back

Information Technology and Security Principles

3 H 56 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
Episodes
Episodes
  • Information Technology Basics
    • Overview
    • The Scope of Enterprise Architecture
    • Hardware and Software
    • Networking Fundamentals
    • Virtualization and Cloud
    • Project Management
    • Disaster Recovery and Business Continuity
    • Risk in the Data Life Cycle
    • Risk in the System Development Life Cycle
    • Emerging Technologies
  • The Basics of Information Security
    • Information Security Concepts
    • The CIA Triad
    • Access Control
    • What is Encryption?
    • Information Security Awareness and Training
    • Data Privacy Fundamentals

Overview

2 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

Chris and Anthony break down what this module of the CRISC certification course contains and how it helps with the overall risk management lifecycle.

WEBVTT >> (upbeat music) Welcome everyone, my name is Anthony Sequera and I'm gonna be your host for this section of our C RISC course and joining me, as he always does, is Mr. Chris Ward. He'll be leading us through this section. Chris, I understand this section is one that I know I'm gonna love because we're gonna get real specific now on the types of risks that we're gonna run up against when it comes to information systems. - Yes, and one of the nice things is, is not only we're gonna talk about some of the risks, but we kind of covered the generic general risks in the things that we do, but now we're gonna get really specific on the risk and the responses that you should be planning, whether you're mitigating, avoiding, transferring. I mean, we're gonna be talking about things like, when do you use encryption? When do you use digital signatures? When do you use things like access control lists? When do you use that least privilege and the separation of duties? Okay, so you get it? We're literally gonna take a look at information systems. We're gonna talk about the security for things like the confidentiality of your data, the integrity of your data and the availability of your data. This comes from the infamous CIA or Iron Triangle. The CIA stands for that confidentiality, integrity and availability. And so what are we gonna do to protect it? How do we protect in the data lifecycle itself? How do we protect in a system development lifecycle? Got a lot of lifecycles going on here and it's gonna be great. I'm excited about this. I know you will be too and we're great. I mean, you can't have a better host than Anthony Sequera, the expert, the guru in many of these areas. >> Well, and one of the questions that I'm supposed to ask Chris right now is why he's uniquely qualified to bring this event to us. I'm gonna not even send that to him. I'm gonna answer that for everybody. I've been friends and a coworker of Chris's for going on 30 years now. And I can tell you, he is uniquely prepared to deliver this content for us because before he really started specializing in things like project management and ITIL, he did technology. So he's got the background in both computer networking and the kind of project management side of things. So we are very, very lucky to have Chris leading us through this and I hope you're excited and ready to click on that very first episode of content we have waiting for you next. (upbeat music)