Protected Access 3 (WPA3)
Lecture 82 WPA Enterprise vs. Personal Mode
Lecture 83 Wireless Network Vulnerabilities & Security
Lecture 84 Common Wireless Security Threats
Section 12: Security Assessments and Testing
Lecture 85 Section Introduction
Lecture 86 Vulnerability Assessments
Lecture 87 Penetration Testing
Lecture 88 Interview with a Professional Ethical Hacker Blog Article
Lecture 89 Security Assessments
Section 13: Security Assessment Tools
Lecture 90 Section Introduction
Lecture 91 Wireshark Network Sniffing
Lecture 92 Nmap Zenmap Network Scanner
Lecture 93 Tenable Nessus Vulnerability Scanner
Lecture 94 Ethical Hacking for Beginners (YouTube Series)
Section 14: Hardening End-User Systems and Servers
Lecture 95 Section Introduction
Lecture 96 Hardening End-User Systems
Lecture 97 Hardening Servers
Lecture 98 Patch and Change Management
Lecture 99 Separation of Services
Section 15: Introduction to Cryptography
Lecture 100 Section Introduction
Lecture 101 Introduction to Cryptography
Lecture 102 Symmetric Encryption
Lecture 103 Asymmetric Encryption
Lecture 104 Hashing Algorithms
Lecture 105 Digital Certificates and Certificate Authorities (Updated 2021 Lecture)
Lecture 106 Email Encryption Use Cases
Lecture 107 Windows Encrypted File System Use Case
Lecture 108 Revisiting VPN
Lecture 109 Software versus Hardware-Based Encryption
Section 16: Incident Response, Disaster Recovery & Business Continuity
Lecture 110 Section Introduction
Lecture 111 Understanding Incidents and Disasters
Lecture 112 Incident Response
Lecture 113 Disaster Recovery and Business Continuity
Section 17: Application Development Security
Lecture 114 Section Introduction
Lecture 115 Importance of IT Security in Application Development
Lecture 116 Software Development Lifecycle (SDLC)
Lecture 117 Static and Dynamic Testing
Lecture 118 Authorization to Operate (ATO)
Section 18: Personnel Policies
Lecture 119 Section Introduction
Lecture 120 Acceptable Use
Lecture 121 Code of Ethics
Lecture 122 Mandatory Vacations
Lecture 123 Separation of Duties
Lecture 124 Job Rotation
Lecture 125 Education and Training
Section 19: Class Mini-Case Scenarios
Lecture 126 Mini-Case Scenarios Overview
Lecture 127 Class Mini-Case Scenario #1: Small Tax Accounting Office
Lecture 128 Class Mini-Case Scenario #2: Growing Marketing Business
Section 20: Congratulations!
Lecture 129 Congratulations!
Lecture 130 How to Download Your Udemy Course Certificate of Completion
Lecture 131 Your Bonus Lecture
Non-Techies Wanting to Learn About Information Security,Business & IT Managers Needing a Working Knowledge of Information Security,Aspiring & Inexperienced IT Professionals,This Course Is NOT for Seasoned & Experienced IT & Cyber Security Professionals
Course Information:
Udemy | English | 10h 11m | 3.07 GB
Created by: Alton Hardin | 150,000+ Enrollments Worldwide
You Can See More Courses in the IT & Software >> Greetings from CourseDown.com