Course curriculum
-
-
Welcome to the Course
-
Why Learn Information Security Management From Me?
-
What This Course Is & What It Isn't
-
Course Curriculum Overview
-
Course Lecture PDFs
-
-
-
The Many Areas of Information Security
-
The Evolving Cybersecurity Landscape 2024
-
Roles in Cybersecurity
-
Beginner IT Security Certification Recommendations
-
-
-
Section Introduction
-
The CIA & DAD Triads
-
The Parkerian Hexad
-
Authentication, Authorization, and Accounting (AAA)
-
Defense in Depth
-
Least Privilege
-
Non-Repudiation
-
Implicit Deny
-
Legal and Regulatory Issues
-
Information Security Governance
-
Authentication Basics
-
Identify Proofing
-
General Password Rules
-
Modern Password Guidelines
-
Case Study: Netflix's Calculated Risk for Cloud Success
-
Student Activity: Netflix Case Study Analysis
-
Information Security Principles Quiz
-
-
-
Section Introduction
-
What is a Risk?
-
What is an Issue?
-
Introduction to Risk Management
-
Risk Management Process
-
Who Uses Risk Management?
-
The Role of Risk Appetite & Tolerance
-
Exploring Risks and Threats
-
Common Risk Categories
-
Identifying IT Risks
-
Quantitative Risk Analysis
-
Attack Surface Analysis
-
Student Activity: Qualitative Risk Assessment
-
Risk Management Quiz
-
-
-
Section Introduction
-
Identifying and Classifying Assets
-
Emerging Modern Asset Types Reference List
-
Understanding the Asset Lifecycle
-
Data Retention
-
Understanding Data States
-
Asset Management Quiz
-
-
-
Section Introduction
-
Access Control
-
Physical and Logical Access Controls
-
Access Control Models
-
Attribute-Based Access Controls (ABAC)
-
Modern Authentication Methods
-
Privileged Access Fundamentals
-
Student Activity: Analyzing Your Organization's Access Control
-
Access Control Quiz
-
About this course
- $99.95
- 236 lessons
- 16.5 hours of video content