1. Home
  2. Training Library
  3. Module 5 - Technical Security Controls

Introduction to Technical Security Controls

The course is part of this learning path

play-arrow
Start course
Overview
DifficultyBeginner
Duration1h 36m
Students5

Description

This course defines the different types of malware and outlines the impact that each one can have on an organization’s computer systems. It also details the different methods through which networks can be accessed, and how the related security risks can be controlled. Finally, it defines what cloud computing is and explains the different deployment models, before looking at the security requirements of an organization’s IT infrastructure and the documentation required to support this.

 

Learning Objectives

The objectives of this course are to provide you with and understanding of:

  • The different types of malware and the impact each one can have on an organization’s computer systems
  • Methods of accessing networks and how related security risks can be controlled
  • The security issues related to networking services, including mobile computing, instant messaging and voice over IP
  • Cloud computing deployment models and the security implications of cloud services
  • The security requirements of an organization’s IT infrastructure and the documentation required to support this

 

Intended Audience

This course is ideal for members of information security management teams, IT managers, security and systems managers, information asset owners and employees with legal compliance responsibilities. It acts as a foundation for more advanced managerial or technical qualifications.

 

Prerequisites

There are no specific pre-requisites to study this course, however a basic knowledge of IT, an understanding of the general principles of information technology security, and awareness of the issues involved with security control activity would be advantageous.

 

Feedback

We welcome all feedback and suggestions - please contact us at support@cloudacademy.com if you are unsure about where to start or if would like help getting started.

Transcript

Welcome to the Technical Security Controls Learning Path.

 

Security controls are safeguards or countermeasures which protect the hardware and software components of an organization’s information systems.

 

This learning path has five videos:

·        The first one defines the different types of malware and outlines the impact that each one can have on an organization’s computer systems;

·        The second video details the different methods through which networks can be accessed, and how the related security risks can be controlled;

·        After that, the third video looks at the security issues related to networking services, like mobile computing, instant messaging and voice over IP;

·        The fourth video then defines what cloud computing is and explains the different deployment models, before exploring the security implications of cloud services; and

·        The final video looks at the security requirements of an organization’s IT infrastructure and the documentation required to support this.

 

Each video focuses on the organizational risks and provides details of the countermeasures which can be used to control them.

 

The videos are supported by quizzes for you to check your understanding as you work through them.