Books & Videos

Table of Contents

Chapter: Introduction

Introduction to Information Security LiveLessons: Introduction

03m 10s

Chapter: Lesson 1: Understanding Basic Security

Learning Objectives

00m 53s

1.1 Understand security basics

28m 41s

1.2 Comprehend why all tech personnel need a basic understanding of security

06m 17s

1.3 Appreciate the importance of explaining security to non-tech personnel

04m 24s

Chapter: Lesson 2: Creating a Secure Environment—First Steps

Learning Objectives

01m 5s

2.1 Appreciate the essential need for leadership buy-in

06m 1s

2.2 Understand risk assessments

04m 11s

2.3 Understand policies and plans

10m 28s

2.4 Understand the importance of cyber liability insurance

03m 27s

2.5 Appreciate the necessity of security awareness training

10m 49s

2.6 Identify information security best practices

12m 10s

Chapter: Lesson 3: Securing Your Firm’s Network

Learning Objectives

01m 21s

3.1 Recognize primary threats to the network

29m 30s

3.2 Identify the basic steps to mitigate network threats

19m 30s

3.3 Understand perimeter defenses

14m 4s

3.4 Understand network monitoring and related issues

17m 2s

3.5 Understand encryption

16m 32s

3.6 Physically secure network assets

14m 28s

3.7 Use the cloud securely

10m 2s

3.8 Understand vulnerability assessments and pentesting

04m 44s

3.9 Securely dispose of network data and resources

09m 37s

Chapter: Lesson 4: Consider an Easier Way to Gain a Foothold on a Network—Hacking the Humans Who Use It

Learning Objectives

00m 56s

4.1 Understand social engineering and its effects

24m 22s

4.2 Utilize strong passwords and authentication methods

18m 8s

4.3 Understand the risks that come with using the Web

22m 5s

4.4 Recognize insider threats

12m 49s

Chapter: Lesson 5: Mitigating Client-Side Threats (Desktops and Laptops)

Learning Objectives

00m 51s

5.1 Address endpoint security

16m 47s

5.2 Recognize and mitigate threats related to remote access

12m 25s

5.3 Identify and address client-side physical security issues

09m 51s

Chapter: Lesson 6: Protecting Mobile Devices

Learning Objectives

00m 50s

6.1 Identify threats specific to mobile devices

21m 12s

6.2 Recognize the risks associated with BYOD programs

08m 15s

6.3 Properly dispose of mobile devices and data

02m 52s

Chapter: Lesson 7: Reacting when Something Goes Wrong

Learning Objectives

00m 52s

7.1 Determine what happened

03m 25s

7.2 Institute business continuity/disaster recovery plans

07m 39s

7.3 Respond to a successful attack

15m 49s

Chapter: Summary

Introduction to Information Security LiveLessons: Summary

01m 11s