• Post category:StudyBullet-9
  • Reading time:6 mins read


A Basic Security Awareness Guide on Information Security & Internet Security to Keep Online and Offline Devices Safe!

What you will learn

Fundamentals of Information Security

Understanding of Cyber Security

Understanding of The Context of Information Security

How to Respond to Various Security Incidents

How to Prevent Cyber Attacks

Understand the Need for Business Continuity Planning and Disaster Recovery

How to Become a Cyber-Safe End-User

How to Conduct Security Awareness Trainings

How to Monitor an Information Security System

How to Evaluate the Effectiveness of an Information Security System

Description

A basic security awareness guide on Information Security, Internet Security & Privacy for NON-TECHIES, to keep your online and offline devices safe!

This ~2 hour course provides a clear, non technical explanation on Information Security and Cyber Security.

This course offers solutions which can be used in the implementation of an Information Security Management System, it also provides guidance on how to protect yourself from cyber threats.

This course will help you gain a perfect understanding on Information Security through REAL LIFE EXAMPLES AND QUIZ QUESTIONS!

        PLEASE DO TAKE A LOOK AT THE VIDEOS PROVIDED FOR FREE BEFORE ENROLLING IN THIS COURSE!

This course is divided into 4 parts:


Get Instant Notification of New Courses on our Telegram channel.


The first part acts as an introduction to the course, it provides you with definitions such as, Information Systems, Information Security, the purpose of Information Security, the CIA Triad and AAA .

The second part speaks about Risk Management and Qualitative & Quantitative Risk Analysis. We also talk about Contingency Planning in the case of a disaster or disruption of services.

The third part is where, in my opinion, things get serious, as it contains a very simple and clear explanation on how to protect yourself from threats to your Information System along with REAL LIFE EXAMPLES to help you better understand the concept. We basically talk about Physical, Data, Systems & Network, Wireless and Web Application Security. Also provided in this section is how to develop an Information System Policy along with examples of policies, and how to conduct a Security Awareness Training.

The fourth part is about Security Monitoring and Effectiveness, the tools needed to maintain an effective monitoring strategy. We’ll also see how to develop an Incident Response Plan and how to conduct a Forensics Investigation. Finally in this course we’ll see how to evaluate the effectiveness of an Information Security System with Metrics and Vulnerability Assessment.

     This Information Security Awareness Course is NOT a technical or operational security guide. NO CODING!

        PLEASE DO TAKE A LOOK AT THE COURSE CONTENT BEFORE ENROLLING IN THIS COURSE!

English
language

Content

Introduction to Information Security

Information Systems
What Is Information Security: CIA Triad and AAA
What is a Threat?
Why Is Information Security Needed?
Impact of Security Breaches
How To Achieve Information Security?
Introduction to Information Security Quiz

Security and Risk Management

Information Assurance
Information Risk Management
Qualitative and Quantitative Risk Analysis
Defense in Depth
Contingency Planning
Security and Risk Management Quiz

Information Security from the Ground Up

Information Security from the Ground Up: Introduction
Physical Security
Data Security: Data Classification
Data Security: Access Control Models
Systems and Networks Security: Firewalls
Systems and Network Security: VPN and IDS&IPS
Wireless Security: WEP
Wireless Security: WPA
Wireless Security: WPA2
Wireless Security: WPA3
Web/Web Application Security
Information Security Policy
Security Awareness Training
Information Security from the Ground Up Quiz

Security Monitoring and Effectiveness

Security Monitoring
Incident Response Plan
Digital Forensics
Effectiveness Evaluation: Metrics
Vulnerability Assessment
Penetration Testing
Security Monitoring and Effectiveness Quiz