3
16
Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. The module Information Security Management Professional based on ISO/IEC 27001 tests understanding of the organizational, physical, and technical aspects of information security.
Course Curriculum
-
- Introduction to ISMP 00:05:00
- ISMP Learning outcomes and skill 00:05:00
- ISMP Phishing 00:05:00
- ISMP Phishing kits 00:05:00
- ISMP Phishing attacks 00:05:00
- ISMP Phishing attacks part 2 00:05:00
- ISMP Identifying a Phishing Email 00:05:00
- ISMP Email Security 00:05:00
- ISMP Email Security Policies 00:05:00
- ISMP Email Security tools 00:05:00
- ISMP Social Engineering 00:05:00
- ISMP Dangers of Social Engineering 00:05:00
- ISMP PSEC 00:05:00
- ISMP P&E Threat and Control 00:05:00
- ISMP Access Control 00:05:00
- ISMP Desktop and PC Security 00:05:00
-
- Chapter 1 00:05:00
- Chapter 2 00:05:00
- Chapter 3 00:05:00
- Chapter 4 00:05:00
- Chapter 5 00:05:00
- Chapter 6 00:05:00
- Chapter 7 00:05:00
- Chapter 8 00:05:00
- Chapter 9 00:05:00
- Chapter 10 00:05:00
- Chapter 11 00:05:00
- Chapter 12 00:05:00
- Chapter 13 00:05:00
- Chapter 14 00:05:00
Course Reviews
5
- 5 stars3
- 4 stars0
- 3 stars0
- 2 stars0
- 1 stars0
Course Curriculum
-
- Introduction to ISMP 00:05:00
- ISMP Learning outcomes and skill 00:05:00
- ISMP Phishing 00:05:00
- ISMP Phishing kits 00:05:00
- ISMP Phishing attacks 00:05:00
- ISMP Phishing attacks part 2 00:05:00
- ISMP Identifying a Phishing Email 00:05:00
- ISMP Email Security 00:05:00
- ISMP Email Security Policies 00:05:00
- ISMP Email Security tools 00:05:00
- ISMP Social Engineering 00:05:00
- ISMP Dangers of Social Engineering 00:05:00
- ISMP PSEC 00:05:00
- ISMP P&E Threat and Control 00:05:00
- ISMP Access Control 00:05:00
- ISMP Desktop and PC Security 00:05:00
-
- Chapter 1 00:05:00
- Chapter 2 00:05:00
- Chapter 3 00:05:00
- Chapter 4 00:05:00
- Chapter 5 00:05:00
- Chapter 6 00:05:00
- Chapter 7 00:05:00
- Chapter 8 00:05:00
- Chapter 9 00:05:00
- Chapter 10 00:05:00
- Chapter 11 00:05:00
- Chapter 12 00:05:00
- Chapter 13 00:05:00
- Chapter 14 00:05:00
Course Reviews
5
- 5 stars3
- 4 stars0
- 3 stars0
- 2 stars0
- 1 stars0
-
WizywiseAugust 31, 2022 at 9:01 pm
A Good Course
5This should be a compulsory course to take when venturing into the field of cybersecurity
-
King ElokimAugust 30, 2022 at 1:11 am
Awesome course content
5It was very insightful and enlightening
-
Jimoh Olalekan IdowuAugust 27, 2021 at 9:25 am
AMAZING
5It was an amazing lecture. Mr. Bankole tried. He was free and simple in his diction. I understood all that he said. The only challenge i had was the slides that were not presented for me to see. I hope some file will be provided. I also hope that this content will be made accessible to me anytime i want to revisit the lessons. Thanks to Halogen Academy. I love you.
A Good Course
This should be a compulsory course to take when venturing into the field of cybersecurity
Awesome course content
It was very insightful and enlightening
AMAZING
It was an amazing lecture. Mr. Bankole tried. He was free and simple in his diction. I understood all that he said. The only challenge i had was the slides that were not presented for me to see. I hope some file will be provided. I also hope that this content will be made accessible to me anytime i want to revisit the lessons. Thanks to Halogen Academy. I love you.