Introduction to Information Security
Offered By: Pluralsight
Course Description
Overview
If you are new to cybersecurity or are interested in getting started, this course will help understand information security for organizations. It covers how organizations protect assets, guide, evaluate, and manage information security programs.
There are many components to an organization's information security program. If you are new to cybersecurity or interested in getting started, it can be difficult to identify and understand all of the facets of protecting an organization's information assets. In this course, Introduction to Information Security, you will learn about the information security programs used by organizations. First, you will learn about the foundational principles of information security, such as confidentiality, integrity, governance, risk management, and compliance. Next, you will explore organizational assets and how they are protected through the use of security controls. Then, you will take a look at how auditing, monitoring, and testing is used to review and evaluate the effectiveness of those security controls. Finally, you will discover how organizations manage and prepare for security incidents, disruptions, and disasters and how they manage the day-to-day operations of an information security program. When you are finished with this course, you will have the knowledge and understanding of the bigger picture of information security.
Topics:
There are many components to an organization's information security program. If you are new to cybersecurity or interested in getting started, it can be difficult to identify and understand all of the facets of protecting an organization's information assets. In this course, Introduction to Information Security, you will learn about the information security programs used by organizations. First, you will learn about the foundational principles of information security, such as confidentiality, integrity, governance, risk management, and compliance. Next, you will explore organizational assets and how they are protected through the use of security controls. Then, you will take a look at how auditing, monitoring, and testing is used to review and evaluate the effectiveness of those security controls. Finally, you will discover how organizations manage and prepare for security incidents, disruptions, and disasters and how they manage the day-to-day operations of an information security program. When you are finished with this course, you will have the knowledge and understanding of the bigger picture of information security.
Topics:
- Course Overview
- Security Principles, Governance, Risk, and Compliance
- Protecting and Defending Assets
- Auditing and Monitoring
- Managing Incidents and Operations
Taught by
Keith Watson
Related Courses
Information Security and Risk Management: An OverviewUniversity of Washington via Canvas Network Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX Information Security Policy and Management
Coventry University via FutureLearn Information Security - Advanced topics
New York University (NYU) via edX Information Security - Authentication and Access Control
New York University (NYU) via edX