Information Technology and Security Principles

Overview

To be effective in the management of IT risk, the risk practitioner must have a working understanding of key principles and concepts of information technology and security. In this fourth of four courses to prepare you for the CRISC exam you will learn the foundational knowledge of risk when it comes in the form of computer hardware and software, networking concepts, secure system development and the importance of user training and awareness in the area of cybersecurity.
Information Technology and Security Principles Overview
Chris and Anthony break down what this module of the CRISC certification course contains and how it helps with the overall risk management lifecycle.
Clock icon0h 2m
WEBVTT (upbeat music) Welcome everyone, my name is Anthony Sequera and I'm gonna be your host for this section of our C RISC course and joining me, as he always does, is Mr. Chris Ward. He'll be leading us through this section. Chris, I understand this section is one that I know I'm gonna love because we're gonna get real specific now on the types of risks that we're gonna run up against when it comes to information systems. - Yes, and one of the nice things is, is not only we're gonna talk about some of the risks, but we kind of covered the generic general risks in the things that we do, but now we're gonna get really specific on the risk and the responses that you should be planning, whether you're mitigating, avoiding, transferring. I mean, we're gonna be talking about things like, when do you use encryption? When do you use digital signatures? When do you use things like access control lists? When do you use that least privilege and the separation of duties? Okay, so you get it? We're literally gonna take a look at information systems. We're gonna talk about the security for things like the confidentiality of your data, the integrity of your data and the availability of your data. This comes from the infamous CIA or Iron Triangle. The CIA stands for that confidentiality, integrity and availability. And so what are we gonna do to protect it? How do we protect in the data lifecycle itself? How do we protect in a system development lifecycle? Got a lot of lifecycles going on here and it's gonna be great. I'm excited about this. I know you will be too and we're great. I mean, you can't have a better host than Anthony Sequera, the expert, the guru in many of these areas. Well, and one of the questions that I'm supposed to ask Chris right now is why he's uniquely qualified to bring this event to us. I'm gonna not even send that to him. I'm gonna answer that for everybody. I've been friends and a coworker of Chris's for going on 30 years now. And I can tell you, he is uniquely prepared to deliver this content for us because before he really started specializing in things like project management and ITIL, he did technology. So he's got the background in both computer networking and the kind of project management side of things. So we are very, very lucky to have Chris leading us through this and I hope you're excited and ready to click on that very first episode of content we have waiting for you next. (upbeat music)

Learning Style

On Demand

Length of course

3h 56m
16 Episodes

Here are the topics we'll cover

  • Information Technology Basics
  • The Basics of Information Security
Learning Options

Options for this course

Train your team
Stay ahead of the curve and future-proof your business with training programs designed for you.
Channel partners
Transform your experience and integrate with our unique evolving library of Audit, Cybersecurity, and Information Technology courses.
Individual learners
Learn at your own pace and get your certification training.