In this course you will look at the key components that ensure the CIA triangle (confidentiality, integrity, availability) of Information Security is maintained. You will learn the proper design and application of logical and physical access controls, network infrastructure security, and the role of the IS auditor in regard to these procedures.
Why learners love us.
Thinking of Doing it Alone?
Self-paced vs. structured training
It takes 3–6 months to prep for each certification solo
Protection of Information Assets - ACI Learning — B2C Sandbox
Protection of Information Assets
Length: 8h 2m
In this course you will look at the key components that ensure the CIA triangle (confidentiality, integrity, availability) of Information Security is maintained. You will learn the proper design and application of logical and physical access controls, network infrastructure security, and the role of the IS auditor in regard to these procedures.
Why learners love us.
Thinking of Doing it Alone?
Self-paced vs. structured training
It takes 3–6 months to prep for each certification solo