A fundamental safety consciousness information on Information Security and Cyber Security for NON-TECHIES.
This ~2 hour course supplies a transparent, non technical rationalization on Information Security and Cyber Security.
This course provides options which can be utilized in the implementation of an Information Security Administration System, it additionally supplies steering on the way to defend your self from cyber threats.
This course will show you how to acquire an ideal understanding on Information Security by way of REAL LIFE EXAMPLES AND QUIZ QUESTIONS!
PLEASE DO TAKE A LOOK AT THE VIDEOS PROVIDED FOR FREE BEFORE ENROLLING IN THIS COURSE!
This course is split into 4 elements:
The primary half acts as an introduction to the course, it supplies you with definitions equivalent to, Information Methods, Information Security, the aim of Information Security, the CIA Triad and AAA .
The second half speaks about Threat Administration and Qualitative & Quantitative Threat Evaluation. We additionally discuss Contingency Planning within the case of a catastrophe or disruption of providers.
The third half is the place, in my view, issues get critical, because it incorporates a quite simple and clear rationalization on the way to defend your self from threats to your Information System together with REAL LIFE EXAMPLES that can assist you higher perceive the idea. We mainly discuss Bodily, Information, Methods & Community, Wi-fi and Net Software Security. Additionally supplied on this part is the way to develop an Information System Coverage together with examples of insurance policies, and the way to conduct a Security Awareness Training.
The fourth half is about Security Monitoring and Effectiveness, the instruments wanted to take care of an efficient monitoring technique. We’ll additionally see the way to develop an Incident Response Plan and the way to conduct a Forensics Investigation. Lastly on this course we’ll see the way to consider the effectiveness of an Information Security System with Metrics and Vulnerability Evaluation.
This Information Security Awareness Course is NOT a technical or operational safety information. NO CODING!
PLEASE DO TAKE A LOOK AT THE COURSE CONTENT BEFORE ENROLLING IN THIS COURSE!