Information Security for Leaders: Elements of an InfoSec Team

InfoSec 2023    |    Beginner
  • 14 videos | 1h 39m 19s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 3 users Rating 4.7 of 3 users (3)
There are many elements to a successful InfoSec team, but its goal is always to protect the organization's electronic data and information technology systems. In this course, you will learn about the responsibilities of an IT security team and the many roles required for success. Explore the responsibilities of a chief information security officer and a chief information officer and discover the primary responsibilities of a network security engineer, which include ensuring hardware and software security and updating and patching resources. Next, you will differentiate between the roles of penetration tester, information owner, junior engineer, computer technician, forensic investigator, and digital forensic examiner. Then examine key stakeholder and decision-maker roles. Lastly, explore the role of DevSecOps and list ways it can have a positive impact on information security. Upon completion, you'll be able to recognize the elements of an InfoSec team.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of the responsibilities of an it security team
    Differentiate between the responsibilities of a chief information security officer and a chief information officer
    Outline common responsibilities of a network security engineer, including ensuring hardware and software security and updating and patching resources
    Recognize common responsibilities of a penetration tester and describe their roles in information security
    Provide an overview of the responsibilities of information owners
    Outline common responsibilities for junior network engineers and computer technicians
  • Describe the role forensic investigators play on an infosec team
    Recognize the responsibilities of a digital/computer forensic examiner
    Provide an overview of the responsibilities of key stakeholder roles, such as executives, directors, and managers
    Recognize key expectations and responsibilities of employees
    List common information security requirements expected from vendors
    Provide an overview of the role of devsecops and list the ways it can have a positive impact on information security
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 6s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 6s
    After completing this video, you will be able to provide an overview of the responsibilities of an IT security team. FREE ACCESS
  • Locked
    3.  CISO vs. CIO
    8m 9s
    In this video, you will learn how to differentiate between the responsibilities of a chief information security officer and a chief information officer. FREE ACCESS
  • Locked
    4.  Network Security Engineer
    8m 2s
    Upon completion of this video, you will be able to outline common responsibilities of a network security engineer, including ensuring hardware and software security and updating and patching resources. FREE ACCESS
  • Locked
    5.  Penetration Testing
    11m 44s
    After completing this video, you will be able to recognize common responsibilities of a penetration tester and describe their roles in information security. FREE ACCESS
  • Locked
    6.  Information Owners
    7m 49s
    Upon completion of this video, you will be able to provide an overview of the responsibilities of information owners. FREE ACCESS
  • Locked
    7.  Junior Engineers and Computing Technicians
    7m 36s
    During this video, you will learn how to outline common responsibilities for junior network engineers and computer technicians. FREE ACCESS
  • Locked
    8.  Forensic Investigators
    7m 38s
    After completing this video, you will be able to describe the role forensic investigators play on an infosec team. FREE ACCESS
  • Locked
    9.  Digital Forensics Examiner
    8m 12s
    Upon completion of this video, you will be able to recognize the responsibilities of a digital/computer forensic examiner. FREE ACCESS
  • Locked
    10.  Key Stakeholder Roles
    7m 3s
    After completing this video, you will be able to provide an overview of the responsibilities of key stakeholder roles, such as executives, directors, and managers. FREE ACCESS
  • Locked
    11.  Employee Security Responsibilities
    7m 6s
    Upon completion of this video, you will be able to recognize key expectations and responsibilities of employees. FREE ACCESS
  • Locked
    12.  Vendor Security Requirements
    7m 39s
    During this video, you will learn how to list common information security requirements expected from vendors. FREE ACCESS
  • Locked
    13.  DevSecOps
    8m 17s
    After completing this video, you will be able to provide an overview of the role of DevSecOps and list the ways it can have a positive impact on information security. FREE ACCESS
  • Locked
    14.  Course Summary
    52s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 195 users Rating 4.6 of 195 users (195)
Rating 4.4 of 47 users Rating 4.4 of 47 users (47)
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 4.6 of 893 users Rating 4.6 of 893 users (893)
Rating 4.7 of 33 users Rating 4.7 of 33 users (33)