Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Information Security Management Fundamentals for Non-Techies
Section 1: Course Introduction
Welcome to the Course! (0:47)
What This Course Is & What It Isn't (2:49)
Course Curriculum Overview (7:19)
Course Lecture PDFs
Join our Facebook Student Community
Student Exercise: Introduce Yourself
Section 2: Getting Started in Information Security
The Many Areas of Information Security (6:08)
The State of Cybersecurity in 2021 (6:29)
The Most Valuable Beginner IT Security Certifications (10:04)
Section 3: Core Information Security Principles
Section Introduction (0:34)
The CIA Triad (4:05)
Authentication, Authorization, and Accounting (AAA) (3:09)
Defense in Depth (3:49)
Least Privilege (1:57)
Non-Repudiation (3:17)
Implicit Deny (2:50)
Legal and Regulatory Issues (7:21)
Information Security Governance (8:06)
Authentication Basics (10:44)
Identify Proofing (3:08)
General Password Rules (8:57)
Information Security Principles Quiz
Section 4: Risk Management
Section Introduction (1:04)
Introduction to Risk Management (18:04)
Exploring Risks and Threats (6:41)
Quantitative Risk Analysis (8:13)
Attack Surface Analysis (8:28)
Risk Management Quiz
Section 5: Asset Management
Section Introduction (0:56)
Identifying and Classifying Assets (5:10)
Understanding the Asset Lifecycle (6:02)
Data Retention (3:46)
Understanding Data States (3:26)
Asset Management Quiz
Section 6: Access Control
Section Introduction (0:51)
Access Control (13:43)
Physical and Logical Access Controls (17:38)
Access Control Models (11:26)
Access Control Quiz
Section 7: Security Malware Threats
Section Introduction (1:03)
Buffer Overflows (5:07)
Viruses and Polymorphic Viruses (5:50)
Worms (2:14)
Trojan Horses (1:46)
Logic Bombs (2:21)
Spyware and Adware (3:11)
Ransomware (4:41)
Rootkits (3:27)
Zero Day Attacks (2:10)
Protecting Against Malware (6:36)
Security Malware Threats Quiz
Section 8: Additional Threats & Vulnerabilities
Section Introduction (0:36)
Social Engineering (12:04)
Social Engineering Phone Impersonation Scenarios Overview (0:29)
Social Engineering Phone Call Impersonation Example #1 (1:21)
Social Engineering Phone Call Impersonation Example #2 (1:37)
Social Engineering Phone Call Impersonation Example #3 (0:42)
Social Engineering Phone Impersonation Scenarios Discussion (3:39)
Email Spam, Spoofing, Phishing, and Pharming (12:54)
Protocol Spoofing (9:05)
Common Attack Methods (10:06)
Additional Threats & Vulnerabilities Quiz
Section 9: Network Segmentation & Isolation
Section Introduction (1:39)
Introduction to Network Isolation (1:52)
Demilitarized Zone (DMZ) (5:27)
Basic Network Zones (5:04)
Virtual LANs (VLANs) (3:51)
Routers (3:04)
Network Address Translation (NAT) (7:54)
Access Control Lists (ACLs) (4:28)
Network Segmentation & Isolation Quiz
Section 10: Network Security
Section Introduction (0:31)
Virtual Private Networks (7:36)
Firewalls (11:10)
Web Proxy Servers (2:42)
Honeypots (2:23)
Intrusion Detection & Prevention Systems (2:54)
Network Security Quiz
Section 11: Wireless Networking Security
Section Introduction (0:51)
Wireless Encryption Standards (2:15)
Wireless Equivalent Privacy (WEP) (3:03)
Wi-Fi Protected Access (WPA) (2:33)
Wi-Fi Protected Access 2 (WPA2) (3:53)
Wi-Fi Protected Access 3 (WPA3) (3:17)
WPA Enterprise vs. Personal Mode (3:15)
Wireless Network Vulnerabilities & Security (12:31)
Common Wireless Security Threats (6:13)
Wireless Security Quiz
Section 12: Security Assessments and Testing
Section Introduction (1:01)
Vulnerability Assessments (9:14)
Penetration Testing (12:27)
Interview with a Professional Ethical Hacker Blog Article
Security Assessments (2:56)
Security Assessments and Testing Quiz
Section 13: Security Assessment Tools
Section Introduction (1:23)
Wireshark Network Sniffing (4:30)
Nmap Zenmap Network Scanner (6:18)
Tenable Nessus Vulnerability Scanner (4:38)
Ethical Hacking for Beginners (YouTube Series) (3:09)
Section 14: Hardening End-User Systems and Servers
Section Introduction (0:33)
Hardening End-User Systems (7:46)
Hardening Servers (3:51)
Patch and Change Management (4:46)
Separation of Services (3:03)
Hardening Systems Quiz
Section 15: Introduction to Cryptography
Section Introduction (0:55)
Introduction to Cryptography (5:32)
Symmetric Encryption (8:47)
Asymmetric Encryption (4:30)
Hashing Algorithms (7:13)
Digital Certificates and Certificate Authorities (8:05)
Email Encryption Use Cases (12:17)
Windows Encrypted File System Use Case (6:15)
Revisiting VPN (5:13)
Software versus Hardware-Based Encryption (4:15)
Introduction to Cryptography Quiz
Section 16: Incident Response, Disaster Recovery & Business Continuity
Section Introduction (0:57)
Understanding Incidents and Disasters (2:53)
Incident Response (5:50)
Disaster Recovery and Business Continuity (18:43)
Incident Response, DRP and BCP Quiz
Section 17: Application Development Security
Section Introduction (1:07)
Importance of IT Security in Application Development (3:50)
Software Development Lifecycle (SDLC) (14:07)
Static and Dynamic Testing (2:57)
Authorization to Operate (ATO) (3:48)
Application Development Security Quiz
Section 18: Personnel Policies
Section Introduction (1:00)
Acceptable Use (2:17)
Code of Ethics (3:22)
Mandatory Vacations (2:38)
Separation of Duties (4:05)
Job Rotation (1:56)
Education and Training (4:33)
Personnel Policies Quiz
Section 19: Class Mini-Case Scenarios
Mini-Case Scenarios Overview (3:10)
Class Mini-Case Scenario #1: Small Tax Accounting Office
Class Mini-Case Scenario #2: Growing Marketing Business
Section 20: Congratulations!
Congratulations! (0:55)
Section Introduction
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock