Introduction to Information Security Course will introduce learners to the basic concepts and components of securing electronic data and information over computer networks, systems, applications, and other technologies. With an increase in the volume and magnitude of data breaches and cyber-attacks in recent years, information security has never been more vital.
This course covers common cyber-threats, including types of malware and viruses, and examines the common defense measures organizations take to protect against them. It also provides a solid basis in many of the IT areas—including networks, software, and computer architecture—needed to understand the methodologies for securing them. The course is intended to give managers, technology professionals, and those interested in entering the information security profession a good foundation in the subject.
Topics covered in this course include common cyber-attack methods and defenses, trends and modern strategies in information security, access control models and methodologies, types of networks, network components, and how networks work, firewall types and how they work, wireless networks, IT security risk management strategies, policies and standards that govern the information security function, the systems development life cycle, application security controls, cryptography and the role of encryption in information security, security architectures and designing holistic security programs, the trusted computing base, business continuity and disaster recovery planning from an IT perspective, managing the human component of information security, the legal and regulatory issues that involve information security, and physical security.
Module 1: Introduction and Access Controls
Module 2: Telecom and Network Security
Module 3: Information Security Governance and Risk Management
Module 4: Software Development Security
Module 5: Cryptography
Module 6: Security Architecture and Design
Module 7: Security Operations
Module 8: Business Continuity and Disaster Recovery Planning
Module 9: Legal, Regulations, Investigations, and Compliance
Module 10: Physical Security