Information Technology and Security Principles
Information Technology and Security Principles Overview
Chris and Anthony break down what this module of the CRISC certification course contains and how it helps with the overall risk management lifecycle.
0h 2m
WEBVTT
(upbeat music) Welcome
everyone, my name is Anthony
Sequera and I'm gonna be your
host for this section of our C
RISC course and joining me, as
he always does, is Mr. Chris
Ward. He'll be leading us
through this section. Chris,
I understand this section is
one that I know I'm gonna love
because we're gonna get real
specific now on the types of
risks that we're gonna run up
against when it comes to
information systems. - Yes, and
one of the nice things is,
is not only we're gonna talk
about some of the risks,
but we kind of covered the
generic general risks in the
things that we do, but now
we're gonna get really specific
on the risk and the responses
that you should be planning,
whether you're mitigating,
avoiding, transferring. I mean,
we're gonna be talking about
things like, when do you use
encryption? When do you use
digital signatures? When do you
use things like access control
lists? When do you use that
least privilege and the
separation of duties? Okay,
so you get it? We're literally
gonna take a look at
information systems. We're
gonna talk about the security
for things like the
confidentiality of your data,
the integrity of your data and
the availability of your data.
This comes from the infamous
CIA or Iron Triangle. The CIA
stands for that
confidentiality, integrity and
availability. And so what are
we gonna do to protect it?
How do we protect in the data
lifecycle itself? How do we
protect in a system development
lifecycle? Got a lot of
lifecycles going on here and
it's gonna be great. I'm
excited about this. I know you
will be too and we're great.
I mean, you can't have a better
host than Anthony Sequera,
the expert, the guru in many of
these areas.
Well, and one of the
questions that I'm supposed to
ask Chris right now is why he's
uniquely qualified to bring
this event to us. I'm gonna not
even send that to him. I'm
gonna answer that for
everybody. I've been friends
and a coworker of Chris's for
going on 30 years now. And I
can tell you, he is uniquely
prepared to deliver this
content for us because before
he really started specializing
in things like project
management and ITIL, he did
technology. So he's got the
background in both computer
networking and the kind of
project management side of
things. So we are very, very
lucky to have Chris leading us
through this and I hope you're
excited and ready to click on
that very first episode of
content we have waiting for you
next. (upbeat music)
Overview
To be effective in the management of IT risk, the risk practitioner must have a working understanding of key principles and concepts of information technology and security. In this fourth of four courses to prepare you for the CRISC exam you will learn the foundational knowledge of risk when it comes in the form of computer hardware and software, networking concepts, secure system development and the importance of user training and awareness in the area of cybersecurity.
Learning Style
On Demand
Length of course
3h 56m
16 Episodes
Here are the topics we'll cover
- Information Technology Basics
- The Basics of Information Security
Learning Options