In business, Information Security is everyone's responsibility. Everyone in an organization plays a part in establishing good security practices. However, in your personal life, securing your personal information is completely up to you. Nobody else is going to do it for you. Therefore, whether you are concerned about protecting your personal information or your business information, a solid awareness of Information Security Measures is an essential place to start. In this course, Achieving Basic Awareness of Information Security Measures (ISO/IEC 27002), you will start by learning about a wide range of security measures that will protect your valuable information. Next, you will learn about how to best select the appropriate measure based on the risk, vulnerability, and threat domain. Finally, you will explore how to plan and prepare to recover the business should a disaster occur. By the end of this course, you will have the foundational knowledge of information security activities needed to participate as a member of an Information Security organization.
Course Overview Hello. My name is Paul Gadbois, and I'd like to welcome you to my training course titled Achieving Basic Awareness of Information Security Measures, based on the ISO/IEC 27002 security standard. Whether you're a beginner or a skilled IT professional, this course will prepare you to identify which security measures to implement when managing security threats, risks, and incidents. Some of the major topics that we're going to cover in this course are managing physical, logical, technical, and organizational security risks; protecting valuable assets with physical security measures; protecting valuable information assets with appropriate access controls; identifying vulnerabilities and defending against cyber attacks, and managing a disaster with business continuity measures. Before beginning this course, you should be familiar with the basic concepts outlined in the Managing Information Security Threats and Risks ISO/IEC 27002 course and the Managing Information Security Incidents ISO/IEC 27002 courses, found here on Pluralsight. com. This information security incident course builds on these foundational concepts. Now by the time you complete this course, you'll be well prepared to participate as an active member of any information security team. I hope you'll allow me to guide you and teach you as you take this journey to learn about information security measures, right here at Pluralsight. com.
Managing a Disaster with Business Continuity Measures Welcome to the module titled Managing a Disaster with Business Continuity Measures. The objectives of this module include concepts like hoping for the best but planning and preparing for the worst, identifying proactive steps needed to recover from a cyber attack, identifying requirements to keep the business running, understanding the difference between business continuity and disaster recovery, and finally understanding the importance of practicing your recovery plans. In order to teach you about these objectives I'm going to be covering the following topics. The first one is business continuity. What is business continuity, how do you prepare for it? Then we're going to take a look at disaster recovery and how does disaster recovery relate to business continuity. And then finally we're going to wrap up by talking about planning and testing our disaster recovery plans. Now it's time to dive into the world of business continuity.