Information Security Management Fundamentals for Non-Techies
4.6 (2,521 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
9,780 students enrolled

Information Security Management Fundamentals for Non-Techies

Learn the Fundamentals of Information Security Management for Non-Techies
Bestseller
4.6 (2,521 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
9,780 students enrolled
Created by Alton Hardin
Last updated 5/2020
English
Current price: $56.99 Original price: $94.99 Discount: 40% off
3 days left at this price!
30-Day Money-Back Guarantee
This course includes
  • 10.5 hours on-demand video
  • 4 articles
  • 83 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Understand the Fundamentals of Information Security Management
  • Have a Working Understanding of The Many Aspects of IT Security
  • Be Prepared for More Advanced Information Security Courses
  • Better Protect Your Business & I.T. Infrastructure
Requirements
  • A Basic Understanding of Computers
  • A Basic Understanding of Computer Networks
  • A Desire to Learn
Description

***Course Updated, Expanded & Improved with 60% New Content August 15th, 2019***

LEARN INFORMATION SECURITY FUNDAMENTALS FROM ONE OF UDEMY’S TOP IT INSTRUCTORS

Are you looking to learn the basics of information security management? Are you a business or aspiring IT professional that needs to better understand how cybersecurity works? If so, this is the perfect course for you!

In this 10.5-hour course, I'll show you step-by-step, the fundamentals of information security management, teaching you essential cybersecurity core principles you need to know.

If you’re looking to advance or begin your career in Information Technology (IT), this course is a must!

WHAT YOU'LL RECEIVE IN THIS COURSE

  • 10.5 Hours of Lecture & Live Demonstration Videos

  • Downloadable Course Videos for Offline Viewing with Udemy Mobile App and PDF Lectures of All Course PowerPoint Slides

  • 15 Section Quizzes & Two Mini-Case Scenarios

WHAT STUDENTS ARE SAYING

"It's really very helpful, it helped me to understand the basics on information security management, surely was above my expectations. Highly recommended.”

-Ivan

"The explanations and course content are really easy to follow, useful and perfect for instant real-world use. This is a great refresher and beginner course on information/cyber security.”

-James

"I would recommend this course even to experienced IT person as this is the fundamental and in my view cover all of the security. An exceptional well-structured course. After completing this course, I am determined to continue to study/reading on Security for knowledge purposes. This course is definitely going to aid me in my position as Project Manager. Thank so much.”

-Harry

KEY COURSE TOPICS

  • Core Information Security Principles

  • Risk Management

  • Access Control

  • Security Malware Threats

  • Network Security

  • Security Assessments and Testing

  • Cryptography

  • Incident Response

  • Disaster Recovery and Business Continuity

  • Personnel Policies

  • And Much More

Once you complete this course, you'll understand the core principles of information security to help you better protect your IT and business infrastructure!

SO WHAT ARE YOU WAITING FOR? ENROLL TODAY, YOUR 100% RISK-FREE ENROLLMENT IS BACKED BY UDEMY'S 30-DAY, NO QUESTIONS ASKED, MONEY BACK GUARANTEE!

PREVIEW OVER 1 HOUR OF THIS COURSE THROUGH MY 20 FREE LECTURES, JUST SCROLL DOWN BELOW AND CLICK THE BLUE PREVIEW BUTTONS.

Who this course is for:
  • Non-Techies Wanting to Learn About Information Security
  • Business & IT Managers Needing a Working Knowledge of Information Security
  • Aspiring & Inexperienced IT Professionals
  • This Course Is NOT for Seasoned & Experienced IT & Cyber Security Professionals
Course content
Expand all 118 lectures 10:34:50
+ Course Introduction
7 lectures 20:27
Course Curriculum Overview (Added August 2019)
07:40
Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!
00:15
Q&A Discussion Board Activity: Introduce Yourself
00:24
+ Getting Started In Information Security
3 lectures 35:55
Most Valuable IT Security Certifications (Added August 2019)
11:18
The State of Cybersecurity in 2018 and Beyond (Added August 2019)
09:01
+ Core Information Security Principles
11 lectures 01:13:58
Section Introduction (Updated August 2019)
00:33
Authentication, Authorization, and Accounting (AAA) - (Added August 2019)
03:17
Least Privilege (Added August 2019)
03:35
More Concepts
06:41
Legal and Regulatory Issues (Added August 2019)
07:28
Information Security Governance (Added August 2019)
08:24
Authentication Basics
12:42
Identify Proofing
03:44
General Password Rules
08:26
Designing an Authentication Strategy with Microsoft Technet
11:11
Information Security Principles Quiz (Updated August 2019)
6 questions
+ Risk Management (Added August 2019)
5 lectures 43:26
Section Introduction (Added August 2019)
01:04
Introduction to Risk Management (Added August 2019)
18:24
Exploring Risks and Threats (Added August 2019)
06:12
Attack Surface Analysis (Added August 2019)
09:00
Risk Managment Quiz (Added August 2019)
6 questions
+ Asset Management (Added August 2019)
5 lectures 20:33
Section Introduction (Added August 2019)
00:54
Identifying and Classifying Assets (Added August 2019)
05:48
Data Retention (Added August 2019)
04:01
Understanding Data States (Added August 2019)
03:28
Asset Management Quiz (Added August 2019)
4 questions
+ Access Control
6 lectures 54:19
Section Introduction (Updated August 2019)
00:52
Access Control
14:29
Physical and Logical Access Controls
16:59
Access Control Models
13:28
Student Activity: Analyzing Your Organization's Access Control
02:29
Access Control Quiz
4 questions
+ Security Malware Threats
12 lectures 40:20
Introduction to Malware (Updated August 2019)
00:45
Buffer Overflows (Added August 2019)
05:49
Viruses and Polymorphic Viruses (Updated August 2019)
04:43
Worms (Updated August 2019)
02:00
Logic Bombs
02:40
Spyware and Adware (Updated August 2019)
03:17
Ransomware (Added August 2019)
04:03
Rootkits (Added August 2019)
04:02
Backdoors (Added August 2019)
03:48
Zero Day Attacks (Added August 2019)
02:21
Protecting Against Malware
04:48
Security Malware Threats Quiz (Updated August 2019)
5 questions
+ Additional Threats & Vulnerabilities
7 lectures 54:14
Section Introduction (Added August 2019)
00:36
Social Engineering (Updated August 2019)
07:54
Protocol Spoofing (Added August 2019)
07:28
Common Attack Methods (Added August 2019)
10:26
Transmission Media Security Concerns
12:31
Course Review Request
00:39
Additional Threats & Vulnerabilities Quiz (Updated August 2019)
4 questions
+ Basic Network Zones
6 lectures 24:55
Basic Network Zones
00:52
Internet
01:53
Extranet
03:22
Intranet
03:26
Mini-Case Scenario: Secure Network Design
11:55
Basic Network Zones Quiz
4 questions
+ Network Security
4 lectures 27:34
Hardware Firewalls (Updated August 2019)
10:33
Intrusion Detection & Prevention Systems
07:38
Virtual Private Networks
08:22
Network Security Devices Quiz
4 questions