If you are new to cybersecurity or are interested in getting started, this course will help understand information security for organizations. It covers how organizations protect assets, guide, evaluate, and manage information security programs.
There are many components to an organization's information security program. If you are new to cybersecurity or interested in getting started, it can be difficult to identify and understand all of the facets of protecting an organization's information assets. In this course, Introduction to Information Security, you will learn about the information security programs used by organizations. First, you will learn about the foundational principles of information security, such as confidentiality, integrity, governance, risk management, and compliance. Next, you will explore organizational assets and how they are protected through the use of security controls. Then, you will take a look at how auditing, monitoring, and testing is used to review and evaluate the effectiveness of those security controls. Finally, you will discover how organizations manage and prepare for security incidents, disruptions, and disasters and how they manage the day-to-day operations of an information security program. When you are finished with this course, you will have the knowledge and understanding of the bigger picture of information security.
Course Overview Hello everyone. My name is Keith Watson, and welcome to Introduction to Information Security. This is the first course in Pluralsight's Information Security Big Picture series. I'm an information security professional at Optiv Security, and I've been involved in information security for more than 20 years. If you've paid attention to the news lately, it seems that security has not improved. If anything, it seems to be getting worse. Between the many organizations that have suffered security breaches and the vulnerabilities that continue to be uncovered, we seem to have a significant problem. And as we continue to rely on technology and online services in our daily lives, these security issues threaten our private information, our personal devices, our businesses, the national economy, and our lives. Government and private industry have responded, albeit slowly and reluctantly, to the threats through increased security budgets and hiring. As a result, the demand for information security professionals has increased significantly. Unfortunately, current projections show that open positions for information security professionals will far exceed the number of professionals available. Through this course and the Big Picture series, we hope to prepare you to join this exciting field and help us face these information security challenges. In this course, we're going to introduce most of the key concepts, methods, and management techniques in information security. Some of the major topics that we will cover include an introduction to key security concepts and principles, governance, risk management, and compliance, the protection of assets through security controls, auditing information systems for compliance, monitoring networks for anomalous and malicious activity, managing security incidents and security operations. By the end of this course, you'll know the basics of information security and should be ready to dive in to other courses in the Big Picture series, as well as courses in the Pluralsight Information Security library. I hope you'll join me on this adventure into information security with the Introduction to Information Security, the Big Picture, here, at Pluralsight.