Introduction to Information Security
Offered By: Pluralsight
Course Description
Overview
If you are new to cybersecurity or are interested in getting started, this course will help understand information security for organizations. It covers how organizations protect assets, guide, evaluate, and manage information security programs.
There are many components to an organization's information security program. If you are new to cybersecurity or interested in getting started, it can be difficult to identify and understand all of the facets of protecting an organization's information assets. In this course, Introduction to Information Security, you will learn about the information security programs used by organizations. First, you will learn about the foundational principles of information security, such as confidentiality, integrity, governance, risk management, and compliance. Next, you will explore organizational assets and how they are protected through the use of security controls. Then, you will take a look at how auditing, monitoring, and testing is used to review and evaluate the effectiveness of those security controls. Finally, you will discover how organizations manage and prepare for security incidents, disruptions, and disasters and how they manage the day-to-day operations of an information security program. When you are finished with this course, you will have the knowledge and understanding of the bigger picture of information security.
Topics:
There are many components to an organization's information security program. If you are new to cybersecurity or interested in getting started, it can be difficult to identify and understand all of the facets of protecting an organization's information assets. In this course, Introduction to Information Security, you will learn about the information security programs used by organizations. First, you will learn about the foundational principles of information security, such as confidentiality, integrity, governance, risk management, and compliance. Next, you will explore organizational assets and how they are protected through the use of security controls. Then, you will take a look at how auditing, monitoring, and testing is used to review and evaluate the effectiveness of those security controls. Finally, you will discover how organizations manage and prepare for security incidents, disruptions, and disasters and how they manage the day-to-day operations of an information security program. When you are finished with this course, you will have the knowledge and understanding of the bigger picture of information security.
Topics:
- Course Overview
- Security Principles, Governance, Risk, and Compliance
- Protecting and Defending Assets
- Auditing and Monitoring
- Managing Incidents and Operations
Taught by
Keith Watson
Related Courses
Cybersecurity and Its Ten DomainsUniversity System of Georgia via Coursera Compliance in Office 365: eDiscovery
Microsoft via edX Legal Compliance For Incorporating Startup
Indian Institute of Technology Kanpur via Swayam The Business of Cybersecurity Capstone
University System of Georgia via Coursera Creating a Portfolio
Indian School of Business via Coursera