CISM 2020: IT Security Policies

CISM 2020
  • 14 Videos | 1h 27m 53s
  • Includes Assessment
  • Earns a Badge
IT security policies guide how IT services are deployed and managed in an organization. To achieve certification in information security management, you'll need to demonstrate a clear understanding of what policies exist and where and how to implement them. In this course, you'll explore various types of security policies, starting with those for securing change and patch management. You'll then investigate some network and host security hardening techniques. You'll move on to practice hardening Windows and Linux servers as well as a network printer and passwords. You'll then examine how to detect social engineering scams and deal with malware infections. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recognize how IT security policies must align to securing business processes
    use change management to securely modify network and device configurations in a structured manner
    use patch management to securely deploy updates in a structured manner
    identify common hardening techniques for networks and hosts
    harden a Windows server
    harden a Linux server
  • harden a network printer device
    harden password usage
    centrally deploy security settings via Group Policy
    recognize various methods by which malicious users attempt to trick victims
    illustrate phishing email messages
    identify common types of malware
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 19s
    UP NEXT
  • Playable
    2. 
    IT Security Policy Types
    6m 15s
  • Locked
    3. 
    Change Management for Secure Configurations
    5m 32s
  • Locked
    4. 
    Patch Management for Secure Updates
    5m 37s
  • Locked
    5. 
    Hardening Techniques for Networks and Hosts
    5m 54s
  • Locked
    6. 
    Securing a Windows Server
    11m 15s
  • Locked
    7. 
    Securing a Linux Server
    8m 1s
  • Locked
    8. 
    Securing a Network Printer
    6m 31s
  • Locked
    9. 
    Implementing Password Policies in Windows
    7m 2s
  • Locked
    10. 
    Deploying Security Settings Using Microsoft Group Policy
    6m 34s
  • Locked
    11. 
    Social Engineering Methods
    5m 51s
  • Locked
    12. 
    Detecting Phishing Scams
    5m 39s
  • Locked
    13. 
    Common Malware Types
    5m 22s
  • Locked
    14. 
    Course Summary
    1m 1s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 1 Likes 1  
Likes 0 Likes 0  
Likes 0 Likes 0