Course Highlights
  • Explain the concept of information security.
  • Describe three requirements in information security.
  • Identify possible vulnerabilities, attacks and threats involved in the information security.
  • Describe activities required in information security risk management.
Curriculum

4 Topics
Getting Started
What is information security
Three requirements in information security
Weekly wrap up

5 Topics
Definition of Data breach
Vulnerabilities
Differences between Threats and Attacks
What is Risk?
Weekly wrap up

  Write a Review

Introduction to Information Security Management

Go to Paid Course