This course is designed for those interested to learn the basic knowledge you need to assign the appropriate level of value to your information. Also, for those who want to become aware of the risks and threats that could compromise your information and learn the practical steps to protect your valuable information assets. Read more.
Mclearn team was started in 2018 with a vision to empower people and businesses worldwide with great learning - any time, any place and on any device.
Access all courses in our library for only $9/month with All Access Pass
Get Started with All Access PassBuy Only This CourseAbout This Course
Who this course is for:
- This course is designed for IT professionals
What you’ll learn:Â
- This course will provide the basic knowledge you need to assign the appropriate level of value to your information and become aware of the risks and threats that could compromise your information.
This course is an entry-level Information Security course that is designed for everyone who utilizes computer technology in their daily life. Whether you use technology for business or personal reasons, this course will provide you with the basic knowledge you need to assign the appropriate level of value to your information, become aware of the risks and threats that could compromise your information, and take some practical steps to protect your valuable information assets.
Our Promise to You
By the end of this course, you will have learned about information technology security threats and risks that could compromise your information and also learn how to protect this valuable information.
10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about the information technology security threats and risks.
Course Curriculum
Section 1 - Introduction | |||
Setting The Stage | 00:00:00 | ||
Course Flow Overview | 00:00:00 | ||
Module Content Overview | 00:00:00 | ||
Scenario Overview | 00:00:00 | ||
Section 2 - Understanding Basic Information Concepts | |||
Defining Information | 00:00:00 | ||
Understanding The Value Of DIKW | 00:00:00 | ||
How Information Systems Add Value | 00:00:00 | ||
Managing Information Lifecycle | 00:00:00 | ||
Exercise Your Knowledge Of DIKW | 00:00:00 | ||
Section 3 - Determining The Value Of Information Assets | |||
Information As A Business Asset | 00:00:00 | ||
Information As A Production Factor And A Product | 00:00:00 | ||
Using Process To Manage Assets | 00:00:00 | ||
Section 4 - Leveraging Operational Process Types to Manage Assets | |||
Leveraging Operational Process Types To Manage Assets | 00:00:00 | ||
Creating Value Stream | 00:00:00 | ||
Section 5 - Achieving Information Reliability Through Security | |||
Using The CIA Principles Of Information Security | 00:00:00 | ||
The Attributes Of Information Reliability | 00:00:00 | ||
Developing An Asset Classification Criteria | 00:00:00 | ||
Classifying Assets To Apply Proper Level Of Security | 00:00:00 | ||
Section 6 - Preparing To Manage Threats And Risks | |||
Defining Threats, Vulnerabilities, And Risks | 00:00:00 | ||
Risk Management | 00:00:00 | ||
Risk Treatment | 00:00:00 | ||
Incident And Disasters | 00:00:00 | ||
Section 7 - Categorizing Threats, Identifying Damage, And Calculating Loss | |||
Module Overview | 00:00:00 | ||
Categorizing Threats | 00:00:00 | ||
Non-human Threats | 00:00:00 | ||
Identifying Damage | 00:00:00 | ||
Calculating Loss | 00:00:00 | ||
Section 8 - Analyzing Risk To Help Drive Information Security Decisions | |||
Reviewing Risk As A Concept | 00:00:00 | ||
Risk Analysis Process | 00:00:00 | ||
Risk Assessment Process | 00:00:00 | ||
Risk Management Process | 00:00:00 | ||
Types Of Risk Analysis | 00:00:00 | ||
Section 9 - Using Risk Mitigation Strategies To Minimize The Impact Of Risk | |||
Identifying Risk Strategy | 00:00:00 | ||
Selecting Risk Treatment | 00:00:00 | ||
Understanding Security Controls | 00:00:00 | ||
Selecting Risk Measures | 00:00:00 |
About This Course
Who this course is for:
- This course is designed for IT professionals
What you’ll learn:Â
- This course will provide the basic knowledge you need to assign the appropriate level of value to your information and become aware of the risks and threats that could compromise your information.
This course is an entry-level Information Security course that is designed for everyone who utilizes computer technology in their daily life. Whether you use technology for business or personal reasons, this course will provide you with the basic knowledge you need to assign the appropriate level of value to your information, become aware of the risks and threats that could compromise your information, and take some practical steps to protect your valuable information assets.
Our Promise to You
By the end of this course, you will have learned about information technology security threats and risks that could compromise your information and also learn how to protect this valuable information.
10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about the information technology security threats and risks.
Course Curriculum
Section 1 - Introduction | |||
Setting The Stage | 00:00:00 | ||
Course Flow Overview | 00:00:00 | ||
Module Content Overview | 00:00:00 | ||
Scenario Overview | 00:00:00 | ||
Section 2 - Understanding Basic Information Concepts | |||
Defining Information | 00:00:00 | ||
Understanding The Value Of DIKW | 00:00:00 | ||
How Information Systems Add Value | 00:00:00 | ||
Managing Information Lifecycle | 00:00:00 | ||
Exercise Your Knowledge Of DIKW | 00:00:00 | ||
Section 3 - Determining The Value Of Information Assets | |||
Information As A Business Asset | 00:00:00 | ||
Information As A Production Factor And A Product | 00:00:00 | ||
Using Process To Manage Assets | 00:00:00 | ||
Section 4 - Leveraging Operational Process Types to Manage Assets | |||
Leveraging Operational Process Types To Manage Assets | 00:00:00 | ||
Creating Value Stream | 00:00:00 | ||
Section 5 - Achieving Information Reliability Through Security | |||
Using The CIA Principles Of Information Security | 00:00:00 | ||
The Attributes Of Information Reliability | 00:00:00 | ||
Developing An Asset Classification Criteria | 00:00:00 | ||
Classifying Assets To Apply Proper Level Of Security | 00:00:00 | ||
Section 6 - Preparing To Manage Threats And Risks | |||
Defining Threats, Vulnerabilities, And Risks | 00:00:00 | ||
Risk Management | 00:00:00 | ||
Risk Treatment | 00:00:00 | ||
Incident And Disasters | 00:00:00 | ||
Section 7 - Categorizing Threats, Identifying Damage, And Calculating Loss | |||
Module Overview | 00:00:00 | ||
Categorizing Threats | 00:00:00 | ||
Non-human Threats | 00:00:00 | ||
Identifying Damage | 00:00:00 | ||
Calculating Loss | 00:00:00 | ||
Section 8 - Analyzing Risk To Help Drive Information Security Decisions | |||
Reviewing Risk As A Concept | 00:00:00 | ||
Risk Analysis Process | 00:00:00 | ||
Risk Assessment Process | 00:00:00 | ||
Risk Management Process | 00:00:00 | ||
Types Of Risk Analysis | 00:00:00 | ||
Section 9 - Using Risk Mitigation Strategies To Minimize The Impact Of Risk | |||
Identifying Risk Strategy | 00:00:00 | ||
Selecting Risk Treatment | 00:00:00 | ||
Understanding Security Controls | 00:00:00 | ||
Selecting Risk Measures | 00:00:00 |
Excellent
Excellent tutorial. Easy to digest materials