In this era of advanced technology almost all organizations are adopting and depending on the information technology as they grow and flourish and in this age, information is the most valuable thing. This is why the organizations are very concerned about the security of their information. course provides students with an overview of Information Security concepts and practices.
Facilities
Location
Start date
Online
Start date
Different dates availableEnrolment now open
About this course
The Students will understand the basic concepts of Information Security
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you
We are verifying your question adjusts to our publishing rules. According to your answers, we noticed you might not be elegible to enroll into this course, possibly because of: qualification requirements, location or others. It is important you consult this with the Centre.
Thank you!
We are reviewing your question. We will publish it shortly.
Or do you prefer the center to contact you?
Reviews
Have you taken this course? Share your opinion
This centre's achievements
2021
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
IT risk
Planning and Business
Industry
Technology
Property
Planning
Ethics
Risk Management
Access
Risk
Business Continuity
Business Strategy
Access Control
Security Awareness
Intellectual Property
Course programme
Introduction
5 lectures16:46Introduction to information SecurityconfidentialityIntegrityAvailabilityBalanced Security
Introduction
5 lectures16:46Introduction to information SecurityconfidentialityIntegrityAvailabilityBalanced SecurityIntroduction to information SecurityIntroduction to information SecurityIntroduction to information SecurityIntroduction to information SecurityconfidentialityconfidentialityconfidentialityconfidentialityIntegrityIntegrityIntegrityIntegrityAvailabilityAvailabilityAvailabilityAvailabilityBalanced SecurityBalanced SecurityBalanced SecurityBalanced Security
Information security governance principles
4 lectures23:21Alignment Of Security Function To Business Strategy, Goals, Mission, ObjectiveInformation Security Organizational ProcessesInformation Security control frameworksInformation Security Roles and Responsibilities
Information security governance principles
4 lectures23:21Alignment Of Security Function To Business Strategy, Goals, Mission, ObjectiveInformation Security Organizational ProcessesInformation Security control frameworksInformation Security Roles and ResponsibilitiesAlignment Of Security Function To Business Strategy, Goals, Mission, ObjectiveAlignment Of Security Function To Business Strategy, Goals, Mission, ObjectiveAlignment Of Security Function To Business Strategy, Goals, Mission, ObjectiveAlignment Of Security Function To Business Strategy, Goals, Mission, ObjectiveInformation Security Organizational ProcessesInformation Security Organizational ProcessesInformation Security Organizational ProcessesInformation Security Organizational ProcessesInformation Security control frameworksInformation Security control frameworksInformation Security control frameworksInformation Security control frameworksInformation Security Roles and ResponsibilitiesInformation Security Roles and ResponsibilitiesInformation Security Roles and ResponsibilitiesInformation Security Roles and Responsibilities
Compliance
1 lecture06:46Legal, industry standards, and regulatory requirements
Compliance
1 lecture06:46Legal, industry standards, and regulatory requirementsLegal, industry standards, and regulatory requirementsLegal, industry standards, and regulatory requirementsLegal, industry standards, and regulatory requirementsLegal, industry standards, and regulatory requirements
Computer Crime
2 lectures09:44Computer CrimeSoftware Licensing and Intellectual Property
Computer Crime
2 lectures09:44Computer CrimeSoftware Licensing and Intellectual PropertyComputer CrimeComputer CrimeComputer CrimeComputer CrimeSoftware Licensing and Intellectual PropertySoftware Licensing and Intellectual PropertySoftware Licensing and Intellectual PropertySoftware Licensing and Intellectual Property
Information Security Policy and strategy
0 lectures00:00
Information Security Policy and strategy
0 lectures00:00
Risk Management
4 lectures23:01RISK MANAGEMENT CONCEPTSAsset Value and CostsCountermeasure SelectionAccess control Types
Risk Management
4 lectures23:01RISK MANAGEMENT CONCEPTSAsset Value and CostsCountermeasure SelectionAccess control TypesRISK MANAGEMENT CONCEPTSRISK MANAGEMENT CONCEPTSRISK MANAGEMENT CONCEPTSRISK MANAGEMENT CONCEPTSAsset Value and CostsAsset Value and CostsAsset Value and CostsAsset Value and CostsCountermeasure SelectionCountermeasure SelectionCountermeasure SelectionCountermeasure SelectionAccess control TypesAccess control TypesAccess control TypesAccess control Types
Business Continuity Planning
1 lecture09:29Business Continuity Planning
Business Continuity Planning
1 lecture09:29Business Continuity PlanningBusiness Continuity PlanningBusiness Continuity PlanningBusiness Continuity PlanningBusiness Continuity Planning
Information security awareness, education, and training program
2 lectures09:04Information Security Awareness, Education, And Training ProgramInformation Security Training Methods
Information security awareness, education, and training program
2 lectures09:04Information Security Awareness, Education, And Training ProgramInformation Security Training MethodsInformation Security Awareness, Education, And Training ProgramInformation Security Awareness, Education, And Training ProgramInformation Security Awareness, Education, And Training ProgramInformation Security Awareness, Education, And Training ProgramInformation Security Training MethodsInformation Security Training MethodsInformation Security Training MethodsInformation Security Training Methods
Professional Ethics
1 lecture03:20Code of Ethics
Professional Ethics
1 lecture03:20Code of EthicsCode of EthicsCode of EthicsCode of EthicsCode of Ethics