Fundamentals of Information Security

(WGU-basics-info-security) / ISBN : 978-1-61691-871-2
Lessons
90 Reviews
Get A Free Trial

Skills You’ll Get

1

Welcome to Fundamentals of Information Security

  • Learning Resources
  • Pacing Guide
  • Lesson Summary
2

What is Information Security?

  • Introduction
  • What is Security?
  • Alert!
  • Models for Discussing Security
  • More Advanced
  • Alert!
  • Attacks
  • Defense in Depth
  • Information Security in the Real World
  • Summary
  • Exercises
3

Identification and Authentication

  • Introduction
  • Identification
  • Authentication
  • More Advanced
  • Additional Resources
  • Alert!
  • Identification and Authentication in the Real World
  • Summary
  • Exercises
4

Authorization and Access Control

  • Introduction
  • Authorization
  • Access Control
  • More Advanced
  • More Advanced
  • Alert!
  • Alert!
  • Access Control Methodologies
  • More Advanced
  • Authorization and Access Control in the Real World
  • Summary
  • Exercises
5

Auditing and Accountability

  • Introduction
  • Accountability
  • More Advanced
  • Auditing
  • Alert!
  • Accountability and Auditing in the Real World
  • More Advanced
  • Summary
  • Exercises
6

Cryptography

  • Introduction
  • History
  • More Advanced
  • Additional Resources
  • Modern Cryptographic Tools
  • More Advanced
  • Protecting Data at Rest, in Motion, and in Use
  • Alert!
  • Cryptography in the Real World
  • Summary
  • Exercises
7

Laws and Regulations

  • Introduction
  • Laws and Regulations
  • Compliance
  • Privacy
  • Summary
  • Exercises
8

Operations Security

  • Introduction
  • Alert!
  • Origins of Operations Security
  • Additional Resources
  • The Operations Security Process
  • Kurt's Laws of Operations Security
  • More Advanced
  • Operations Security in our Personal Lives
  • Alert!
  • Operations Security in the Real World
  • Summary
  • Exercises
9

Human Element Security

  • Introduction
  • Humans: the Weak Link
  • Security Awareness
  • The Security Awareness and Training Program
  • Summary
  • Exercises
10

Physical Security

  • Introduction
  • Alert!
  • Additional Resources
  • Physical Security Controls
  • Protecting People
  • Protecting Data
  • More Advanced
  • Protecting Equipment
  • Note
  • Physical Security in the Real World
  • Summary
  • Exercises
11

Network Security

  • Introduction
  • Protecting Networks
  • Protecting Network Traffic
  • Mobile Device Security
  • Network Security Tools
  • More Advanced
  • Additional Resources
  • Network Security in the Real World
  • Summary
  • Exercises
12

Operating System Security

  • Introduction
  • Operating System Hardening
  • Protecting Against Malware
  • Additional Resources
  • More Advanced
  • Software Firewalls and Host Intrusion Detection
  • Operating System Security Tools
  • Alert!
  • Operating System Security in the Real World
  • Summary
  • Exercises
13

Application Security

  • Introduction
  • The TJX Breach
  • Software Development Vulnerabilities
  • Additional Resources
  • Web Security
  • Alert!
  • More Advanced
  • Database Security
  • Additional Resources
  • Application Security Tools
  • More Advanced
  • Application Security in the Real World
  • Summary
  • Exercises

Fundamentals of Information Security

$64.00

Buy Now
scroll to top