Autoplay
Autocomplete
Previous Lesson
Complete and Continue
IT Security Management Fundamentals
Section 1: Course Introduction
Welcome to the Course! (4:50)
What This Course Is & What It Isn't (4:45)
Instructor Introduction (2:24)
Section 2: Getting Started In Information Security
The Many Areas of Information Security (8:25)
Beginning Point Certifications & Degrees (13:03)
Section 3: The Need for Information Security
The Need for Information Security (12:19)
Optional Student Activity: Vimeo & Youtube Videos to Watch (12:01)
Links: Videos to Watch
Section 4: Information Security Principles
Section Introduction (0:55)
The CIA Triad (7:57)
More Concepts (6:41)
Authentication Basics (12:42)
Identify Proofing (3:44)
General Password Rules (8:26)
Designing an Authentication Strategy with Microsoft Technet (11:11)
Information Security Principles Quiz
Section 5: Access Control
Section Introduction (0:46)
Access Control (14:29)
Physical and Logical Access Controls (16:59)
Defense in Depth (6:02)
Access Control Models (13:28)
Access Control Quiz
Section 6: Basic Network Zones
Basic Network Zones (0:52)
Internet (1:53)
DMZ (3:27)
Extranet (3:22)
Intranet (3:26)
Mini-Case Scenario: Secure Network Design (11:55)
Basic Network Zones Quiz
Section 7: Network Security Devices
Section Introduction (1:31)
Firewalls (5:53)
Proxy Servers (7:01)
Intrusion Detection & Prevention Systems (7:38)
Virtual Private Networks (8:22)
Network Security Devices Quiz
Section 8: Hardening Systems
Hardening a System (10:13)
Patch and Change Management (5:31)
Hardening Systems Quiz
Section 9: Network Threats & Vulnerabilities
Transmission Media Security Concerns (12:31)
Wireless Networking Security Concerns (18:45)
Network-Based Threats and Attacks (19:54)
Student Activity: Locking Down Your Home's Wi-Fi
Network Threats & Vulnerabilities Quiz
Section 10: Network Scanning Tools
SuperScan Port Scanner (8:22)
Nmap Zenmap Network Scanner (6:42)
Tenable Nessus Vulnerability Scanner (10:54)
Section 11: Security Malware Threats
Introduction to Malware (0:35)
Viruses (4:27)
Worms (2:32)
Trojan Horses (2:13)
Logic Bombs (2:40)
Spyware and Adware (2:58)
Protecting Against Malware (4:47)
Social Engineering Attacks (8:02)
Why Social Engineering Succeeds (3:56)
Security Malware Threats Quiz
Section 12: Introduction to Crytography
Introduction to Crytography (9:23)
Symmetric Encryption (3:42)
Asymmetric Encryption (4:26)
Hashing Algorithms (4:45)
Introduction to Crytography Quiz
Section 13: Disaster Recovery
Disaster Recovery (3:25)
Disaster Planning and Testing (4:24)
Disaster Recovery and Redunancy (8:33)
The Disaster Recovery Planning Process (11:35)
Disaster Recovery Quiz
Section 14: Personnel Policies
Section Introduction (2:02)
Acceptable Use (2:49)
Code of Ethics (3:27)
Mandatory Vacations (2:39)
Separation of Duties (3:40)
Job Rotation (2:06)
Education and Training (4:00)
Personnel Policies Quiz
Class Mini-Case Scenario
Mini-Case Scenario: Small Tax Accounting Office (18:59)
Section 16: Congratulations!
Congratulations! (2:05)
The Disaster Recovery Planning Process
Download
Complete and Continue