An Executive's Guide to Security: Protecting Your Information


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This 13-video course explores data protection for businesses, including devices, social media, and good governance through security principles, policies, and programs. You will examine several types of security threats, the different types of network attacks, the role physical security plays in the protection of corporate data, and the human element of security threats. Next, learners examine the attack surface, including the total combined nodes, users, devices, and any entry points of software, a network, and a business environment. You will examine threats, vulnerabilities, and risks, and learn the importance of network hardening. This course uses real-world examples of several top security threats to businesses today, including malware, social engineering, unpatched software, BYOD (bring your own device), and IoT (Internet of things). You will examine clickjacking and URL spoofing. Finally, this course discusses the legal and financial ramifications of a major security breach, the importance of having a security policy, training personnel, password protection, and managing a company's security.



Expected Duration (hours)
0.8

Lesson Objectives

An Executive's Guide to Security: Protecting Your Information

  • Course Overview
  • describe best practices for working with and handling corporate information while traveling
  • discuss the problems presented by organizational and personal e-mail, and best practices for working with e-mail, including how to protect yourself from spam
  • specify the proper ways to handle sensitive company information, including the differences between working with online data and physical media
  • describe best practices for sharing data with colleagues, customers, and the public
  • discuss BYOD and IoT, how they pose a unique security threat for organizations, and how they should be treated on an organizational scale
  • specify the challenges surrounding wireless networking and how wireless networks should be handled on an organizational scale
  • discuss the dangers of posting on social media, as well as organizational policies and procedures
  • specify the importance of implementing organizational security programs and why companies that don't have them put themselves at risk
  • describe how employee training, awareness, and advocacy should be implemented and how it plays a crucial role in the protection of an organization's information
  • discuss the importance of security programs and how to balance up-front costs vs. downtime in the long-run
  • specify how new technology impacts security, and how to balance it in relation to convenience vs. security
  • explain data protection practices, devices and social media, and corporate security principles and programs
  • Course Number:
    it_spcsegdj_02_enus

    Expertise Level
    Beginner