Information Security Management Fundamentals for Non-Techies
Learn the Fundamentals of Information Security Management for Non-Techies
Watch Promo
Learn Information Security Fundamentals From One of Udemy’s Top IT Instructors
Are you looking to learn the basics of information security management? Are you a business or aspiring IT professional that needs to better understand how cybersecurity works? If so, this is the perfect course for you!
In this 11-hour course, I'll show you step-by-step, the fundamentals of information security management, teaching you essential cybersecurity core principles you need to know.
If you’re looking to advance or begin your career in Information Technology (IT), this course is a must!
WHAT YOU'LL RECEIVE IN THIS COURSE
- 12.5 Hours of Lecture & Live Demonstration Videos
- 18 Section Quizzes & 4 Mini-Case Scenarios
- Edited Closed Caption Subtitles and Video Transcripts
- Downloadable Course Videos for Offline Viewing with Udemy Mobile App and PDF Lectures of All Course PowerPoint Slides
WHAT STUDENTS ARE SAYING
"Well prepared and presented course! Highly recommend this for anyone who wants to get an entire picture of cybersecurity and how it affects the various domains (from access and asset management to Incident Response). The quiz questions are very interesting too; its scenario-based and gets you to think as an IT admin or manager.”
-Sherin
"The explanations and course content are really easy to follow, useful and perfect for instant real-world use. This is a great refresher and beginner course on information/cyber security.”
-James
"I would recommend this course even to experienced IT person as this is the fundamental and in my view cover all of the security. An exceptional well-structured course. After completing this course, I am determined to continue to study/reading on Security for knowledge purposes. This course is definitely going to aid me in my position as Project Manager. Thank so much.”
-Harry
KEY COURSE TOPICS
- Core Information Security Principles
- Risk Management
- Access Control
- IT Auditing
- Compliance
- Security Malware Threats
- Network Security
- Security Assessments and Testing
- Cryptography
- Incident Response
- Disaster Recovery and Business Continuity
- Zero Trust
- Personnel Policies
- And Much More
Once you complete this course, you'll understand the core principles of information security to help you better protect your IT and business infrastructure!
So What Are You Waiting For?
Enroll Today, Your 100% Risk-Free Enrollment Is Backed by my 14-Day, No
Questions Asked, Money Back Guarantee!
Preview over 1 Hour of This Course Through My 20+ Free Lectures, Just Scroll down Below and Click the "Preview" Buttons.
Your Instructor
Alton Hardin is an educator, self-published & best-selling author, and full-time IT and Business professional with 20 years of experience, that has a fond love for teaching and helping his students excel.
He has earned two graduate degrees, an M.B.A. and M.S. in IT Network Management; moreover, he currently holds multiple IT industry certifications, including the CISSP, ITIL, Security+, Network+, Project+, eJPT, MTA, and several other certifications.
Alton has always had a fond love for teaching. As an undergraduate, he group tutored chemistry students and as a graduate student, he taught a GMAT prep course. Upon graduating from his MBA program, he began teaching as an adjunct professor for the School of Business & Public Administration at his local state university in the field of Information Systems and IT Management.
He is also the founder of MicroGrinder Poker School, an online poker school dedicated to micro stakes poker players, where he provides a wide array of free and low-cost poker resources and poker training, included poker strategy articles and poker training video series.
Course Curriculum
-
PreviewWelcome to the Course! (0:47)
-
StartWhy Learn Information Security Management From Me? (2:26)
-
StartWhat This Course Is & What It Isn't (2:50)
-
PreviewCourse Curriculum Overview (5:18)
-
StartCourse Lecture PDFs
-
PreviewJoin our Facebook Student Community
-
StartStudent Exercise: Introduce Yourself
-
StartSection Introduction (0:34)
-
PreviewThe CIA Triad (4:05)
-
StartAuthentication, Authorization, and Accounting (AAA) (3:09)
-
StartDefense in Depth (3:49)
-
StartLeast Privilege (1:57)
-
StartNon-Repudiation (3:17)
-
StartImplicit Deny (2:50)
-
StartLegal and Regulatory Issues (7:21)
-
StartInformation Security Governance (8:06)
-
StartAuthentication Basics (10:44)
-
StartIdentify Proofing (3:08)
-
StartGeneral Password Rules (8:57)
-
StartInformation Security Principles Quiz