Protection of Information Assets

clock iconLength: 8h 2m
In this course you will look at the key components that ensure the CIA triangle (confidentiality, integrity, availability) of Information Security is maintained. You will learn the proper design and application of logical and physical access controls, network infrastructure security, and the role of the IS auditor in regard to these procedures.

All Access Learning Plans

Premium

BEST VALUE
$59/month

Best for certifications + hands-on labs

  • 7,000+ hours of IT & cybersecurity training
  • Skill Labs + practice tests

Standard

$39/month

Video-only access

  • 7,000+ hours of IT & cybersecurity training

Course Topics

governance