Information Security Essentials

Information Security Essentials is an interdisciplinary approach to modern information security, covering data, network, Web services, end-point and an introduction to cloud computing security. The explosion of mobile devices has impacted significantly digital and telecom networks; this shift has challenged the limits of traditional data, network and security schemes. The consolidation and virtualization of systems in years past has changed the architecture and topology of networks, not to mention the monolithic security systems in the data center where physical and logical security is integrated. This course provides a holistic end-to-end view of modern information security and covers the current state and evolution of data, network, Web services and end-point security by using real case studies.

The course introduces data security technologies in evolution from symmetric/asymmetric encryption to secure key management, Key Management Interoperability Protocol (KMIP), global standards and Certificate Authorities (CA). It covers network security from the LAN, WAN and Secure SAN perspective and analyzes Web services from email phishing trends to the risks of social engineering and social media. You’ll learn about mobile exploits on the server and the client side, as well as the new security trends in enterprises with Virtual Desktop Infrastructure (VDI) and Bring Your Own Device (BYOD). In all cases, you’ll learn about security challenges, management techniques and best practices. Each major topic includes real-world case studies with analysis and quantification of the breaches.


The course concludes with an introduction to cloud computing security and future trends in security products. You’ll discuss a security product in use in the industry today that incorporates the comprehensive security features mentioned in the course.


Prior to enrolling, you should have basic knowledge of data encryption, networking and storage systems. By the end of the course, you’ll understand the security challenges, security models and technologies available in the market today to solve these challenges.


Topics Include:



  • Integrated security fundamentals and trends

  • Data security

  • Network security

  • Web services security

  • End-point security and introduction to cloud-computing security

  • Product case study




Skills Needed: Solid knowledge of networking and data management is required.