Course Overview
This training course provides an overview of security challenges and strategies of countermeasure in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity, and confidentiality aspects of information systems.
Schedule
Introduction to Cyber Security for Practitioners Training
date
location
price
![[image]](https://phoenixts.com/wp-content/themes/phoenixts-com/assets/images/temp/image-9@2x.jpg)
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Course Objectives
- Explain the concepts of information systems security as applied to an IT infrastructure
- Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure
- Explain the role of access controls in implementing a security policy
- Explain the role of operations and administration in effective implementation of security policy
- Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems
- Explain how businesses apply cryptography in maintaining information security
- Analyze the importance of network principles and architecture to security operations
- Explain the means attackers use to compromise systems and networks and defenses used by organizations
- Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector
Course Outline
The Need for Information Systems
- Information systems security
- The Internet of Things is changing how we live
- Malicious attacks, threats, and vulnerabilities
- Drivers of the information Security business
Securing Today’s Information Systems
- Access controls
- Security operations and administration
- Auditing, testing, and monitoring
- Risk, response, and recovery
- Cryptography
- Networks and telecommunications
- Malicious code and activity
Information Security Standards, Education, Certifications, and Laws
- Information security standards
- Information systems security education and training
- Information Security Professional Certifications
- U.S. compliance laws
FAQs
This course is intended for IT security professionals who want to establish a career in cyber security.
Students should have minimal experience in the IT field, specifically in IT security; and an understanding of networking concepts and best security practices.