Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Merritt College
  4. Introduction to Information Systems Security

Introduction to Information Systems Security

Fundamental principles of Information Technology Security and Risk Management: Hardware software processes communications applications and policies and procedures of organizational cyber security and risk management.

Course Overview

Overall Proficiency Level
1 - Basic
Course Catalog Number
CIS071
Course Prerequisites

CIS005 or CIS006

Training Purpose
Skill Development
Specific Audience
All
Delivery Method
Online, Instructor-Led
  • Online, Instructor-Led

Learning Objectives

  • Describe the fundamental principles of information technology security. define the concepts of threat evaluation of assets information assets physical operational and information security and how they are related.
  • Evaluate the need for the careful design of a secure organizational information infrastructure.
  • Perform risk analysis and risk management. determine both technical and administrative mitigation approaches. explain the need for a comprehensive security model and its implications for the security manager or Chief Security Officer (CSO).
  • Create and maintain a comprehensive security model. apply security technologies.
  • Define basic cryptography its implementation considerations and key management.
  • Design and guide the development of an organization’s security policy
  • Determine appropriate strategies to assure confidentiality integrity and availability of information.
  • Apply risk management techniques to manage risk reduce vulnerabilities threats and apply appropriate safeguards/controls.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Network Services
  • Systems Administration
  • Systems Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: