Information Security for Leaders: An Introduction to InfoSec
InfoSec
| Beginner
- 15 videos | 1h 18m 39s
- Includes Assessment
- Earns a Badge
Information security, often called InfoSec, consists of tools and processes used to protect data and sensitive information from threats and attacks. In this course, explore the history of information security and discover how to differentiate between cybersecurity and information security. Discover common myths and misconceptions about information security and learn about types of information security, such as infrastructure, cloud, application, and incident response. Next, you will explore security threats, including social media attacks, social engineering, malware, and misconfigurations, and common information security and data protection laws. Finally, you will investigate the responsibilities of a Chief Information Security Officer (CISO), including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance. Upon completion, you'll be able to recognize the importance of information security and the key roles and responsibilities required to protect an organization
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of infosec and outline how it is used to protect organizationsOutline the use of information security over the decadesDifferentiate between cybersecurity and information securityIdentify common myths and misconceptions relating to information securityDifferentiate between types of information security such as infrastructure, cloud, application, and incident responseRecognize common security threats including social media attacks, social engineering, malware, and misconfigurationsIdentify the responsibilities of a chief information security officer (ciso) including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance
-
Identify common responsibilities of a chief information officer (cio) including strategic planning of technology initiativesOutline the role of a security operations center (soc)Recognize how security architecture can translate into business and assurance goalsRecognize how threat intelligence can provide context and insight relating to security threatsOutline common information security and data protection lawsDifferentiate between passive and active attacksSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 5sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 15sAfter completing this video, you will be able to provide an overview of InfoSec and outline how it is used to protect organizations. FREE ACCESS
-
6m 19sUpon completion of this video, you will be able to outline the use of information security over the decades. FREE ACCESS
-
6m 6sAfter completing this video, you will be able to differentiate between cybersecurity and information security . FREE ACCESS
-
6m 9sUpon completion of this video, you will be able to identify common myths and misconceptions relating to information security . FREE ACCESS
-
7m 3sAfter completing this video, you will be able to differentiate between types of information security such as infrastructure, cloud, application, and incident response. FREE ACCESS
-
5m 59sUpon completion of this video, you will be able to recognize common security threats including social media attacks, social engineering, malware, and misconfigurations. FREE ACCESS
-
5m 20sAfter completing this video, you will be able to identify the responsibilities of a chief information security officer (CISO) including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance . FREE ACCESS
-
5m 20sUpon completion of this video, you will be able to identify common responsibilities of a chief information officer (CIO) including strategic planning of technology initiatives. FREE ACCESS
-
5m 16sAfter completing this video, you will be able to outline the role of a security operations center (SOC). FREE ACCESS
-
6m 7sUpon completion of this video, you will be able to recognize how security architecture can translate into business and assurance goals. FREE ACCESS
-
5m 36sAfter completing this video, you will be able to recognize how threat intelligence can provide context and insight relating to security threats. FREE ACCESS
-
5m 50sUpon completion of this video, you will be able to outline common information security and data protection laws. FREE ACCESS
-
5m 23sAfter completing this video, you will be able to differentiate between passive and active attacks . FREE ACCESS
-
52sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.