Information Security for Leaders: Elements of InfoSec
InfoSec
| Beginner
- 15 videos | 1h 54m 18s
- Includes Assessment
- Earns a Badge
Confidentiality, integrity, and availability, otherwise known as the CIA triad, is a common information security model used by organizations to design and implement their overall security policies and frameworks. In this course, you will learn the basics of confidentiality, integrity, and availability, and discover emerging challenges brought on by big data and the Internet of Things (IoT). Explore the stages of information security risk management (ISRM) and learn how to differentiate between various types of security controls. Discover techniques such as defense in depth, data classification, cryptography, access control, and governance, and the importance of having a sound incident response and management strategy in place. Lastly, learn about the role of investigations and forensics as well as the steps in a forensic investigation such as searching and seizing, acquisition, analysis, and reporting. After course completion, you'll be able to recognize common elements of information security.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of the confidentiality, integrity, and availability (cia) triadRecognize new obstacles for the cia triad such as big data and internet of things (iot)Define availability and discuss the importance of availability when planning security goalsDefine authenticity and provide an overview of the six elements of the parkerian hexadProvide an overview of the stages of information security risk management (isrm)Differentiate between types of security controlsRecognize how defense in depth is used to provide a layered approach to security
-
Identify the importance of data classificationProvide an overview of the access control security technique and differentiate between physical access control measures and logical controlsOutline how cryptography techniques are used to secure data and communicationsRecognize how security governance can be used to control and direct security activitiesRecognize the importance of having a sound incident response and management strategy in placeProvide an overview of the role of investigations and forensics as well as the steps in a forensic investigation such as searching and seizing, acquisition, analysis, and reportingSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 9sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 3sAfter completing this video, you will be able to provide an overview of the confidentiality, integrity, and availability (CIA) triad. FREE ACCESS
-
10m 30sUpon completion of this video, you will be able to recognize new obstacles for the CIA triad such as big data and internet of things (IoT). FREE ACCESS
-
11m 5sAfter completing this video, you will be able to define availability and discuss the importance of availability when planning security goals. FREE ACCESS
-
11m 59sUpon completion of this video, you will be able to define authenticity and provide an overview of the six elements of the Parkerian hexad. FREE ACCESS
-
10m 23sAfter completing this video, you will be able to provide an overview of the stages of information security risk management (ISRM). FREE ACCESS
-
7m 45sUpon completion of this video, you will be able to differentiate between types of security controls. FREE ACCESS
-
7m 1sAfter completing this video, you will be able to recognize how defense in depth is used to provide a layered approach to security . FREE ACCESS
-
7m 40sUpon completion of this video, you will be able to identify the importance of data classification. FREE ACCESS
-
9m 19sAfter completing this video, you will be able to provide an overview of the access control security technique and differentiate between physical access control measures and logical controls. FREE ACCESS
-
8m 19sUpon completion of this video, you will be able to outline how cryptography techniques are used to secure data and communications. FREE ACCESS
-
7m 37sAfter completing this video, you will be able to recognize how security governance can be used to control and direct security activities. FREE ACCESS
-
6m 11sUpon completion of this video, you will be able to recognize the importance of having a sound incident response and management strategy in place. FREE ACCESS
-
5m 30sAfter completing this video, you will be able to provide an overview of the role of investigations and forensics as well as the steps in a forensic investigation such as searching and seizing, acquisition, analysis, and reporting. FREE ACCESS
-
48sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.