Enterprise Information Security Management: Introduction
5.0 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
17 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Enterprise Information Security Management: Introduction to your Wishlist.

Add to Wishlist

Enterprise Information Security Management: Introduction

Volume 1 of the Enterprise Information Security Management series course
5.0 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
17 students enrolled
Last updated 6/2017
English
English
Current price: $10 Original price: $90 Discount: 89% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • 7 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Students will learn current security condition of enterprise/organizations today, and basic knowledge of Enterprise Information Security Management.
  • Will gain understanding on needs and value of enterprise information security management, build a foundation to go further towards an career role even an expert on it.
View Curriculum
Requirements
  • You should know basic concept of IT security and enterprise management.
Description

As first part of a series course on enterprise information security management, this course brings you understanding of the big picture, including background, key terms and definitions, need for information security management, also provides an overview of how to achieve security.

In later modules, we'll bring you to:

  • Identify the problem associated with information security management;
  • Consider (through the use of case studies) the ways in which various organizations solve these problems;
  • Consider Organization and People, as well as Tools and methods of information security.
  • Learn Security Operations, Internal Control, Audit, and Security, as well as other comprehensive planning and management skills.
Who is the target audience?
  • Information Security Managers
  • CISO
  • Security Practitioners
  • Security Architects
  • Security Engineers
  • Risk Analysts
  • Compliance Managers
  • IT Auditors
  • IT Managers
Compare to Other Information Security Courses
Curriculum For This Course
+
Key Terms and Definitions
5 Lectures 08:02

2.2 Threat
02:09

2.3 Vulnerability, Attack, Exploit Code and Social Engineering
02:10

2.4 Risk and Impact
01:55

2.5 Risk Management, Analysis and Assessment
01:35
+
A Brief History of Insecurity
7 Lectures 13:02
3.1 Risks in Systems and Network Environment
00:53

3.2 Worms
03:59

3.3 Virus
02:06

3.4 Trojan Horse
02:05

3.5 Period of Experimental Exploitation
01:16

3.6 Entering a Period of Criminal Exploitation
01:48

3.7 Recent Evolutions
00:55
+
Types of Security
6 Lectures 09:18
4.1 Types of Security
00:23

4.2 Risk,Uncertainty and Target of Protection
01:43

4.3 Difference Between Data Security and Information Security
02:41

4.4 Defining Information Security
01:25

4.5 ISO/IEC 27000 Definition
00:49

4.6 Parkerian’s Hexad
02:17
+
Needs for Information Security Management
3 Lectures 03:19
5.1 Needs for Information Security Management
00:23

5.2 Uncertainty, Compliance and Governance
01:51

5.3 Information Security as Business Enabler and Needs
01:05
+
Achieving Security
5 Lectures 05:54
6.1 Clarify Objectives & Requirements, and Information Security Strategy
01:38

6.2 Organization, Structure, Reporting, and People
01:27

6.3 Security Operations
01:00

6.4 Verify & Validate, and Ready for Contingency
01:21

6.5 Conclusion
00:28
+
Summary
1 Lecture 00:46
Summary of ISM Introduction Course
00:46
About the Instructor
CRC Press
4.8 Average rating
2 Reviews
30 Students
3 Courses
A premier global publisher of science & technology resources

Publishing books since 1913, CRC Press is a premier global publisher of science, technology, and medical resources. We offer unique, trusted content by expert authors, spreading knowledge and promoting discovery worldwide. We aim to broaden thinking and advance understanding in the sciences, providing researchers, academics, professionals, and students with the tools they need to share ideas and realize their potential.
CRC Press is a member of Taylor & Francis Group, an Informa business.

Meng-Chow Kang
5.0 Average rating
1 Review
17 Students
2 Courses
Head of Security Assurance, AWS APAC

Meng-Chow Kang is Head of Security Assurance in Asia Pacific Region at Amazon Web Services. He was Director and Chief Information Security Officer of Cisco Systems Asia Pacific, China and Japan from Feb 2009 to June 2017. He’s also one of the board members of ISC2. Besides serving as Convenor, or Chair of the Security Controls and Services Working Group in ISO/IEC JTC 1/SC 27, and a co-Rapporteur for ITU-T SG17 previously, he is also Adjunct Associate Professor at Nanyang Technological University of Singapore. 

Dr. Kang received his MSc degree in Information Security from the Royal Holloway and Bedford New College, University of London, and a PhD in Information Security Risk Management at the Southern Cross University, Australia. He has been a Certified Information Systems Security Professional (CISSP) since 1998.

Dr. Kang is author of the CRC Press book Responsive Security: Be Ready to Be Secure.