Enterprise Information Security Management: Introduction
5.0 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
17 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Enterprise Information Security Management: Introduction to your Wishlist.

Add to Wishlist

Enterprise Information Security Management: Introduction

Volume 1 of the Enterprise Information Security Management series course
5.0 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
17 students enrolled
Last updated 6/2017
Current price: $10 Original price: $90 Discount: 89% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 1 hour on-demand video
  • 7 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Students will learn current security condition of enterprise/organizations today, and basic knowledge of Enterprise Information Security Management.
  • Will gain understanding on needs and value of enterprise information security management, build a foundation to go further towards an career role even an expert on it.
View Curriculum
  • You should know basic concept of IT security and enterprise management.

As first part of a series course on enterprise information security management, this course brings you understanding of the big picture, including background, key terms and definitions, need for information security management, also provides an overview of how to achieve security.

In later modules, we'll bring you to:

  • Identify the problem associated with information security management;
  • Consider (through the use of case studies) the ways in which various organizations solve these problems;
  • Consider Organization and People, as well as Tools and methods of information security.
  • Learn Security Operations, Internal Control, Audit, and Security, as well as other comprehensive planning and management skills.
Who is the target audience?
  • Information Security Managers
  • CISO
  • Security Practitioners
  • Security Architects
  • Security Engineers
  • Risk Analysts
  • Compliance Managers
  • IT Auditors
  • IT Managers
Compare to Other Information Security Courses
Curriculum For This Course
Key Terms and Definitions
5 Lectures 08:02

2.2 Threat

2.3 Vulnerability, Attack, Exploit Code and Social Engineering

2.4 Risk and Impact

2.5 Risk Management, Analysis and Assessment
A Brief History of Insecurity
7 Lectures 13:02
3.1 Risks in Systems and Network Environment

3.2 Worms

3.3 Virus

3.4 Trojan Horse

3.5 Period of Experimental Exploitation

3.6 Entering a Period of Criminal Exploitation

3.7 Recent Evolutions
Types of Security
6 Lectures 09:18
4.1 Types of Security

4.2 Risk,Uncertainty and Target of Protection

4.3 Difference Between Data Security and Information Security

4.4 Defining Information Security

4.5 ISO/IEC 27000 Definition

4.6 Parkerian’s Hexad
Needs for Information Security Management
3 Lectures 03:19
5.1 Needs for Information Security Management

5.2 Uncertainty, Compliance and Governance

5.3 Information Security as Business Enabler and Needs
Achieving Security
5 Lectures 05:54
6.1 Clarify Objectives & Requirements, and Information Security Strategy

6.2 Organization, Structure, Reporting, and People

6.3 Security Operations

6.4 Verify & Validate, and Ready for Contingency

6.5 Conclusion
1 Lecture 00:46
Summary of ISM Introduction Course
About the Instructor
CRC Press
4.8 Average rating
2 Reviews
30 Students
3 Courses
A premier global publisher of science & technology resources

Publishing books since 1913, CRC Press is a premier global publisher of science, technology, and medical resources. We offer unique, trusted content by expert authors, spreading knowledge and promoting discovery worldwide. We aim to broaden thinking and advance understanding in the sciences, providing researchers, academics, professionals, and students with the tools they need to share ideas and realize their potential.
CRC Press is a member of Taylor & Francis Group, an Informa business.

Meng-Chow Kang
5.0 Average rating
1 Review
17 Students
2 Courses
Head of Security Assurance, AWS APAC

Meng-Chow Kang is Head of Security Assurance in Asia Pacific Region at Amazon Web Services. He was Director and Chief Information Security Officer of Cisco Systems Asia Pacific, China and Japan from Feb 2009 to June 2017. He’s also one of the board members of ISC2. Besides serving as Convenor, or Chair of the Security Controls and Services Working Group in ISO/IEC JTC 1/SC 27, and a co-Rapporteur for ITU-T SG17 previously, he is also Adjunct Associate Professor at Nanyang Technological University of Singapore. 

Dr. Kang received his MSc degree in Information Security from the Royal Holloway and Bedford New College, University of London, and a PhD in Information Security Risk Management at the Southern Cross University, Australia. He has been a Certified Information Systems Security Professional (CISSP) since 1998.

Dr. Kang is author of the CRC Press book Responsive Security: Be Ready to Be Secure.