Information Security and Assurance (ISA) is a mandatory requirement for security personnel with privileged access to monitoring, system control and administration functions. ... In turn, ISA trained security personnel help bolster information integrity and availability through controls, risk assessment, and management.
What Is the Difference Between Information Assurance and Information Security?
In short, information assurance focuses on gathering data. Information security is about keeping that data safe. In most organizations, these two jobs are combined into one department or even one worker.
This course teaches the basic concepts and principles of information security and the fundamental approaches to secure computers and networks. Its main topics include: security basics; security management and risk assessment; software security; operating systems security; database security; cryptography algorithms and protocols; network authentication and secure network applications; malicious malware; network threats and defenses; web security; mobile security; legal and ethical issues; and privacy.
More so ,This course helps in the assessment of internal controls, also in assuring and reporting the validity, adequacy, reliability, and security of information systems.
Participants will gain the knowledge and confidence to plan and perform an effective audit, as well as reporting and recommending corrective actions where necessary.
You will also develop the necessary skills to audit controls, monitor and assess information technology and report on the conformance and implementation of processes based on management systems.
Finally, you will learn how to initiate an audit, prepare and conduct audit activities, compile and distribute audit reports and complete follow-up activities.
WELCOME TO GOTO-COURSE MANAGEMENT SYSTEM
Introducing students to GOTO-COURSE learning system
WHAT YOU NEED FOR CLASS
Watch the video and prepare what you will need for the class
Watch the video to learn the rules of the class
Record a 1-minute video introducing yourself, tell us what you aim to achieve during the class and attach it as a file below
Based on the topics above, answer the questions in the quiz
LETS TALK ABOUT DRESS CODE
To inform the student of the training dress code
News and Updates
The student's news and updates
What is Information Technology
INFOSEC SECTION 1
Understand the components and the operations of an Information Security Management System based on ISO/IEC 27001 and its principal processes and Interpret the ISO/IEC 27001 requirements in the specific context of an organization.
Information security Objective
How to Protect information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data
The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet or any other computer network.
Integrity models have three goals: Prevent unauthorized users from making modifications to data or programs. Prevent authorized users from making improper or unauthorized modifications. Maintain internal and external consistency of data and programs.
Research paper on Positive Risk -Due 8/3 by 11:59pm
Explain How to response to Positive Risk
Assignment on TOM -495
Assignment on ISO 27005 & NIST 800 SP-37- deadline 8/13 11:59 PM
Group Work ON ACCOUNT MANAGEMENT & PROTOCOLS
RISK ASSESSMENT TEMPLATE
RISK REGISTER ASSIGNMENT
SAMPLE ISMS POLICY
ISO 27001 COMPLIANCE CHECKLIST
SECURITY CONTROL MAPPING
ISO 27001 ANNEX A TABLE
ISMS ROAD MAP
ASSIGNMENT on SIEM
Assignment on SOC
Groupwork on Backup
I.T INFRASTRUCTURE DIAGRAM
IINTRODUCTION TO IT AUDIT
COBIT RISK CONTROL MATRIX