Information Security Specialist
Get your certification as a "Information Security Specialist" - Information Security Specialists are in charge of developing and implementing security measures for their organization.
Information Security Specialist
Information Security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.
Infosec programs are built around the core objectives of the CIA triad: maintaining the confidentiality, integrity and availability of IT systems and business data. These objectives ensure that sensitive information is only disclosed to authorized parties (confidentiality), prevent unauthorized modification of data (integrity) and guarantee the data can be accessed by authorized parties when requested (availability).
Many large enterprises employ a dedicated security group to implement and maintain the organization's infosec program. Typically, this group is led by a chief information security officer. The security group is generally responsible for conducting risk management, a process through which vulnerabilities and threats to information assets are continuously assessed, and the appropriate protective controls are decided on and applied. The value of an organization lies within its information -- its security is critical for business operations, as well as retaining credibility and earning the trust of clients.
Threats to sensitive and private information come in many different forms, such as malware and phishing attacks, identity theft and ransomware. To deter attackers and mitigate vulnerabilities at various points, multiple security controls are implemented and coordinated as part of a layered defense in depth strategy. This should minimize the impact of an attack. To be prepared for a security breach, security groups should have an incident response plan (IRP) in place. This should allow them to contain and limit the damage, remove the cause and apply updated defense controls.
Course Overview:
This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. The purpose of the course is to provide the student with an overview of the field of information security and assurance. Students will be exposed to the spectrum of security activities, methods, methodologies, and procedures. Coverage will include inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident procedures, technical and managerial responses, and an overview of the information security planning and staffing functions.
You will learn:
Safeguards information system assets by identifying and solving potential and actual security problems.
System Administration, Network Security, Problem Solving, Information Security Policies, Informing Others, Process Improvement, On-Call, Network Troubleshooting, Firewall Administration, Network Protocols, Routers, Hubs, and Switches.
Course Discussion
Lesson Overview
Careers In IT Security
10 Steps to Cyber Security - Executive Companion
Chapter 1- The world of Information Security
Chp 1 - Quiz
Chapter 2 - The Need For Security
Chapter 3 - Issues in Information Security
Chapter 4 - Planning For Security
Chapter 5 - Risk Management
How to combat Employee Risk
Chapter 6 - Firewalls and VPNs
Example Of Cisco Intrusion Prevention Systems
IDS and Firewall
SSH (Secure Shell)
Chapter 7 - Security Technology
Chapter 8 - Cryptography
What Are The Types Of Cryptography
Public Key Cryptography
Digital Certificates
Chapter 9 - Physical Security
Chapter 10 - Implementing Information Security
Chapter 11 - Security and Personnel
Chapter 12 - Information Security Maintenance
Effective Cyber Defense
Final Projects
Download The "National Cyber Security University" App To Get Weekly Discount Codes.
$75.00
Regular price
$800.00
Save $100
How Much Does A IT Security Specialist Make in the United States?
Get Your Free Shirt When You Complete Your Course.