MindEdge's Introduction to Information Security Learning Resource

MindEdge's Introduction to Information Security Course will introduce learners to the basic concepts and components of securing electronic data and information over computer networks, systems, applications, and other technologies. With the increase in the volume and magnitude of data breaches and cyber-attacks in recent years, information security has never been more vital.

The course covers the most common cyber-threats, including types of malware and viruses, and examines the common defense measures organizations take to protect against them. It also provides a solid basis in many of the IT areas—including networks, software, and computer architecture—needed to understand the methodologies for securing them. The course is intended to give managers, technology professionals, and those interested in entering the information security profession a good foundation in the subject.

The course includes pretests and self-assessments, interactive exercises, videos, and games that appeal to a variety of learning styles. The modular course can also be tailored to your school or professional development program with webtexts and e-books, and it seamlessly integrates into all learning management systems.

Topics covered in this course include:

  • Common cyber-attack methods and defenses
  • Trends and modern strategies in information security
  • Access control models and methodologies
  • Types of networks, network components, and how networks work
  • Firewall types and how they work
  • Wireless networks
  • IT security risk management strategies
  • Policies and standards that govern the information security function
  • The systems development life cycle
  • Application security controls
  • Cryptography and the role of encryption in information security
  • Security architectures and designing holistic security programs
  • The trusted computing base
  • Business continuity and disaster recovery planning from an IT perspective
  • Managing the human component of information security
  • The legal and regulatory issues that involve information security
  • Physical security

The ten modules of this course are as follows:

  1. Introduction and Access Controls
  2. Telecom and Network Security
  3. Information Security Governance and Risk Management
  4. Software Development Security
  5. Cryptography
  6. Security Architecture and Design
  7. Security Operations
  8. Business Continuity and Disaster Recovery Planning
  9. Legal, Regulations, Investigations, and Compliance
  10. Physical Security