Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Protection of Information Assets

Whizlabs via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Protection of Information Assets Course is the third course of Exam Prep: Certified Information Systems Auditor (CISA) Specialization. Learners will dive into the OSI model, firewalls, VPNs, and network components, including LAN, VoIP, and wireless technologies. The course emphasizes data protection through encryption, introduces cloud computing fundamentals, and develops skills in security testing and digital forensics. The course is divided into two modules, and each module is further segmented by Lessons and Video Lectures. This course facilitates learners with approximately 3:00-3:30 Hours of Video lectures that provide both Theory and Hands-On knowledge. Also, Graded and Ungraded Quizzes are provided with every module to test the ability of learners. - Module 1: Information Asset Security and Control - Module 2: Security Event Management This specialization is designed for IT auditors, audit managers, security professionals, and consultants. Their current job roles often involve assessing IT and business systems, managing risks, ensuring compliance, and implementing controls. By the end of the course, learners will be able to: - Implement Physical & Logical Access Controls. - Understand Network Security Principles & Technologies. - Recognize Security Threats & Forensic Techniques.

Syllabus

  • Information Asset Security and Control
    • Welcome to Week 1. This week, we'll delve into foundational security and network management topics, starting with Physical Access and Environmental Controls to understand infrastructure protection. We’ll explore Single Sign-On and Authentication Factors, followed by key Identity and Access Management principles. Moving into networking, we'll cover OSI layers, firewall types and implementations, and gain hands-on insight into Network Management Tools. You’ll also explore VPNs, LAN components, and wireless networks, concluding with an introduction to Voice over IP (VoIP) technologies.
  • Security Event Management
    • Welcome to Week 2. This week, we'll explore essential cybersecurity fundamentals, beginning with data encryption techniques and the principles of Public Key Infrastructure (PKI). You'll gain clarity on cloud computing security considerations and the importance of organization-wide security awareness training programs. We'll also examine common information system attack methods and delve into hands-on exploration of security testing tools and techniques. Finally, you'll be introduced to evidence collection and digital forensics, equipping you to respond to security incidents effectively.

Taught by

Whizlabs Instructor

Reviews

Start your review of Protection of Information Assets

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.