HOME > IT & Software > Information Security Fundamentals (Best Starting Point)

Information Security Fundamentals (Best Starting Point)

SynopsisInformation Security Fundamentals (Best Starting Point , avai...
Information Security Fundamentals (Best Starting Point)  No.1

Information Security Fundamentals (Best Starting Point), available at $19.99, has an average rating of 4.21, with 31 lectures, based on 7 reviews, and has 114 subscribers.

You will learn about A solid baseline understanding of Information Security How the principles of Information Security applies in a real world environment How Information Security principles can be enforced through effective policies Learn how to help Safeguard your organisations information Learn Information Security Skills which can be passed on to team members How to increase improve Information Security Practises in your organisation This course is ideal for individuals who are Business Managers & IT Managers looking for a solid baseline understanding of Information Security, or Those looking for a core understanding of Information Security or Those looking for further training and want a rounded understanding of the fundamentals or Those working in an office environment looking for good habits regarding security It is particularly useful for Business Managers & IT Managers looking for a solid baseline understanding of Information Security, or Those looking for a core understanding of Information Security or Those looking for further training and want a rounded understanding of the fundamentals or Those working in an office environment looking for good habits regarding security.

Enroll now: Information Security Fundamentals (Best Starting Point)

Summary

Title: Information Security Fundamentals (Best Starting Point)

Price: $19.99

Average Rating: 4.21

Number of Lectures: 31

Number of Published Lectures: 31

Number of Curriculum Items: 31

Number of Published Curriculum Objects: 31

Original Price: £19.99

Quality Status: approved

Status: Live

What You Will Learn

  • A solid baseline understanding of Information Security
  • How the principles of Information Security applies in a real world environment
  • How Information Security principles can be enforced through effective policies
  • Learn how to help Safeguard your organisations information
  • Learn Information Security Skills which can be passed on to team members
  • How to increase improve Information Security Practises in your organisation
  • Who Should Attend

  • Business Managers & IT Managers looking for a solid baseline understanding of Information Security,
  • Those looking for a core understanding of Information Security
  • Those looking for further training and want a rounded understanding of the fundamentals
  • Those working in an office environment looking for good habits regarding security
  • Target Audiences

  • Business Managers & IT Managers looking for a solid baseline understanding of Information Security,
  • Those looking for a core understanding of Information Security
  • Those looking for further training and want a rounded understanding of the fundamentals
  • Those working in an office environment looking for good habits regarding security
  • This course is perfect for a refresher, introduction, or as a foundation for further learning. Protecting our information within our hybrid working environments is becoming tricky. Many of us have bad habits or aren’t up to speed with correct procedures or understanding why a certain policy may be in place.

    During this course, we cover the fundamentals of Information Security (InfoSec)

  • What is Information Security(definition, CIA, Available Standards eg: 27001, NIST)

  • User Authorisation(Types of Authentication, Passwords, MFA, Sessions, and Cookies)

  • Asset Classification(What is Asset Classification, How can we manage our classifications)

  • Access Control(Principle of least privilege access, Protecting our files, Role-based access, Physical Security)

  • Network Security (Types of Network, Firewalls, Network Segmentation)

  • Types of Attacks(Man in the Middle, Phishing, Social Engineering, Brute Force, Malware, DoS)

  • Encryption(What is Encryption, Asymmetric vs Symmetric)

  • Risk(What is Risk, How we Manage Risk)

  • Incident Management(Overview and process walkthrough)

  • Common Policies and why you may use them(Including HR, BYOD, Removable Media, Supplier Management etc..)

  • Importance of Cyber Awareness – Common Risks(Phishing, Malware, Safe Browsing, etc)

  • This course runs for 2H40M and no prior technical knowledge is required, any technical aspects referenced are explained as we go. All of the course content is broken down into bite-sized manageable chunks for ease of learning.

    Course Curriculum

    Chapter 1: Course Introduction

    Lecture 1: Welcome & Whats coming up.

    Lecture 2: The Udemy App

    Lecture 3: The Q&A Board

    Chapter 2: What is Information Security?

    Lecture 1: What is Information Security? (definition and CIA)

    Lecture 2: How do we safe guard our data?

    Lecture 3: Compliance Standards

    Lecture 4: Information Security vs Cyber Security

    Chapter 3: User Authorisation

    Lecture 1: Types of Authentication

    Lecture 2: Passwords

    Lecture 3: Multi Factor Authentication

    Lecture 4: Authentication Sessions

    Chapter 4: Asset Classification

    Lecture 1: What is Asset Classification

    Lecture 2: Managing Classification

    Chapter 5: Access Control

    Lecture 1: Principle of Least Privileged Access

    Lecture 2: Protecting Files

    Lecture 3: Physical Security

    Chapter 6: Network Security

    Lecture 1: Types of Network

    Lecture 2: Firewalls

    Lecture 3: Network Segmentation

    Chapter 7: Types of Attacks

    Lecture 1: Common Types of Attacks

    Lecture 2: Phishing

    Lecture 3: Social Engineering

    Chapter 8: Encryption

    Lecture 1: What is Encryption?

    Lecture 2: Types of Encryption

    Chapter 9: Risk

    Lecture 1: What is Risk?

    Lecture 2: Managing Risk

    Chapter 10: Incident Management

    Lecture 1: Overview of Incident Management

    Chapter 11: Common Information Security Policies

    Lecture 1: Overview of Information Security Policies

    Lecture 2: Common Policies (Part 1)

    Lecture 3: Common Policies (Part 2)

    Chapter 12: Cyber Awareness

    Lecture 1: Importance of Cyber Awareness

    Instructors

  • Information Security Fundamentals (Best Starting Point)  No.2
    4 Cyber
    Training 4 Cyber
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 0 votes
  • 3 stars: 2 votes
  • 4 stars: 2 votes
  • 5 stars: 3 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!