Protection of Information Assets

clock iconLength: 8h 2mmodules iconModules: 8episodes iconEpisodes: 35
In this course you will look at the key components that ensure the CIA triangle (confidentiality, integrity, availability) of Information Security is maintained. You will learn the proper design and application of logical and physical access controls, network infrastructure security, and the role of the IS auditor in regard to these procedures.
Protection of Information Assets Overview

Protection of Information Assets Overview

Level Up with Unlimited Learning

Premium

BEST VALUE
$59/month

Best for certifications + hands-on labs

  • 7,000+ hours of IT & cybersecurity training
  • Skill Labs + practice tests

Standard

$39/month

Video-only access

  • 7,000+ hours of IT & cybersecurity training

Course Topics

Governance

Modules in this Course

  • Basics
  • Containers
  • Comparables
  • Numbers
  • Attributes
  • Functions
  • Context Managers
  • Serialization
Protection of Information Assets - ACI Learning — B2C