: What would you do in the face of an actual information security problem? This program consists of six cyber security modules with real life scenarios and case studies. The six modules included are:
Access Control and Identity Management introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. It provides an overview of Identity Management and the resources used on modern-day information systems, including Web and cloud-based ones. This course also features a number of fictional scenarios based on real-world access control and identity management.
Application, Data, and Host Security covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security.
Compliance and Operational Security contains a discussion of the role of security governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. This course also features a number of fictional scenarios based on compliance and operational security.
Cryptography contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography.
Network Security examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. This course also features a number of fictional scenarios based on network security.
Threats and Vulnerabilities examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities.Instructor Description
: This course has an "Ask the Expert" feature, which submits your questions directly to an expert in the field you are studying.
All materials are provided.