Information Security Awareness-ISO 27001:2013-COVID19 Update
4.4 (10,751 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
15,654 students enrolled

Information Security Awareness-ISO 27001:2013-COVID19 Update

Information Security Literate with latest update on COVID19 Cyber security Awareness
Bestseller
4.4 (10,763 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
15,654 students enrolled
Created by infySEC Global
Last updated 5/2020
English
English [Auto-generated], French [Auto-generated], 1 more
  • German [Auto-generated]
Current price: $51.99 Original price: $74.99 Discount: 31% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Understand how to be a secured computer user
  • Understand how to be respond to various security incidents
  • Understand the need for Business Continuity planning and Disaster Recovery
  • How to become a cyber safe employee
Requirements
  • No prior training is required to take this course as we will start with the basics.
Description

Hi, welcome to our Information Security Awareness course.

The essential objective of this course is to create awareness within the organization regarding various basic requirements of the standard & impart working knowledge on how these requirements can be interpreted to suit the organization’s processes, products, people & customers.

The employees in most companies don’t take Information security seriously – not only the top managers, but also their peers.

This is due to the fact that the employees usually do not understand what information security or business continuity is all about – in other words, you may have perfect policies and procedures, but simply pushing those to your internal email list won’t help. You need to explain to your colleagues why information security and business continuity are needed, and how to perform certain tasks – that’s the main purpose of awareness and training.

In this course, we will teach you how employees, business owners and other computer users are compromised in this digitally connected world and also teach you how to safeguard themselves and their organization's information asset against various attacks. 

  • It helps each and every employee of an organization on various security policy and its importance.
  • It helps HR managers to learn how to recruit as per ISO 27001:2013 guidelines and how to run an effective employee induction program for better information security awareness.
  • It helps IT managers to learn how to securely handle data, media containing data and IT devices to ensure organization's information safety.
  • It also helps the business continuity manager on how to handle disaster at an event of disaster.

You will be encouraged to practice what you have learned in a simulated environment via our practice "Audio Visual Exercise" session.

We have designed this course to enable each and every computer user to safeguard themselves and their organization against identity theft and other credential breach from unauthorized users via technical and non-technical attack methods.

By the end of this course, you will be familiar with how various types of technical and non-technical attack methods are performed and you will be fully equipped to defend and safeguard yourself and your organization's information asset against various real-time attack vectors.

This course has been specifically designed by a team of information security researchers who are acknowledged experts in their field.

This course has been designed to accelerate your learning process through the use of creative animations and easy to understand voice over narratives. Complex concepts have been broken down into easy to understand modules.

Together, our team will walk you through the entire learning process step by step.

This course is a must for every computer user of an organization.No prior training is required to take this course as we will start with the basics. We welcome anyone with a thirst for learning. 

We look forward to having you join us. In the meantime, please feel free to take a look at our demo tutorial and exercise before you purchase the full course.

Who this course is for:
  • Employees of Organization who have implemented ISO27001 standard to safeguard their organization against various information security incidents.
  • Employees who need to have an awareness on Information security
  • This course is perfect for existing system, network and web administrators as well as anybody who is passionate about developing their skills in the field of information security.
Course content
Expand all 39 lectures 01:01:10
+ Introduction
7 lectures 13:28

This part provides an overview of the entire course structure.

Preview 01:25

This section briefs about the features of the course content and about the instructor.

Features of the course and Instructor
00:38

This lecture gives and insight about elements of information security.

Preview 02:05

The correlation between vulnerability-exploit and threat are discussed here.

Preview 01:53

This gives an insight of threat classification.

Threat Classification
02:52

This part gives an introduction to ISMS and Risk

Risk and Introduction to ISMS
01:44

This lecture gives an overview of ISO 27001:2013

Insights of ISO 27001:2013
02:51
+ Human Resource Security
9 lectures 18:19

This part gives an insight about the role of HR as a part of ISMS

HR Security
02:33

This part gives an overview on HR security and system security policy

HR Security Policy and System Security Policy
02:49

This lecture deals with Social engineering and its importance.

Social Engineering - Need for Information security awareness program
02:10

This part gives an overview on Clear desk policy and how to report an incident.

Clear/Clean Desk policy and How to report an incident?
02:35

This lecture deal with internet usage policy and its importance.

Internet usage policy
01:04

This part educates course participants on phishing.

Phishing drill
01:17

This lecture deals with Anti-spam and its importance.

Anti Spam - Cost Vs Benefit analysis
02:57

This part explains about the importance of Backup

Need for Backup and its types
01:49

This part deals with Incidence response.

Incident response
01:05
+ IT Security Policies
5 lectures 09:27

This part brief about wireless security policy.

Wireless Security policy
00:49

This part brief about remote access policy.

Preview 03:46

This part brief about Asset control policy.

Asset Control policy
01:12

This part brief about secure disposal policy

Secure disposal policy
02:14

This part brief about Access control policy.

Access Control policy
01:26
+ Business continuity planning and Disaster recovery methodology
4 lectures 07:19

This part brief about Business continuity planning and Disaster recovery methodology.

Business continuity planning and Disaster recovery methodology
02:19

This part brief about types of  DR sites.

Types of Disaster Recovery sites
01:52

This part brief about BCP DR with a situation and solution.

BCP DR - Sample situation and solution
02:04

This part brief about some popular Information security myths.

Information Security Myths
01:04
+ COVID-19 response Strategy-Information Security Awareness
5 lectures 05:52

At the end of this lecture, course takers will understand different types of medical conditions(Environmental threat) that may affect an organization's business continuity.

Medical Condition- Environmental Threat
01:13

At the end of this lecture, course takers will learn to manage the workforce during unforeseen circumstances due to medical conditions(Environmental threat) that may affect an organization's business continuity.

Workforce Management
00:57

At the end of this lecture, course takers will learn to manage operations during unforeseen circumstances due to medical conditions(Environmental threat) that may affect an organization's business continuity.

Operational planning & Continual monitoring
00:58

At the end of this lecture, course takers will learn to manage IT infrastructure during unforeseen circumstances due to medical conditions(Environmental threat) that may affect an organization's business continuity.

IT Infrastructure
00:40

At the end of this lecture, course takers will learn to handle cyber threats of multiple forms during unforeseen circumstances due to medical conditions(Environmental threat) that may affect an organization's business continuity.

Information security awareness
02:04
+ Scenario based Quiz
9 lectures 06:45

A video based quiz to review Information security concepts.

Preview 01:15

From "Video Quiz 1" lecture choose the appropriate answer

Quiz 1
1 question

A video based quiz to review Information security concepts.

Video Quiz 2
00:59

From the "Video Quiz 2" lecture choose the appropriate answer

Quiz 2
1 question

A video based quiz to review Information security concepts.

Video Quiz 3
00:28

From "Video Quiz 3" lecture choose the appropriate answer

Quiz 3
1 question

A video based quiz to review Information security concepts.

Video Quiz 4
00:48

From "Video Quiz 4" lecture choose the appropriate answer

Quiz 4
1 question

A video based quiz to review Information security concepts.

Video Quiz 5
00:39

From "Video Quiz 5" lecture choose the appropriate answer

Quiz 5
1 question

A video based quiz to review Information security concepts.

Video Quiz 6
00:40

From "Video Quiz 6" lecture choose the appropriate answer

Quiz 6
1 question

A video based quiz to review Information security concepts.

Video Quiz 7
00:47

From "Video Quiz 7" lecture choose the appropriate answer

Quiz 7
1 question

A video based quiz to review Information security concepts.

Video Quiz 8
00:26

From "Video Quiz 8" lecture choose the appropriate answer

Quiz 8
1 question

A video based quiz to review Information security concepts.

Video Quiz 9
00:43

From "Video Quiz 9" lecture choose the appropriate answer

Quiz 9
1 question