Introduction to Information Security - ISG101

Overview

This course introduces infosec best practices to the non-infosec or non-technical professional. It provides a broad overview of information security topics including compliance, governance, network and application design, data protection and management, incident response, essential policies and controls, key metrics and common attack methods.


ENROLL IN THIS COURSE

Tuition cost

$1,833

NASBA Certified CPE

24 Credits

Information Technology

Why you should attend

You should attend because infosec is evolving with new developments and attacks daily. This course provides the infosec information that beginners need to appreciate and understand the complexities involved and current best practices.

Who should attend

Professionals across all businesses and sectors with 0-4 years of experience who need to know more about Information Security; Financial, Operational, Business Application Internal and External Auditors and Risk Managers.

What You'll learn

You will learn about information security governance, key concepts, common attack methods, monitoring security of third parties, incidence response, and ways to secure the network architecture including tools, products, and best practices.

Prerequisites

This course is geared to individuals with a little or no general familiarity and working knowledge of information security issues. An understanding of technology and other forms of information risk management and security would be useful but are not essential. Members of IT Audit, Information Security, Quality Assurance, and/or Information Technology disciplines would find the course a useful refresher or conduit for furthering their interest in the subject.

  • Cybersecurity landscape
  • Costs of cybercrime
  • IT security challenge
  • InfoSec Professional Organizations
  • Security, privacy and compliance
  • Legal and regulatory
  • Frameworks
  • Fundamental information security concepts
  • Security governance
  • Security program development
  • Best practices – physical security
  • Network transmission
  • Best practices - logical security
  • Best practices – IT security operations
  • Threat and vulnerability management
  • Cryptography
  • Software development
  • Incident and problem management
  • Digital forensics
  • Business continuity disaster recovery
  • Third party security
  • Security metrics
  • Cyber kill chain
ENROLL IN THIS COURSE

Schedule your course

Use the table below to select the time and location that works best for you.

Timezone: America/Chicago

unknown date

No dates found

ENROLL IN THIS COURSE

ACI Learning is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org.