Information Security Management Fundamentals for Non-Techies – Alton Hardin

4,150.00

Hours of Content: 7INFORMATION SECURITY DEMYSTIFIED FOR NON-TECHIESAre you a non-techie interested in learning about information security? Are you a business or aspiring IT professional that needs to better understand how cyber security works? Then you have come to the right place!This course will teach you the fundamentals of information security and essential cyber security core principles, designed for Non-Techies!WHAT YOU’LL LEARN IN THIS COURSE:Why We Need Information SecurityInformation Security Core PrinciplesFundamental Access Control ConceptsBasic Network ZonesFundamental Network Security DevicesHardening SystemsFundamentals Security ThreatsDisaster Recovery BasicsI.T. Personnel PoliciesAnd Much More…COURSE MINI-CASE SCENARIOSYou’ll also learn by the “case method” that is commonly used in both law and business school. I will be creating and uploaded course mini-cases, where I walk through and complete the entire case for you while you are watching. This will hopefully help you to think about the course and all of it’s topics holistically and synergistic-ally.Once you complete this course, you’ll understand the core principles of information security to help you better protect your I.T. and business infrastructure!What are the requirements?A Basic Understanding of ComputersA Desire to LearnWhat am I going to get from this course?Understand the Fundamentals of Information Security ManagementHave a Working Understanding of The Many Aspects of IT SecurityBe Prepared for More Advanced Information Security CoursesBetter Protect Your Business & I.T. InfrastructureWhat is the target audience?Non-Techies Wanting to Learn About Information SecurityBusiness & IT Managers Needing a Working Knowledge of Information SecurityAspiring & Inexperienced IT ProfessionalsThis Course Is NOT for Seasoned & Experienced IT & Cyber Security ProfessionalsGet Information Security Management Fundamentals for Non-Techies – Alton Hardin, Only Price $29Course CurriculumCourse Introduction1. Welcome to the Course (4:51)2. What This Course Is & What It Isn’t (4:45)3. How to Get The Most Out Of This Course (1:51)4. Instructor Introduction (2:25)5. Discussion Board Activity- Introduce Yourself (0:38)Getting Started In Information Security6. The Many Areas of Information Security (8:27)7. Beginning Point Certifications & Degrees (13:05)The Need for Information Security9. The Need for Information Security (12:19)10. Optional Student Activity- Vimeo & Youtube Videos to Watch (12:01)11. Links: Videos to WatchInformation Security Principles13. Section Introduction (0:55)14. The CIA Triad (7:57)15. More Concepts (6:41)16. Authentication Basics (12:42)17. Identify Proofing (3:44)18. General Password Rules (8:27)19. Designing an Authentication Strategy with Microsoft Technet (11:11)Access Control20. Section Introduction (0:47)21. Access Control (14:31)22. Physical and Logical Access Controls (17:01)23. Defense in Depth (6:04)24. Access Control Models (13:30)25. Student Activity- Analyzing Your Organization’s Access Control (2:29)Basic Network Zones26. Basic Network Zones (0:52)27. Internet (1:53)28. DMZ (3:27)29. Extranet (3:22)30. Intranet (3:26)31. Mini-Case Scenario- Secure Network Design (11:57)Network Security Devices32. Section Introduction (1:31)33. Firewalls (5:53)34. Proxy Servers (7:03)35. Intrusion Detection & Prevention Systems (7:40)36. Virtual Private Networks (8:24)Hardening Systems37. Hardening a System (10:15)38. Patch and Change Management (5:31)Network Threats & Vulnerabilities39. Transmission Media Security Concerns (12:33)40. Wireless Networking Security Concerns (18:47)41. Network-Based Threats and Attacks (19:56)42. Student Activity: Locking Down Your Home’s Wi-FiGet Information Security Management Fundamentals for Non-Techies – Alton Hardin, Only Price $29Network Scanning Tools43. SuperScan Port Scanner (8:24)44. Nmap Zenmap Network Scanner (6:44)45. Tenable Nessus Vulnerability Scanner (10:56)Security Malware Threats46. Introduction to Malware (0:35)47. Viruses (4:29)48. Worms (2:32)49. Trojan Horses (2:14)50. Logic Bombs (2:40)51. Spyware and Adware (2:59)52. Protecting Against Malware (4:49)53. Social Engineering Attacks (8:04)54. Why Social Engineering Succeeds (3:57)Introduction to Crytography55. Introduction to Crytography (9:25)56. Symmetric Encryption (3:42)57. Asymmetric Encryption (4:26)58. Hashing Algorithms (4:45)Disaster Recovery59. Disaster Recovery (3:25)60. Disaster Planning and Testing (4:24)61. Disaster Recovery and Redunancy (8:33)62. The Disaster Recovery Planning Process (11:37)Personnel Policies63. Section Introduction (2:02)64. Acceptable Use (2:49)65. Code of Ethics (3:27)66. Mandatory Vacations (2:39)67. Separation of Duties (3:40)68. Job Rotation (2:06)69. Education and Training (4:00)Class Mini-Case Scenarios70. Mini-Case Scenario #1- Small Tax Accounting Office (19:01)Congratulations!72. Congratulations (2:05)73. What’s Next (1:07)Get Information Security Management Fundamentals for Non-Techies – Alton Hardin, Only Price $29Tag: Information Security Management Fundamentals for Non-Techies – Alton Hardin Review. Information Security Management Fundamentals for Non-Techies – Alton Hardin download. Information Security Management Fundamentals for Non-Techies – Alton Hardin discount.