MindEdge Online Learning

Introduction to Information Security

Introduction to Information Security

Introduction to Information Security Course will introduce learners to the basic concepts and components of securing electronic data and information over computer networks, systems, applications, and other technologies. With an increase in the volume and magnitude of data breaches and cyber-attacks in recent years, information security has never been more vital.

This course covers common cyber-threats, including types of malware and viruses, and examines the common defense measures organizations take to protect against them. It also provides a solid basis in many of the IT areas—including networks, software, and computer architecture—needed to understand the methodologies for securing them. The course is intended to give managers, technology professionals, and those interested in entering the information security profession a good foundation in the subject.

Topics covered in this course include common cyber-attack methods and defenses, trends and modern strategies in information security, access control models and methodologies, types of networks, network components, and how networks work, firewall types and how they work, wireless networks, IT security risk management strategies, policies and standards that govern the information security function, the systems development life cycle, application security controls, cryptography and the role of encryption in information security, security architectures and designing holistic security programs, the trusted computing base, business continuity and disaster recovery planning from an IT perspective, managing the human component of information security, the legal and regulatory issues that involve information security, and physical security. 

 

Module 1: Introduction and Access Controls

Module 2: Telecom and Network Security

Module 3: Information Security Governance and Risk Management

Module 4: Software Development Security

Module 5: Cryptography

Module 6: Security Architecture and Design

Module 7: Security Operations

Module 8: Business Continuity and Disaster Recovery Planning

Module 9: Legal, Regulations, Investigations, and Compliance

Module 10: Physical Security