Information Security Management Fundamentals for Non-Techies – Alton Hardin
Original price was: $49.00.$15.00Current price is: $15.00.
Information Security Management Fundamentals for Non-Techies – Alton Hardin Download. Are you a non-techie interested in learning about information securit…
Unlock your potential with the Information Security Management Fundamentals for Non-Techies - Alton Hardin course for only Original price was: $49.00.$15.00Current price is: $15.00. at WSOLib.com! Discover our vast library of over 60,000 downloadable digital courses across Internet Marketing. Get expert-guided, self-paced learning and save over 80% compared to retail prices. Transform your skills today!
Salepage link: At HERE. Archive: http://archive.is/wip/VbdqQ
Hours of Content: 7
INFORMATION SECURITY DEMYSTIFIED FOR NON-TECHIES
Are you a non-techie interested in learning about information security? Are you a business or aspiring IT professional that needs to better understand how cyber security works? Then you have come to the right place!
This course will teach you the fundamentals of information security and essential cyber security core principles, designed for Non-Techies!
WHAT YOU’LL LEARN IN THIS COURSE:
- Why We Need Information Security
- Information Security Core Principles
- Fundamental Access Control Concepts
- Basic Network Zones
- Fundamental Network Security Devices
- Hardening Systems
- Fundamentals Security Threats
- Disaster Recovery Basics
- I.T. Personnel Policies
- And Much More…
COURSE MINI-CASE SCENARIOS
You’ll also learn by the “case method” that is commonly used in both law and business school. I will be creating and uploaded course mini-cases, where I walk through and complete the entire case for you while you are watching. This will hopefully help you to think about the course and all of it’s topics holistically and synergistic-ally.
Once you complete this course, you’ll understand the core principles of information security to help you better protect your I.T. and business infrastructure!
What are the requirements?
- A Basic Understanding of Computers
- A Desire to Learn
What am I going to get from this course?
- Understand the Fundamentals of Information Security Management
- Have a Working Understanding of The Many Aspects of IT Security
- Be Prepared for More Advanced Information Security Courses
- Better Protect Your Business & I.T. Infrastructure
What is the target audience?
- Non-Techies Wanting to Learn About Information Security
- Business & IT Managers Needing a Working Knowledge of Information Security
- Aspiring & Inexperienced IT Professionals
- This Course Is NOT for Seasoned & Experienced IT & Cyber Security Professionals
Course Curriculum
Course Introduction
- 1. Welcome to the Course (4:51)
- 2. What This Course Is & What It Isn’t (4:45)
- 3. How to Get The Most Out Of This Course (1:51)
- 4. Instructor Introduction (2:25)
- 5. Discussion Board Activity- Introduce Yourself (0:38)
Getting Started In Information Security
- 6. The Many Areas of Information Security (8:27)
- 7. Beginning Point Certifications & Degrees (13:05)
The Need for Information Security
- 9. The Need for Information Security (12:19)
- 10. Optional Student Activity- Vimeo & Youtube Videos to Watch (12:01)
- 11. Links: Videos to Watch
Information Security Principles
- 13. Section Introduction (0:55)
- 14. The CIA Triad (7:57)
- 15. More Concepts (6:41)
- 16. Authentication Basics (12:42)
- 17. Identify Proofing (3:44)
- 18. General Password Rules (8:27)
- 19. Designing an Authentication Strategy with Microsoft Technet (11:11)
Access Control
- 20. Section Introduction (0:47)
- 21. Access Control (14:31)
- 22. Physical and Logical Access Controls (17:01)
- 23. Defense in Depth (6:04)
- 24. Access Control Models (13:30)
- 25. Student Activity- Analyzing Your Organization’s Access Control (2:29)
Basic Network Zones
- 26. Basic Network Zones (0:52)
- 27. Internet (1:53)
- 28. DMZ (3:27)
- 29. Extranet (3:22)
- 30. Intranet (3:26)
- 31. Mini-Case Scenario- Secure Network Design (11:57)
Network Security Devices
- 32. Section Introduction (1:31)
- 33. Firewalls (5:53)
- 34. Proxy Servers (7:03)
- 35. Intrusion Detection & Prevention Systems (7:40)
- 36. Virtual Private Networks (8:24)
Hardening Systems
- 37. Hardening a System (10:15)
- 38. Patch and Change Management (5:31)
Network Threats & Vulnerabilities
- 39. Transmission Media Security Concerns (12:33)
- 40. Wireless Networking Security Concerns (18:47)
- 41. Network-Based Threats and Attacks (19:56)
- 42. Student Activity: Locking Down Your Home’s Wi-Fi
Network Scanning Tools
- 43. SuperScan Port Scanner (8:24)
- 44. Nmap Zenmap Network Scanner (6:44)
- 45. Tenable Nessus Vulnerability Scanner (10:56)
Security Malware Threats
- 46. Introduction to Malware (0:35)
- 47. Viruses (4:29)
- 48. Worms (2:32)
- 49. Trojan Horses (2:14)
- 50. Logic Bombs (2:40)
- 51. Spyware and Adware (2:59)
- 52. Protecting Against Malware (4:49)
- 53. Social Engineering Attacks (8:04)
- 54. Why Social Engineering Succeeds (3:57)
Introduction to Crytography
- 55. Introduction to Crytography (9:25)
- 56. Symmetric Encryption (3:42)
- 57. Asymmetric Encryption (4:26)
- 58. Hashing Algorithms (4:45)
Disaster Recovery
- 59. Disaster Recovery (3:25)
- 60. Disaster Planning and Testing (4:24)
- 61. Disaster Recovery and Redunancy (8:33)
- 62. The Disaster Recovery Planning Process (11:37)
Personnel Policies
- 63. Section Introduction (2:02)
- 64. Acceptable Use (2:49)
- 65. Code of Ethics (3:27)
- 66. Mandatory Vacations (2:39)
- 67. Separation of Duties (3:40)
- 68. Job Rotation (2:06)
- 69. Education and Training (4:00)
Class Mini-Case Scenarios
- 70. Mini-Case Scenario #1- Small Tax Accounting Office (19:01)
Congratulations!
- 72. Congratulations (2:05)
- 73. What’s Next (1:07)
Secure your future with the Information Security Management Fundamentals for Non-Techies - Alton Hardin course at WSOLib.com! Gain lifetime access to expertly curated content, empowering your career and personal development.
- Lifetime Access: Enjoy unlimited access to your digital courses.
- Huge Savings: Prices are consistently up to 80% lower than original sales pages.
- Secure Transactions: Shop with confidence using our trusted payment methods.
- Actionable Knowledge: Acquire real-world skills from diverse topics.
- Instant Delivery: Start learning immediately after purchase.
- Device Flexibility: Access your courses on desktop, mobile, or tablet.
Begin your learning journey with WSOLib.com!
Specification: Information Security Management Fundamentals for Non-Techies – Alton Hardin
|
User Reviews
Only logged in customers who have purchased this product may leave a review.

Original price was: $49.00.$15.00Current price is: $15.00.
There are no reviews yet.