Information Security Management Fundamentals for Non-Techies – Alton Hardin

In Stock

$15.00

Information Security Management Fundamentals for Non-Techies – Alton Hardin Download. Are you a non-techie interested in learning about information securit…

PURCHASE THIS COURSE, YOU ACCUMLATE: 15 POINTs!


Quantity

Buy Information Security Management Fundamentals for Non-Techies – Alton Hardin Course at GBesy. We actively participate in Groupbuys and are committed to sharing knowledge with a wider audience. Rest assured, the quality of our courses matches that of the original sale page. If you prefer, you can also buy directly from the sale page at the full price (the SALEPAGE link is directly provided in the post).

Salepage link: At HERE. Archive: http://archive.is/wip/VbdqQ

$49   $20 – Information Security Management Fundamentals for Non-Techies – Alton Hardin

Hours of Content: 7

INFORMATION SECURITY DEMYSTIFIED FOR NON-TECHIES

Are you a non-techie interested in learning about information security? Are you a business or aspiring IT professional that needs to better understand how cyber security works? Then you have come to the right place!

This course will teach you the fundamentals of information security and essential cyber security core principles, designed for Non-Techies!

WHAT YOU’LL LEARN IN THIS COURSE:

  • Why We Need Information Security
  • Information Security Core Principles
  • Fundamental Access Control Concepts
  • Basic Network Zones
  • Fundamental Network Security Devices
  • Hardening Systems
  • Fundamentals Security Threats
  • Disaster Recovery Basics
  • I.T. Personnel Policies
  • And Much More…

COURSE MINI-CASE SCENARIOS

You’ll also learn by the “case method” that is commonly used in both law and business school. I will be creating and uploaded course mini-cases, where I walk through and complete the entire case for you while you are watching. This will hopefully help you to think about the course and all of it’s topics holistically and synergistic-ally.

Once you complete this course, you’ll understand the core principles of information security to help you better protect your I.T. and business infrastructure!

What are the requirements?

  • A Basic Understanding of Computers
  • A Desire to Learn

What am I going to get from this course?

  • Understand the Fundamentals of Information Security Management
  • Have a Working Understanding of The Many Aspects of IT Security
  • Be Prepared for More Advanced Information Security Courses
  • Better Protect Your Business & I.T. Infrastructure

What is the target audience?

  • Non-Techies Wanting to Learn About Information Security
  • Business & IT Managers Needing a Working Knowledge of Information Security
  • Aspiring & Inexperienced IT Professionals
  • This Course Is NOT for Seasoned & Experienced IT & Cyber Security Professionals

Course Curriculum

Course Introduction

  • 1. Welcome to the Course (4:51)
  • 2. What This Course Is & What It Isn’t (4:45)
  • 3. How to Get The Most Out Of This Course (1:51)
  • 4. Instructor Introduction (2:25)
  • 5. Discussion Board Activity- Introduce Yourself (0:38)

Getting Started In Information Security

  • 6. The Many Areas of Information Security (8:27)
  • 7. Beginning Point Certifications & Degrees (13:05)

The Need for Information Security

  • 9. The Need for Information Security (12:19)
  • 10. Optional Student Activity- Vimeo & Youtube Videos to Watch (12:01)
  • 11. Links: Videos to Watch

Information Security Principles

  • 13. Section Introduction (0:55)
  • 14. The CIA Triad (7:57)
  • 15. More Concepts (6:41)
  • 16. Authentication Basics (12:42)
  • 17. Identify Proofing (3:44)
  • 18. General Password Rules (8:27)
  • 19. Designing an Authentication Strategy with Microsoft Technet (11:11)

Access Control

  • 20. Section Introduction (0:47)
  • 21. Access Control (14:31)
  • 22. Physical and Logical Access Controls (17:01)
  • 23. Defense in Depth (6:04)
  • 24. Access Control Models (13:30)
  • 25. Student Activity- Analyzing Your Organization’s Access Control (2:29)

Basic Network Zones

  • 26. Basic Network Zones (0:52)
  • 27. Internet (1:53)
  • 28. DMZ (3:27)
  • 29. Extranet (3:22)
  • 30. Intranet (3:26)
  • 31. Mini-Case Scenario- Secure Network Design (11:57)

Network Security Devices

  • 32. Section Introduction (1:31)
  • 33. Firewalls (5:53)
  • 34. Proxy Servers (7:03)
  • 35. Intrusion Detection & Prevention Systems (7:40)
  • 36. Virtual Private Networks (8:24)

Hardening Systems

  • 37. Hardening a System (10:15)
  • 38. Patch and Change Management (5:31)

Network Threats & Vulnerabilities

  • 39. Transmission Media Security Concerns (12:33)
  • 40. Wireless Networking Security Concerns (18:47)
  • 41. Network-Based Threats and Attacks (19:56)
  • 42. Student Activity: Locking Down Your Home’s Wi-Fi

Network Scanning Tools

  • 43. SuperScan Port Scanner (8:24)
  • 44. Nmap Zenmap Network Scanner (6:44)
  • 45. Tenable Nessus Vulnerability Scanner (10:56)

Security Malware Threats

  • 46. Introduction to Malware (0:35)
  • 47. Viruses (4:29)
  • 48. Worms (2:32)
  • 49. Trojan Horses (2:14)
  • 50. Logic Bombs (2:40)
  • 51. Spyware and Adware (2:59)
  • 52. Protecting Against Malware (4:49)
  • 53. Social Engineering Attacks (8:04)
  • 54. Why Social Engineering Succeeds (3:57)

Introduction to Crytography

  • 55. Introduction to Crytography (9:25)
  • 56. Symmetric Encryption (3:42)
  • 57. Asymmetric Encryption (4:26)
  • 58. Hashing Algorithms (4:45)

Disaster Recovery

  • 59. Disaster Recovery (3:25)
  • 60. Disaster Planning and Testing (4:24)
  • 61. Disaster Recovery and Redunancy (8:33)
  • 62. The Disaster Recovery Planning Process (11:37)

Personnel Policies

  • 63. Section Introduction (2:02)
  • 64. Acceptable Use (2:49)
  • 65. Code of Ethics (3:27)
  • 66. Mandatory Vacations (2:39)
  • 67. Separation of Duties (3:40)
  • 68. Job Rotation (2:06)
  • 69. Education and Training (4:00)

Class Mini-Case Scenarios

  • 70. Mini-Case Scenario #1- Small Tax Accounting Office (19:01)

Congratulations!

  • 72. Congratulations (2:05)
  • 73. What’s Next (1:07)

$49   $20 – Information Security Management Fundamentals for Non-Techies – Alton Hardin


Buy the Information Security Management Fundamentals for Non-Techies – Alton Hardin course at the best price at GBesy.. After your purchase, you will get access to the downloads page. You can download all the files associated in your order at here and we will also send a download notification email via your mail.

Unlock your full potential with Information Security Management Fundamentals for Non-Techies – Alton Hardin courses. our courses are designed to help you excel.

Why wait? Take the first step towards greatness by purchasing Information Security Management Fundamentals for Non-Techies – Alton Hardin courses today. We offer a seamless and secure purchasing experience, ensuring your peace of mind. With our trusted payment gateways, Stripe and PayPal, you can confidently complete your transaction knowing that your financial information is protected.

Stripe, known for its robust security measures, provides a safe and reliable payment process. With its encrypted technology, your sensitive data remains confidential throughout the transaction. Rest assured that your purchase is protected.

PayPal, a globally recognized payment platform, offers an additional layer of security. With its buyer protection program, you can feel confident in your purchase. PayPal ensures that your financial details are safeguarded, allowing you to focus on your learning journey.

Is it secure? to Use of?
How can this course be delivered?
  • After your successful payment this “Information Security Management Fundamentals for Non-Techies – Alton Hardin course”, Most of the products will come to you immediately. But for some products were posted for offer. Please wait for our response, it might take a few hours due to the time zone difference.
  • If this happens, please wait. The technical department will process the link shortly after. You will receive notifications directly by e-mail. We appreciate your wait.
What Shipping Methods Are Available?
How Do I Track Order?
  • We always notice the status of your order immediately after your payment. After 7 days if there is no download link, the system will automatically complete your money.
  • We love to hear from you. Please don’t hesitate to email us with any comments, questions and suggestions.
Status

Language

Author

Reviews

There are no reviews yet.

Be the first to review “Information Security Management Fundamentals for Non-Techies – Alton Hardin”

Your email address will not be published. Required fields are marked *

Back to Top