Cybersecurity Awareness: Getting Started with Security Foundations

Cybersecurity    |    Beginner
  • 12 videos | 1h 14m 33s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)
As organizations become more reliant on IT systems to store all kinds of information, facilitate communication among colleagues and customers, and track business-related statistics, information is becoming more precious and its security increasingly crucial and challenging In this course, you'll explore standard information security concepts and the security-related roles within an organization. You'll examine where various security-related responsibilities fall throughout the organization and the importance of solid strategic planning and decision-making when implementing proper information security. You will also investigate the concept of security governance and the activities involved. Finally, you'll delve into the relationship between an organization's overall business objectives and how information security can promote these.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the core foundational concepts of information security and recognize why it is important to an organization
    Describe the standard information security roles within an organization
    List the responsibilities of various information security roles within an organization
    Classify the expectations of users and organizations in relation to security, it systems, permissions, and usage
    Recognize that security is everyone's responsibility in a professional environment and outline how to use the responsible-accountable-consulted-informed (raci) chart to see different responsibilities are distributed
  • Recognize the importance of strategic planning and decision-making when it comes to information security
    Recognize the importance of effective communication for fostering proper information security
    Define the concept of security governance in relation to information security
    List the standard security governance activities that relate to information security
    Describe how proper information security can support the organization's overall business objectives
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 59s
    In this video, you will learn more about your instructor and the course. In this course, you will learn more about cybersecurity and why it is important. You will become familiar with the security roles in an organization and the responsibilities of each role. The course also covers strategy planning, security governance, and business objectives and their relationship to security.  FREE ACCESS
  • 8m 43s
    In this video, you will learn the definition of information and information security. You will also discover the core concepts of information security and why these are so important to an organization. Finally, you will learn why it is so important to protect this information.  FREE ACCESS
  • Locked
    3.  Information Security Roles in an Organization
    2m 50s
    In this video, you will learn the information security roles in an organization. You will then discover the basics of what each role does, and what they are responsible for. The next video will dive deeper into these roles and responsibilities.  FREE ACCESS
  • Locked
    4.  The Duties of Various Information Security Roles
    15m 59s
    In this video, you’ll learn the various responsibilities of information security roles. You’ll learn that the Board of Directors drives the culture and strategic direction of the information security of an organization and Executive Management is responsible for the availability of resources and infrastructure. Senior Management develops security policies, risk management programs, and monitor security procedures. Cybersecurity practitioners implement security measures and data owners and data custodians are responsible for ensuring security controls. FREE ACCESS
  • Locked
    5.  Security-related User and Organization Expectations
    9m 3s
    In this video, you will learn about the expectations of users and organizations in relation to security, IT systems, permissions, and usage. The video explains the expectations of each level of the organization.  FREE ACCESS
  • Locked
    6.  The RACI Chart for Distinguishing Security Roles
    6m 4s
    In this video, you will focus on the RACI chart. RACI stands for responsible, accountable, consulted, and informed. You will learn more about what a RACI chart actually is and why it is necessary. RACI charts are tools that help manage stakeholder expectations. Using a RACI chart, you can manage expectations and ensure everyone is focusing on the right priorities. You'll learn how the RACI chart can help provide clarity in every project.  FREE ACCESS
  • Locked
    7.  Strategic Planning and Decision-making in Security
    7m 32s
    In this video, you’ll learn more about the importance of strategic planning. Strategic planning is a set of directions in an organization. Strategic planning helps your organization decide what it needs to do. Strategic planning helps your organization save time and money and reach a specific goal. You'll learn more about vision and mission statements. Strategic planning sets a roadmap for an organization and is the force behind any security program. FREE ACCESS
  • Locked
    8.  Importance of Communication in Information Security
    6m 40s
    In this video, you will learn why timely reporting of security risks helps management make important decisions. You'll learn more about the importance of effective communication for fostering proper information security.  You’ll learn about the different types of communication, written, verbal, formal, and informal. The video also explains the benefits of proper communication. You'll learn that proper communication helps organizations make proper decisions. Effective communication builds trust and convey clear messages to users.  FREE ACCESS
  • Locked
    9.  The Concept of Security Governance
    5m 42s
    In this video, you will learn how to define the concept of security governance in relation to information security. You will learn that security governance helps define what is working and what is not. You'll discover how security governance helps provide insight into the IT security environment.  You’ll learn how security governance helps ensure any security risks are addressed appropriately. Security governance brings together business goals and visions, best practices, technical requirements, and regulatory requirements.  FREE ACCESS
  • Locked
    10.  Information Security Governance Activities
    3m 38s
    In this video, you will learn about the security governance activities that relate to information security. These security governance activities include risk management, process improvement, event identification, improved compliance, and incident response. You will also learn about further security governance activities such as disaster recovery planning and metrics and resource management.    FREE ACCESS
  • Locked
    11.  Information Security and Meeting Business Goals
    2m 14s
    In this video, you will learn how proper information security can support an organization's overall business objectives. You'll learn that all business objectives are tied together. For example, generating profit, growing the business, and keeping customers happy can all be tied back to information security. The security objectives are subsets of business objectives. Businesses must strive to protect customer data in order to meet all of their objectives.  FREE ACCESS
  • Locked
    12.  Course Summary
    4m 9s
    In this video, you will summarize all you've learned in this course. You have learned all about information security. You've learned that this involves security data is protected. You've learned about the security roles within an organization. Additionally, in this course, you've learned about strategic planning and decision making.  FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 419 users Rating 4.6 of 419 users (419)
Rating 4.4 of 47 users Rating 4.4 of 47 users (47)
Rating 4.4 of 200 users Rating 4.4 of 200 users (200)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 200 users Rating 4.4 of 200 users (200)
Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)
Rating 4.4 of 179 users Rating 4.4 of 179 users (179)