Course Highlights
  • Understand the Fundamentals of Information Security Management
  • Have a Working Understanding of The Many Aspects of IT Security
  • Be Prepared for More Advanced Information Security Courses
  • Better Protect Your Business & I.T. Infrastructure
Curriculum

7 Topics
Welcome to the Course!
Why Learn Information Security Management From Me?
What This Course Is & What It Isn't
Course Curriculum Overview
Course-Taking Interface Tips & Tricks
Download Course Lecture PDFs and the Udemy Ratings System
Student Exercise: Introduce Yourself

3 Topics
The Many Areas of Information Security
The State of Cybersecurity in 2023
The Most Valuable Beginner IT Security Certifications for 2023

13 Topics
Section Introduction
The CIA Triad
Authentication Authorization and Accounting (AAA)
Defense in Depth
Least Privilege
Non-Repudiation
Implicit Deny
Legal and Regulatory Issues
Information Security Governance
Authentication Basics
Identify Proofing
General Password Rules
Information Security Principles Quiz

8 Topics
Section Introduction
Introduction to Risk Management
Risk Management Process
Exploring Risks and Threats
Quantitative Risk Analysis
Attack Surface Analysis
Student Exercise: Qualitative Risk Assessment
Risk Management Quiz

6 Topics
Section Introduction
Identifying and Classifying Assets
Understanding the Asset Lifecycle
Data Retention
Understanding Data States
Asset Management Quiz

7 Topics
Section Introduction
Access Control
Physical and Logical Access Controls
Access Control Models
Attribute-Based Access Controls (ABAC)
Student Activity: Analyzing Your Organization's Access Control
Access Control Quiz

13 Topics
Section Introduction
Introduction to IT Audits
Role of IT Audits
Benefits of IT Audits
Risk of Not Performing IT Audits
IT Audit Process and Phases
Audit and Control Objectives
Gathering Evidence
Documenting and Reporting
IT Audit Frameworks
Student Activity: Auditing Your Home Network
Student Exercise Takeaway: Auditing Your Home Network
IT Auditing Quiz

5 Topics
Section Introduction
What is Compliance?
Achieving & Maintaining Compliance
Laws Regulations & Compliance Frameworks
Compliance Laws and Regulations Quiz

14 Topics
Section Introduction
Buffer Overflows
Viruses and Polymorphic Viruses
Worms
Trojan Horses
Logic Bombs
Spyware and Adware
Ransomware
Rootkits
Zero Day Attacks
Protecting Against Malware
Case Study: WannaCry Ransomware Attack
Student Exercise: WannaCry Case Study Analysis
Security Malware Threats Quiz

12 Topics
Section Introduction
Social Engineering
Social Engineering Phone Impersonation Scenarios Overview
Social Engineering Phone Call Impersonation Example #1
Social Engineering Phone Call Impersonation Example #2
Social Engineering Phone Call Impersonation Example #3
Social Engineering Phone Impersonation Scenarios Discussion
Email Spam Spoofing Phishing and Pharming
Protocol Spoofing
Common Attack Methods
Student Exercise: Phishing Campaign
Additional Threats & Vulnerabilities Quiz

9 Topics
Section Introduction
Introduction to Network Isolation
Demilitarized Zone (DMZ)
Basic Network Zones
Virtual LANs (VLANs)
Routers
Network Address Translation (NAT)
Access Control Lists (ACLs)
Network Segmentation & Isolation Quiz

8 Topics
Section Introduction
Virtual Private Networks
Firewalls
Web Proxy Servers
Honeypots
Intrusion Detection & Prevention Systems
Student Activity: Network Security
Network Security Quiz

12 Topics
Section Introduction
Wireless Encryption Standards
Wireless Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access 2 (WPA2)
Wi-Fi Protected Access 3 (WPA3)
WPA Enterprise vs. Personal Mode
Wireless Network Vulnerabilities & Security
Common Wireless Security Threats
Case Study: TJX Companies Inc. (TJX) WEP Exploit Data Breach
Student Exercise: TJX Case Study Analysis
Wireless Security Quiz

8 Topics
Section Introduction
Open-Source Intelligence (OSINT)
Vulnerability Assessments
Penetration Testing
Exploit Frameworks
Interview with a Professional Ethical Hacker Blog Article
Security Assessments
Security Assessments and Testing Quiz

7 Topics
Section Introduction
Wireshark Network Sniffing
Nmap Zenmap Network Scanner
Tenable Nessus Vulnerability Scanner
Ethical Hacking for Beginners (YouTube Series)
Case Study: Equifax Web App Vulnerability
Student Exercise: Equifax Case Study Analysis

6 Topics
Section Introduction
Hardening End-User Systems
Hardening Servers
Patch and Change Management
Separation of Services
Hardening Systems Quiz

12 Topics
Section Introduction
Introduction to Cryptography
Symmetric Encryption
Asymmetric Encryption
Hashing Algorithms
Digital Certificates and Certificate Authorities (Updated 2021 Lecture)
Email Encryption Use Cases
Windows Encrypted File System Use Case
Revisiting VPN
Software versus Hardware-Based Encryption
Student Activity: Explore Hashing
Introduction to Cryptography Quiz

7 Topics
Section Introduction
Understanding Incidents and Disasters
Incident Response
Disaster Recovery and Business Continuity
Case Study: British Airways IT Failure
Student Exercise: British Airways Case Study Analysis
Incident Response DRP and BCP Quiz

6 Topics
Section Introduction
Importance of IT Security in Application Development
Software Development Lifecycle (SDLC)
Static and Dynamic Testing
Authorization to Operate (ATO)
Application Development Security Quiz

9 Topics
Section Introduction
What is Zero Trust?
Tenets of Zero Trust
Why Do We Need Zero Trust?
Digital Transformation & Zero Trust
The NIST Zero Trust Architectural (ZTA) Model
The State of Zero Trust
Student Activity: Your Organization & Zero Trust
Zero Trust Quiz

9 Topics
Section Introduction
Acceptable Use
Code of Ethics
Mandatory Vacations
Separation of Duties
Job Rotation
Education and Training
Student Activity: Acceptable Use Policy
Personnel Policies Quiz

4 Topics
Congratulations!
Optional Student Feedback Request
How to Download Your Udemy Course Certificate of Completion
Your Bonus Lecture

  Write a Review

Information Security Management Fundamentals for Non-Techies

Go to Paid Course