Information Security for Leaders: Elements of InfoSec

InfoSec    |    Beginner
  • 15 videos | 1h 54m 18s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Confidentiality, integrity, and availability, otherwise known as the CIA triad, is a common information security model used by organizations to design and implement their overall security policies and frameworks. In this course, you will learn the basics of confidentiality, integrity, and availability, and discover emerging challenges brought on by big data and the Internet of Things (IoT). Explore the stages of information security risk management (ISRM) and learn how to differentiate between various types of security controls. Discover techniques such as defense in depth, data classification, cryptography, access control, and governance, and the importance of having a sound incident response and management strategy in place. Lastly, learn about the role of investigations and forensics as well as the steps in a forensic investigation such as searching and seizing, acquisition, analysis, and reporting. After course completion, you'll be able to recognize common elements of information security.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of the confidentiality, integrity, and availability (cia) triad
    Recognize new obstacles for the cia triad such as big data and internet of things (iot)
    Define availability and discuss the importance of availability when planning security goals
    Define authenticity and provide an overview of the six elements of the parkerian hexad
    Provide an overview of the stages of information security risk management (isrm)
    Differentiate between types of security controls
    Recognize how defense in depth is used to provide a layered approach to security
  • Identify the importance of data classification
    Provide an overview of the access control security technique and differentiate between physical access control measures and logical controls
    Outline how cryptography techniques are used to secure data and communications
    Recognize how security governance can be used to control and direct security activities
    Recognize the importance of having a sound incident response and management strategy in place
    Provide an overview of the role of investigations and forensics as well as the steps in a forensic investigation such as searching and seizing, acquisition, analysis, and reporting
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 9s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 3s
    After completing this video, you will be able to provide an overview of the confidentiality, integrity, and availability (CIA) triad. FREE ACCESS
  • Locked
    3.  CIA Obstacles
    10m 30s
    Upon completion of this video, you will be able to recognize new obstacles for the CIA triad such as big data and internet of things (IoT). FREE ACCESS
  • Locked
    4.  Availability as a Security Goal
    11m 5s
    After completing this video, you will be able to define availability and discuss the importance of availability when planning security goals. FREE ACCESS
  • Locked
    5.  Authenticity as a Security Goal
    11m 59s
    Upon completion of this video, you will be able to define authenticity and provide an overview of the six elements of the Parkerian hexad. FREE ACCESS
  • Locked
    6.  Information Security Risk Management
    10m 23s
    After completing this video, you will be able to provide an overview of the stages of information security risk management (ISRM). FREE ACCESS
  • Locked
    7.  Types of Security Controls
    7m 45s
    Upon completion of this video, you will be able to differentiate between types of security controls. FREE ACCESS
  • Locked
    8.  Defense in Depth
    7m 1s
    After completing this video, you will be able to recognize how defense in depth is used to provide a layered approach to security . FREE ACCESS
  • Locked
    9.  Data Classification
    7m 40s
    Upon completion of this video, you will be able to identify the importance of data classification. FREE ACCESS
  • Locked
    10.  Access Control Security
    9m 19s
    After completing this video, you will be able to provide an overview of the access control security technique and differentiate between physical access control measures and logical controls. FREE ACCESS
  • Locked
    11.  Cryptography Techniques
    8m 19s
    Upon completion of this video, you will be able to outline how cryptography techniques are used to secure data and communications. FREE ACCESS
  • Locked
    12.  Security Governance
    7m 37s
    After completing this video, you will be able to recognize how security governance can be used to control and direct security activities. FREE ACCESS
  • Locked
    13.  Incident Response and Management
    6m 11s
    Upon completion of this video, you will be able to recognize the importance of having a sound incident response and management strategy in place. FREE ACCESS
  • Locked
    14.  Forensics and Investigations
    5m 30s
    After completing this video, you will be able to provide an overview of the role of investigations and forensics as well as the steps in a forensic investigation such as searching and seizing, acquisition, analysis, and reporting. FREE ACCESS
  • Locked
    15.  Course Summary
    48s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)