- Course info
- Course resources
In this intermediate security skills training, Keith Barker helps learners understand data security best practices and threats.
Information security professionals are charged with protecting business assets, which can be physical property, intellectual property, or data. While some information security professionals may be involved with physical entry controls, like man traps, bollards, or even fence heights, most focus on protecting the data. The learning objectives for this course map to the Certified Information Systems Security Professional (CISSP) certification, an industry-leading certification for information security, making this training crucial for anyone looking to move into information security.
After finishing the videos in this Information Security training, you'll know how to mitigate vulnerabilities in web-based systems, mobile systems, and embedded devices, apply cryptography, and learn how security operations work. You’ll also gain an understanding of asset security while learning about privacy protection, asset retention, data security controls.
By completing this Information Security training, security professionals will be better prepared to get more senior roles, like security experts.
For anyone who manages their data security best practices and threats training, this security training can be used to onboard new security professionals, curated into individual or team training plans, or as a security reference resource.
Information Security: What You Need to Know
This Information Security training has videos that cover topics including:
- Maintaining network and data security through industry best practices
- Mitigating vulnerabilities in web-based systems
- Reducing security exposures in mobile systems
- Integrating embedded devices without risking security vulnerabilities
- Applying cryptography to provide optimum data security
- Developing and designing networks with security in mind
- Ensuring user privacy while retaining data
- Following standard reporting and oversight procedures
Who Should Take Information Security Training?
This Information Security training is based on professional-level security training, which means it was designed for experienced IT professionals or entry-level security professionals. This data security skills course is designed for IT professionals with three to five years of experience, and new or aspiring security professionals.
New or aspiring security professionals. If you’re just starting out on your career as a security professional, training in information security will set you up with the foundational pillars of your future career in maintaining security systems and networks. Expertise in information security — or INFOSEC — is an absolute must for many of the biggest and most lucrative jobs and careers in the field and this training will make sure you’ve got every element of it mastered.
Experienced IT professionals. If you’re an IT professional who’s been working in the field for several years, but you’re not formally trained on Information Security (or INFOSEC) principles, this training will give you the fundamentals you need for a long career as an expert and professional in the field. Government contracts, enterprise-level companies, and the most lucrative careers require expertise in Information Security, and this training can make sure you get it.