Protection of Information Assets
In this course you will look at the key components that ensure the CIA triangle (confidentiality, integrity, availability) of Information Security is maintained. You will learn the proper design and application of logical and physical access controls, network infrastructure security, and the role of the IS auditor in regard to these procedures.
All Access Learning Plans
Premium
BEST VALUE$59/month
Best for certifications + hands-on labs
- 7,000+ hours of IT & cybersecurity training
- Skill Labs + practice tests
Standard
$39/month
Video-only access
- 7,000+ hours of IT & cybersecurity training
Course Topics
governance
All Access Learning Plans
Premium
BEST VALUE$59/month
Best for certifications + hands-on labs
- 7,000+ hours of IT & cybersecurity training
- Skill Labs + practice tests
Standard
$39/month
Video-only access
- 7,000+ hours of IT & cybersecurity training