Information Security For Beginners-2019

Course

Online

£ 10 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

In this era of advanced technology almost all organizations are adopting and depending on the information technology as they grow and flourish and in this age, information is the most valuable thing. This is why the organizations are very concerned about the security of their information. course provides students with an overview of Information Security concepts and practices.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

The Students will understand the basic concepts of Information Security

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • IT risk
  • Planning and Business
  • Industry
  • Technology
  • Property
  • Planning
  • Ethics
  • Risk Management
  • Access
  • Risk
  • Business Continuity
  • Business Strategy
  • Access Control
  • Security Awareness
  • Intellectual Property

Course programme

Introduction 5 lectures 16:46 Introduction to information Security confidentiality Integrity Availability Balanced Security Introduction 5 lectures 16:46 Introduction to information Security confidentiality Integrity Availability Balanced Security Introduction to information Security Introduction to information Security Introduction to information Security Introduction to information Security confidentiality confidentiality confidentiality confidentiality Integrity Integrity Integrity Integrity Availability Availability Availability Availability Balanced Security Balanced Security Balanced Security Balanced Security Information security governance principles 4 lectures 23:21 Alignment Of Security Function To Business Strategy, Goals, Mission, Objective Information Security Organizational Processes Information Security control frameworks Information Security Roles and Responsibilities Information security governance principles 4 lectures 23:21 Alignment Of Security Function To Business Strategy, Goals, Mission, Objective Information Security Organizational Processes Information Security control frameworks Information Security Roles and Responsibilities Alignment Of Security Function To Business Strategy, Goals, Mission, Objective Alignment Of Security Function To Business Strategy, Goals, Mission, Objective Alignment Of Security Function To Business Strategy, Goals, Mission, Objective Alignment Of Security Function To Business Strategy, Goals, Mission, Objective Information Security Organizational Processes Information Security Organizational Processes Information Security Organizational Processes Information Security Organizational Processes Information Security control frameworks Information Security control frameworks Information Security control frameworks Information Security control frameworks Information Security Roles and Responsibilities Information Security Roles and Responsibilities Information Security Roles and Responsibilities Information Security Roles and Responsibilities Compliance 1 lecture 06:46 Legal, industry standards, and regulatory requirements Compliance 1 lecture 06:46 Legal, industry standards, and regulatory requirements Legal, industry standards, and regulatory requirements Legal, industry standards, and regulatory requirements Legal, industry standards, and regulatory requirements Legal, industry standards, and regulatory requirements Computer Crime 2 lectures 09:44 Computer Crime Software Licensing and Intellectual Property Computer Crime 2 lectures 09:44 Computer Crime Software Licensing and Intellectual Property Computer Crime Computer Crime Computer Crime Computer Crime Software Licensing and Intellectual Property Software Licensing and Intellectual Property Software Licensing and Intellectual Property Software Licensing and Intellectual Property Information Security Policy and strategy 0 lectures 00:00 Information Security Policy and strategy 0 lectures 00:00 Risk Management 4 lectures 23:01 RISK MANAGEMENT CONCEPTS Asset Value and Costs Countermeasure Selection Access control Types Risk Management 4 lectures 23:01 RISK MANAGEMENT CONCEPTS Asset Value and Costs Countermeasure Selection Access control Types RISK MANAGEMENT CONCEPTS RISK MANAGEMENT CONCEPTS RISK MANAGEMENT CONCEPTS RISK MANAGEMENT CONCEPTS Asset Value and Costs Asset Value and Costs Asset Value and Costs Asset Value and Costs Countermeasure Selection Countermeasure Selection Countermeasure Selection Countermeasure Selection Access control Types Access control Types Access control Types Access control Types Business Continuity Planning 1 lecture 09:29 Business Continuity Planning Business Continuity Planning 1 lecture 09:29 Business Continuity Planning Business Continuity Planning Business Continuity Planning Business Continuity Planning Business Continuity Planning Information security awareness, education, and training program 2 lectures 09:04 Information Security Awareness, Education, And Training Program Information Security Training Methods Information security awareness, education, and training program 2 lectures 09:04 Information Security Awareness, Education, And Training Program Information Security Training Methods Information Security Awareness, Education, And Training Program Information Security Awareness, Education, And Training Program Information Security Awareness, Education, And Training Program Information Security Awareness, Education, And Training Program Information Security Training Methods Information Security Training Methods Information Security Training Methods Information Security Training Methods Professional Ethics 1 lecture 03:20 Code of Ethics Professional Ethics 1 lecture 03:20 Code of Ethics Code of Ethics Code of Ethics Code of Ethics Code of Ethics

Additional information

Basic Understanding of the Information Technology

Information Security For Beginners-2019

£ 10 + VAT