BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
This training course provides an overview of security challenges and strategies of countermeasure in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity, and confidentiality aspects of information systems.
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Course Objectives
- Explain the concepts of information systems security as applied to an IT infrastructure
- Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure
- Explain the role of access controls in implementing a security policy
- Explain the role of operations and administration in effective implementation of security policy
- Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems
- Explain how businesses apply cryptography in maintaining information security
- Analyze the importance of network principles and architecture to security operations
- Explain the means attackers use to compromise systems and networks and defenses used by organizations
- Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector
Course Outline
The Need for Information Systems
- Information systems security
- The Internet of Things is changing how we live
- Malicious attacks, threats, and vulnerabilities
- Drivers of the information Security business
Securing Today’s Information Systems
- Access controls
- Security operations and administration
- Auditing, testing, and monitoring
- Risk, response, and recovery
- Cryptography
- Networks and telecommunications
- Malicious code and activity
Information Security Standards, Education, Certifications, and Laws
- Information security standards
- Information systems security education and training
- Information Security Professional Certifications
- U.S. compliance laws
FAQs
This course is intended for IT security professionals who want to establish a career in cyber security.
Students should have minimal experience in the IT field, specifically in IT security; and an understanding of networking concepts and best security practices.
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org