Internet And Network Technologies
Cyber Security: An Executive's Guide
An Executive's Guide to Security: Protecting Your Information
An Executive's Guide to Security: Understanding Security Threats

An Executive's Guide to Security: Protecting Your Information

Course Number:
it_spcsegdj_02_enus
Lesson Objectives

An Executive's Guide to Security: Protecting Your Information

  • Course Overview
  • describe best practices for working with and handling corporate information while traveling
  • discuss the problems presented by organizational and personal e-mail, and best practices for working with e-mail, including how to protect yourself from spam
  • specify the proper ways to handle sensitive company information, including the differences between working with online data and physical media
  • describe best practices for sharing data with colleagues, customers, and the public
  • discuss BYOD and IoT, how they pose a unique security threat for organizations, and how they should be treated on an organizational scale
  • specify the challenges surrounding wireless networking and how wireless networks should be handled on an organizational scale
  • discuss the dangers of posting on social media, as well as organizational policies and procedures
  • specify the importance of implementing organizational security programs and why companies that don't have them put themselves at risk
  • describe how employee training, awareness, and advocacy should be implemented and how it plays a crucial role in the protection of an organization's information
  • discuss the importance of security programs and how to balance up-front costs vs. downtime in the long-run
  • specify how new technology impacts security, and how to balance it in relation to convenience vs. security
  • explain data protection practices, devices and social media, and corporate security principles and programs

Overview/Description

Companies mishandle data because personnel misunderstand practices, risks, and implications. Explore data protection, devices and social media, and good governance through security principles and programs.



Target

Prerequisites: none

An Executive's Guide to Security: Understanding Security Threats

Course Number:
it_spcsegdj_01_enus
Lesson Objectives

An Executive's Guide to Security: Understanding Security Threats

  • Course Overview
  • describe what an attack surface is and how it must be understood in order to protect corporate information
  • specify what network hardening is and how it relates to the protection of corporate information
  • discuss network demilitarized zones and how they help protect corporate information
  • describe the differences between threats, vulnerabilities, and risks in a corporate environment
  • specify the top kinds of security threats facing organizations today
  • discuss the common types of security attacks and how they each pose a risk to organizational data
  • describe the role physical security plays in the protection of corporate data
  • specify how social engineering is conducted and how it can be mitigated through corporate policy
  • discuss the importance of corporate security policies and why they should be strictly adhered to
  • describe the importance of password policies and why they should be adhered to
  • specify the reasons why IT administrators need to protect an organization by refusing to bend the rules
  • describe security threats, network hacks and attacks, and the human element in protecting organizational information

Overview/Description

Companies that don’t understand the threats facing their information are at risk of costly data breaches. Explore common security threats, types of network attacks, and the human element of security threats.



Target

Prerequisites: none

Close Chat Live