An Executive's Guide to Security: Protecting Your Information

Cybersecurity    |    Beginner
  • 13 videos | 45m 35s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 637 users Rating 4.7 of 637 users (637)
This 13-video course explores data protection for businesses, including devices, social media, and good governance through security principles, policies, and programs. You will examine several types of security threats, the different types of network attacks, the role physical security plays in the protection of corporate data, and the human element of security threats. Next, learners examine the attack surface, including the total combined nodes, users, devices, and any entry points of software, a network, and a business environment. You will examine threats, vulnerabilities, and risks, and learn the importance of network hardening. This course uses real-world examples of several top security threats to businesses today, including malware, social engineering, unpatched software, BYOD (bring your own device), and IoT (Internet of things). You will examine clickjacking and URL spoofing. Finally, this course discusses the legal and financial ramifications of a major security breach, the importance of having a security policy, training personnel, password protection, and managing a company's security.

WHAT YOU WILL LEARN

  • Describe best practices for working with and handling corporate information while traveling
    Discuss the problems presented by organizational and personal e-mail, and best practices for working with e-mail, including how to protect yourself from spam
    Specify the proper ways to handle sensitive company information, including the differences between working with online data and physical media
    Describe best practices for sharing data with colleagues, customers, and the public
    Discuss byod and iot, how they pose a unique security threat for organizations, and how they should be treated on an organizational scale
    Specify the challenges surrounding wireless networking and how wireless networks should be handled on an organizational scale
  • Discuss the dangers of posting on social media, as well as organizational policies and procedures
    Specify the importance of implementing organizational security programs and why companies that don't have them put themselves at risk
    Describe how employee training, awareness, and advocacy should be implemented and how it plays a crucial role in the protection of an organization's information
    Discuss the importance of security programs and how to balance up-front costs vs. downtime in the long-run
    Specify how new technology impacts security, and how to balance it in relation to convenience vs. security
    Explain data protection practices, devices and social media, and corporate security principles and programs

IN THIS COURSE

  • 1m 15s
  • 4m 56s
    After completing this video, you will be able to describe best practices for working with and handling corporate information while traveling. FREE ACCESS
  • Locked
    3.  E-mail Security
    8m 2s
    In this video, you will discuss the problems presented by organizational and personal email, and best practices for working with email, including how to protect yourself from spam. FREE ACCESS
  • Locked
    4.  How to Handle Sensitive Data
    3m 20s
    After completing this video, you will be able to specify the proper ways to handle sensitive company information, including the differences between working with online data and physical media. FREE ACCESS
  • Locked
    5.  When and What to Share
    1m 47s
    After completing this video, you will be able to describe best practices for sharing data with colleagues, customers, and the public. FREE ACCESS
  • Locked
    6.  BYOD and IoT
    6m 41s
    In this video, you will discuss BYOD and IoT, how they pose unique security threats for organizations, and how they should be treated on an organizational scale. FREE ACCESS
  • Locked
    7.  Wireless Networking Challenges
    3m 23s
    After completing this video, you will be able to specify the challenges surrounding wireless networking and how wireless networks should be handled on an organizational scale. FREE ACCESS
  • Locked
    8.  Posting on Social Media
    2m 40s
    Learn how to discuss the dangers of posting on social media, as well as organizational policies and procedures. FREE ACCESS
  • Locked
    9.  The Importance of Security Programs
    3m 12s
    Upon completion of this video, you will be able to specify the importance of implementing organizational security programs and why companies that don't have them put themselves at risk. FREE ACCESS
  • Locked
    10.  Employee Training, Awareness, and Advocacy
    3m 15s
    Upon completion of this video, you will be able to describe how employee training, awareness, and advocacy should be implemented and how it plays a crucial role in the protection of an organization's information. FREE ACCESS
  • Locked
    11.  Balancing Up-Front Costs vs. Downtime in the Future
    2m 11s
    In this video, you will discuss the importance of security programs and how to balance up-front costs with downtime in the long-run. FREE ACCESS
  • Locked
    12.  Convenience vs. Security
    2m 32s
    After completing this video, you will be able to specify how new technology impacts security, and how to balance security with convenience. FREE ACCESS
  • Locked
    13.  Exercise: Explain How to Protect Your Information
    2m 20s
    After completing this video, you will be able to explain data protection practices, devices and social media, and corporate security principles and programs. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 261 users Rating 4.6 of 261 users (261)
Rating 4.5 of 3792 users Rating 4.5 of 3792 users (3792)
Rating 4.3 of 12 users Rating 4.3 of 12 users (12)