Description
Designed specifically for members of an IT staff, this suite of 10 courses from SANS provides you with the basic information you need to know to be an effective member of a cybersecurity management team in your organization.
Produced by the SANS Institute
Courses*
*Only available as a suite. Durations are approximate.
- Encryption (2 minutes)
Encryption is a security control that protects the confidentiality and integrity of information. This module defines encryption and how an encryption key works to encrypt and decrypt information. - Personally Identifiable Information (PII) (3 minutes)
This module defines PII and the extra steps employees must take to protect it and other types of confidential information. This module is built on and recommends people watch the Data Security module first. - Physical Security (3 minutes)
Physical security is an important component of information security. This module discusses how employees can protect the physical security of your facilities by managing visitors, protecting entrances and exits, and using proper information disposal and related physical security behaviors. - Insider Threat (2 minutes)
Insider threats are trusted employees, contractors or third parties who exploit their insider status and maliciously harm an organization. This module explores examples of insider threats, their warning signs and how to reduce the likelihood of an attack by using strong organizational security practices. - Cloud Services (3 minutes)
Cloud services enable data storage and sharing, and authorized use must occur safely and securely. This module explains these risks to employees and shows them how to safely use authorized cloud providers in your organization. - Privileged Access (2 minutes)
Select staff members have privileged access to your critical systems, and it is very important that they are secure. We discuss how these privileged users can protect themselves and your organization, including limiting the information they share and how they can detect if a system is compromised. - IAM for Technical Staff (4 minutes)
Identity and Access Management (IAM) is a framework of tools and processes used to centrally control who can log onto resources as well as manage the actions people can perform once logged in. This module helps technical staff understand IAM concepts and the best practices to use around IAM. - Infrastructure as a Service (5 minutes)
Infrastructure as a Service, or IaaS, cloud service model offers the most flexibility and control, but it also requires the most configuration, support and maintenance. This module reviews how to safely use IaaS in your organization. - Platform as a Service (7 minutes)
Platform as a Service, or PaaS, is a type of cloud service in which the provider takes care of the hardware, middleware or software used to run the platform, while the customer is responsible for anything else hosted within the platform. This module reviews how to safely use PaaS in your organization. - Software as a Service (6 minutes)
Software as a Service, or SaaS, removes much of the burden associated with security, but it also means there is less visibility into what is happening to the systems and code used to provide the service. This module reviews how to safely use SaaS in your organization.