An Executive’s Guide to Security: Protecting Your Information
This 13-video course explores data protection for businesses including devices social media and good governance through security principles policies and programs. You will examine several types of security threats the different types of network attacks the role physical security plays in the protection of corporate data and the human element of security threats. Next learners examine the attack surface including the total combined nodes users devices and any entry points of software a network and a business environment. You will examine threats vulnerabilities and risks and learn the importance of network hardening. This course uses real-world examples of several top security threats to businesses today including malware social engineering unpatched software BYOD (bring your own device) and IoT (Internet of things). You will examine clickjacking and URL spoofing. Finally this course discusses the legal and financial ramifications of a major security breach the importance of having a security policy training personnel password protection and managing a companys security.