Hours of Content: 7
INFORMATION SECURITY DEMYSTIFIED FOR NON-TECHIES
Are you a non-techie interested in learning about information security? Are you a business or aspiring IT professional that needs to better understand how cyber security works? Then you have come to the right place!
This course will teach you the fundamentals of information security and essential cyber security core principles, designed for Non-Techies!
WHAT YOU'LL LEARN IN THIS COURSE:
- Why We Need Information Security
- Information Security Core Principles
- Fundamental Access Control Concepts
- Basic Network Zones
- Fundamental Network Security Devices
- Hardening Systems
- Fundamentals Security Threats
- Disaster Recovery Basics
- I.T. Personnel Policies
- And Much More…
COURSE MINI-CASE SCENARIOS
You'll also learn by the "case method" that is commonly used in both law and business school. I will be creating and uploaded course mini-cases, where I walk through and complete the entire case for you while you are watching. This will hopefully help you to think about the course and all of it's topics holistically and synergistic-ally.
Once you complete this course, you'll understand the core principles of information security to help you better protect your I.T. and business infrastructure!
What are the requirements?
- A Basic Understanding of Computers
- A Desire to Learn
What am I going to get from this course?
- Understand the Fundamentals of Information Security Management
- Have a Working Understanding of The Many Aspects of IT Security
- Be Prepared for More Advanced Information Security Courses
- Better Protect Your Business & I.T. Infrastructure
What is the target audience?
- Non-Techies Wanting to Learn About Information Security
- Business & IT Managers Needing a Working Knowledge of Information Security
- Aspiring & Inexperienced IT Professionals
- This Course Is NOT for Seasoned & Experienced IT & Cyber Security Professionals
Get Information Security Management Fundamentals for Non-Techies – Alton Hardin, Only Price $29
Course Curriculum
Course Introduction
- 1. Welcome to the Course (4:51)
- 2. What This Course Is & What It Isn't (4:45)
- 3. How to Get The Most Out Of This Course (1:51)
- 4. Instructor Introduction (2:25)
- 5. Discussion Board Activity- Introduce Yourself (0:38)
Getting Started In Information Security
- 6. The Many Areas of Information Security (8:27)
- 7. Beginning Point Certifications & Degrees (13:05)
The Need for Information Security
- 9. The Need for Information Security (12:19)
- 10. Optional Student Activity- Vimeo & Youtube Videos to Watch (12:01)
- 11. Links: Videos to Watch
Information Security Principles
- 13. Section Introduction (0:55)
- 14. The CIA Triad (7:57)
- 15. More Concepts (6:41)
- 16. Authentication Basics (12:42)
- 17. Identify Proofing (3:44)
- 18. General Password Rules (8:27)
- 19. Designing an Authentication Strategy with Microsoft Technet (11:11)
Access Control
- 20. Section Introduction (0:47)
- 21. Access Control (14:31)
- 22. Physical and Logical Access Controls (17:01)
- 23. Defense in Depth (6:04)
- 24. Access Control Models (13:30)
- 25. Student Activity- Analyzing Your Organization's Access Control (2:29)
Basic Network Zones
- 26. Basic Network Zones (0:52)
- 27. Internet (1:53)
- 28. DMZ (3:27)
- 29. Extranet (3:22)
- 30. Intranet (3:26)
- 31. Mini-Case Scenario- Secure Network Design (11:57)
Network Security Devices
- 32. Section Introduction (1:31)
- 33. Firewalls (5:53)
- 34. Proxy Servers (7:03)
- 35. Intrusion Detection & Prevention Systems (7:40)
- 36. Virtual Private Networks (8:24)
Hardening Systems
- 37. Hardening a System (10:15)
- 38. Patch and Change Management (5:31)
Network Threats & Vulnerabilities
- 39. Transmission Media Security Concerns (12:33)
- 40. Wireless Networking Security Concerns (18:47)
- 41. Network-Based Threats and Attacks (19:56)
- 42. Student Activity: Locking Down Your Home's Wi-Fi
Get Information Security Management Fundamentals for Non-Techies – Alton Hardin, Only Price $29
Network Scanning Tools
- 43. SuperScan Port Scanner (8:24)
- 44. Nmap Zenmap Network Scanner (6:44)
- 45. Tenable Nessus Vulnerability Scanner (10:56)
Security Malware Threats
- 46. Introduction to Malware (0:35)
- 47. Viruses (4:29)
- 48. Worms (2:32)
- 49. Trojan Horses (2:14)
- 50. Logic Bombs (2:40)
- 51. Spyware and Adware (2:59)
- 52. Protecting Against Malware (4:49)
- 53. Social Engineering Attacks (8:04)
- 54. Why Social Engineering Succeeds (3:57)
Introduction to Crytography
- 55. Introduction to Crytography (9:25)
- 56. Symmetric Encryption (3:42)
- 57. Asymmetric Encryption (4:26)
- 58. Hashing Algorithms (4:45)
Disaster Recovery
- 59. Disaster Recovery (3:25)
- 60. Disaster Planning and Testing (4:24)
- 61. Disaster Recovery and Redunancy (8:33)
- 62. The Disaster Recovery Planning Process (11:37)
Personnel Policies
- 63. Section Introduction (2:02)
- 64. Acceptable Use (2:49)
- 65. Code of Ethics (3:27)
- 66. Mandatory Vacations (2:39)
- 67. Separation of Duties (3:40)
- 68. Job Rotation (2:06)
- 69. Education and Training (4:00)
Class Mini-Case Scenarios
- 70. Mini-Case Scenario #1- Small Tax Accounting Office (19:01)
Congratulations!
- 72. Congratulations (2:05)
- 73. What's Next (1:07)
Get Information Security Management Fundamentals for Non-Techies – Alton Hardin, Only Price $29
Tag: Information Security Management Fundamentals for Non-Techies – Alton Hardin Review. Information Security Management Fundamentals for Non-Techies – Alton Hardin download. Information Security Management Fundamentals for Non-Techies – Alton Hardin discount.
Reviews
There are no reviews yet.