Protection of Information Assets Course is the third course of Exam Prep: Certified Information Systems Auditor (CISA) Specialization. Learners will dive into the OSI model, firewalls, VPNs, and network components, including LAN, VoIP, and wireless technologies. The course emphasizes data protection through encryption, introduces cloud computing fundamentals, and develops skills in security testing and digital forensics.



Protection of Information Assets
This course is part of Exam Prep: Certified Information Systems Auditor (CISA) Specialization

Instructor: Whizlabs Instructor
Access provided by Course Builder (Internal Testing)
Recommended experience
Skills you'll gain
Details to know

Add to your LinkedIn profile
4 assignments
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 2 modules in this course
Welcome to Week 1. This week, we'll delve into foundational security and network management topics, starting with Physical Access and Environmental Controls to understand infrastructure protection. We’ll explore Single Sign-On and Authentication Factors, followed by key Identity and Access Management principles. Moving into networking, we'll cover OSI layers, firewall types and implementations, and gain hands-on insight into Network Management Tools. You’ll also explore VPNs, LAN components, and wireless networks, concluding with an introduction to Voice over IP (VoIP) technologies.
What's included
12 videos2 readings2 assignments1 discussion prompt
Welcome to Week 2. This week, we'll explore essential cybersecurity fundamentals, beginning with data encryption techniques and the principles of Public Key Infrastructure (PKI). You'll gain clarity on cloud computing security considerations and the importance of organization-wide security awareness training programs. We'll also examine common information system attack methods and delve into hands-on exploration of security testing tools and techniques. Finally, you'll be introduced to evidence collection and digital forensics, equipping you to respond to security incidents effectively.
What's included
7 videos3 readings2 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career









