Fundamentals of Information Security
Understanding of Cyber Security
Understanding of The Context of Information Security
How to Respond to Various Security Incidents
How to Prevent Cyber Attacks
Understand the Need for Business Continuity Planning and Disaster Recovery
How to Become a Cyber-Safe End-User
How to Conduct Security Awareness Trainings
How to Monitor an Information Security System
How to Evaluate the Effectiveness of an Information Security System
A basic security awareness guide on Information Security, Internet Security & Privacy for NON-TECHIES, to keep your online and offline devices safe!
This ~2 hour course provides a clear, non technical explanation on Information Security and Cyber Security.
This course offers solutions which can be used in the implementation of an Information Security Management System, it also provides guidance on how to protect yourself from cyber threats.
This course will help you gain a perfect understanding on Information Security through REAL LIFE EXAMPLES AND QUIZ QUESTIONS!
PLEASE DO TAKE A LOOK AT THE VIDEOS PROVIDED FOR FREE BEFORE ENROLLING IN THIS COURSE!
This course is divided into 4 parts:
The first part acts as an introduction to the course, it provides you with definitions such as, Information Systems, Information Security, the purpose of Information Security, the CIA Triad and AAA .
The second part speaks about Risk Management and Qualitative & Quantitative Risk Analysis. We also talk about Contingency Planning in the case of a disaster or disruption of services.
The third part is where, in my opinion, things get serious, as it contains a very simple and clear explanation on how to protect yourself from threats to your Information System along with REAL LIFE EXAMPLES to help you better understand the concept. We basically talk about Physical, Data, Systems & Network, Wireless and Web Application Security. Also provided in this section is how to develop an Information System Policy along with examples of policies, and how to conduct a Security Awareness Training.
The fourth part is about Security Monitoring and Effectiveness, the tools needed to maintain an effective monitoring strategy. We’ll also see how to develop an Incident Response Plan and how to conduct a Forensics Investigation. Finally in this course we’ll see how to evaluate the effectiveness of an Information Security System with Metrics and Vulnerability Assessment.
This Information Security Awareness Course is NOT a technical or operational security guide. NO CODING!
PLEASE DO TAKE A LOOK AT THE COURSE CONTENT BEFORE ENROLLING IN THIS COURSE!