Information Security Management Fundamentals for Non-Techies – Alton Hardin
Original price was: $49.00.$15.00Current price is: $15.00.
Information Security Management Fundamentals for Non-Techies – Alton Hardin Download. Are you a non-techie interested in learning about information securit…
Salepage link: At HERE. Archive: http://archive.is/wip/VbdqQ
Hours of Content: 7
INFORMATION SECURITY DEMYSTIFIED FOR NON-TECHIES
Are you a non-techie interested in learning about information security? Are you a business or aspiring IT professional that needs to better understand how cyber security works? Then you have come to the right place!
This course will teach you the fundamentals of information security and essential cyber security core principles, designed for Non-Techies!
WHAT YOU’LL LEARN IN THIS COURSE:
- Why We Need Information Security
- Information Security Core Principles
- Fundamental Access Control Concepts
- Basic Network Zones
- Fundamental Network Security Devices
- Hardening Systems
- Fundamentals Security Threats
- Disaster Recovery Basics
- I.T. Personnel Policies
- And Much More…
COURSE MINI-CASE SCENARIOS
You’ll also learn by the “case method” that is commonly used in both law and business school. I will be creating and uploaded course mini-cases, where I walk through and complete the entire case for you while you are watching. This will hopefully help you to think about the course and all of it’s topics holistically and synergistic-ally.
Once you complete this course, you’ll understand the core principles of information security to help you better protect your I.T. and business infrastructure!
What are the requirements?
- A Basic Understanding of Computers
- A Desire to Learn
What am I going to get from this course?
- Understand the Fundamentals of Information Security Management
- Have a Working Understanding of The Many Aspects of IT Security
- Be Prepared for More Advanced Information Security Courses
- Better Protect Your Business & I.T. Infrastructure
What is the target audience?
- Non-Techies Wanting to Learn About Information Security
- Business & IT Managers Needing a Working Knowledge of Information Security
- Aspiring & Inexperienced IT Professionals
- This Course Is NOT for Seasoned & Experienced IT & Cyber Security Professionals
Course Curriculum
Course Introduction
- 1. Welcome to the Course (4:51)
- 2. What This Course Is & What It Isn’t (4:45)
- 3. How to Get The Most Out Of This Course (1:51)
- 4. Instructor Introduction (2:25)
- 5. Discussion Board Activity- Introduce Yourself (0:38)
Getting Started In Information Security
- 6. The Many Areas of Information Security (8:27)
- 7. Beginning Point Certifications & Degrees (13:05)
The Need for Information Security
- 9. The Need for Information Security (12:19)
- 10. Optional Student Activity- Vimeo & Youtube Videos to Watch (12:01)
- 11. Links: Videos to Watch
Information Security Principles
- 13. Section Introduction (0:55)
- 14. The CIA Triad (7:57)
- 15. More Concepts (6:41)
- 16. Authentication Basics (12:42)
- 17. Identify Proofing (3:44)
- 18. General Password Rules (8:27)
- 19. Designing an Authentication Strategy with Microsoft Technet (11:11)
Access Control
- 20. Section Introduction (0:47)
- 21. Access Control (14:31)
- 22. Physical and Logical Access Controls (17:01)
- 23. Defense in Depth (6:04)
- 24. Access Control Models (13:30)
- 25. Student Activity- Analyzing Your Organization’s Access Control (2:29)
Basic Network Zones
- 26. Basic Network Zones (0:52)
- 27. Internet (1:53)
- 28. DMZ (3:27)
- 29. Extranet (3:22)
- 30. Intranet (3:26)
- 31. Mini-Case Scenario- Secure Network Design (11:57)
Network Security Devices
- 32. Section Introduction (1:31)
- 33. Firewalls (5:53)
- 34. Proxy Servers (7:03)
- 35. Intrusion Detection & Prevention Systems (7:40)
- 36. Virtual Private Networks (8:24)
Hardening Systems
- 37. Hardening a System (10:15)
- 38. Patch and Change Management (5:31)
Network Threats & Vulnerabilities
- 39. Transmission Media Security Concerns (12:33)
- 40. Wireless Networking Security Concerns (18:47)
- 41. Network-Based Threats and Attacks (19:56)
- 42. Student Activity: Locking Down Your Home’s Wi-Fi
Network Scanning Tools
- 43. SuperScan Port Scanner (8:24)
- 44. Nmap Zenmap Network Scanner (6:44)
- 45. Tenable Nessus Vulnerability Scanner (10:56)
Security Malware Threats
- 46. Introduction to Malware (0:35)
- 47. Viruses (4:29)
- 48. Worms (2:32)
- 49. Trojan Horses (2:14)
- 50. Logic Bombs (2:40)
- 51. Spyware and Adware (2:59)
- 52. Protecting Against Malware (4:49)
- 53. Social Engineering Attacks (8:04)
- 54. Why Social Engineering Succeeds (3:57)
Introduction to Crytography
- 55. Introduction to Crytography (9:25)
- 56. Symmetric Encryption (3:42)
- 57. Asymmetric Encryption (4:26)
- 58. Hashing Algorithms (4:45)
Disaster Recovery
- 59. Disaster Recovery (3:25)
- 60. Disaster Planning and Testing (4:24)
- 61. Disaster Recovery and Redunancy (8:33)
- 62. The Disaster Recovery Planning Process (11:37)
Personnel Policies
- 63. Section Introduction (2:02)
- 64. Acceptable Use (2:49)
- 65. Code of Ethics (3:27)
- 66. Mandatory Vacations (2:39)
- 67. Separation of Duties (3:40)
- 68. Job Rotation (2:06)
- 69. Education and Training (4:00)
Class Mini-Case Scenarios
- 70. Mini-Case Scenario #1- Small Tax Accounting Office (19:01)
Congratulations!
- 72. Congratulations (2:05)
- 73. What’s Next (1:07)
Here's an overview of the prominent keywords and a list of famous authors:
Business and Sales: Explore business strategies, sales skills, entrepreneurship, and brand-building from authors like Joe Wicks, Jillian Michaels, and Tony Horton.
Sports and Fitness: Enhance athleticism, improve health and fitness with guidance from experts like Shaun T, Kayla Itsines, and Yoga with Adriene.
Personal Development: Develop communication skills, time management, creative thinking, and enhance self-awareness from authors like Gretchen Rubin, Simon Sinek, and Marie Kondo.
Technology and Coding: Learn about artificial intelligence, data analytics, programming, and blockchain technology from thought leaders like Neil deGrasse Tyson, Amy Cuddy, and Malcolm Gladwell.
Lifestyle and Wellness: Discover courses on holistic health, yoga, and healthy living from authors like Elizabeth Gilbert, Bill Nye, and Tracy Anderson.
Art and Creativity: Explore the world of art, creativity, and painting with guidance from renowned artists like Bob Ross and others.
All the courses on WSOlib are led by top authors and experts in their respective fields. Rest assured that the knowledge and skills you acquire are reliable and highly applicable.
Specification: Information Security Management Fundamentals for Non-Techies – Alton Hardin
|
User Reviews
Only logged in customers who have purchased this product may leave a review.
Original price was: $49.00.$15.00Current price is: $15.00.
There are no reviews yet.