Information Security for Leaders: An Introduction to InfoSec

InfoSec    |    Beginner
  • 15 videos | 1h 18m 39s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Information security, often called InfoSec, consists of tools and processes used to protect data and sensitive information from threats and attacks. In this course, explore the history of information security and discover how to differentiate between cybersecurity and information security. Discover common myths and misconceptions about information security and learn about types of information security, such as infrastructure, cloud, application, and incident response. Next, you will explore security threats, including social media attacks, social engineering, malware, and misconfigurations, and common information security and data protection laws. Finally, you will investigate the responsibilities of a Chief Information Security Officer (CISO), including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance. Upon completion, you'll be able to recognize the importance of information security and the key roles and responsibilities required to protect an organization

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of infosec and outline how it is used to protect organizations
    Outline the use of information security over the decades
    Differentiate between cybersecurity and information security
    Identify common myths and misconceptions relating to information security
    Differentiate between types of information security such as infrastructure, cloud, application, and incident response
    Recognize common security threats including social media attacks, social engineering, malware, and misconfigurations
    Identify the responsibilities of a chief information security officer (ciso) including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance
  • Identify common responsibilities of a chief information officer (cio) including strategic planning of technology initiatives
    Outline the role of a security operations center (soc)
    Recognize how security architecture can translate into business and assurance goals
    Recognize how threat intelligence can provide context and insight relating to security threats
    Outline common information security and data protection laws
    Differentiate between passive and active attacks
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 5s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 15s
    After completing this video, you will be able to provide an overview of InfoSec and outline how it is used to protect organizations. FREE ACCESS
  • Locked
    3.  History of Information Security
    6m 19s
    Upon completion of this video, you will be able to outline the use of information security over the decades. FREE ACCESS
  • Locked
    4.  Cybersecurity vs. Information Security
    6m 6s
    After completing this video, you will be able to differentiate between cybersecurity and information security . FREE ACCESS
  • Locked
    5.  Myths and Misconceptions
    6m 9s
    Upon completion of this video, you will be able to identify common myths and misconceptions relating to information security . FREE ACCESS
  • Locked
    6.  Types of Information Security
    7m 3s
    After completing this video, you will be able to differentiate between types of information security such as infrastructure, cloud, application, and incident response. FREE ACCESS
  • Locked
    7.  Common Security Threats
    5m 59s
    Upon completion of this video, you will be able to recognize common security threats including social media attacks, social engineering, malware, and misconfigurations. FREE ACCESS
  • Locked
    8.  Chief Information Security Officers (CISOs)
    5m 20s
    After completing this video, you will be able to identify the responsibilities of a chief information security officer (CISO) including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance . FREE ACCESS
  • Locked
    9.  Chief Information Officers (CIOs)
    5m 20s
    Upon completion of this video, you will be able to identify common responsibilities of a chief information officer (CIO) including strategic planning of technology initiatives. FREE ACCESS
  • Locked
    10.  Security Operations Center (SOC)
    5m 16s
    After completing this video, you will be able to outline the role of a security operations center (SOC). FREE ACCESS
  • Locked
    11.  Security Architecture
    6m 7s
    Upon completion of this video, you will be able to recognize how security architecture can translate into business and assurance goals. FREE ACCESS
  • Locked
    12.  Threat Intelligence
    5m 36s
    After completing this video, you will be able to recognize how threat intelligence can provide context and insight relating to security threats. FREE ACCESS
  • Locked
    13.  Legal Considerations
    5m 50s
    Upon completion of this video, you will be able to outline common information security and data protection laws. FREE ACCESS
  • Locked
    14.  Attack Types
    5m 23s
    After completing this video, you will be able to differentiate between passive and active attacks . FREE ACCESS
  • Locked
    15.  Course Summary
    52s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 4.4 of 64 users Rating 4.4 of 64 users (64)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 231 users Rating 4.4 of 231 users (231)
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)
Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)