Designing and Executing Information Security Strategies

Coursera – Designing and Executing Information Security Strategies (University of Washington)
WEBRip | English | MP4 | 960 x 540 | AVC ~59.1 kbps | 29.970 fps
AAC | 128 Kbps | 44.1 KHz | 2 channels | 10:05:53 | 960 MB
Genre: eLearning Video / Information Technology, Computer Science, Security

Many of you will be aware of the Massive Open Online Course (MOOC) platform Coursera and the great content they offer. Among many other interesting online courses they occasionally run courses relevant to Information Security and while not all of them are worthwhile i’d like to highlight one in particular.

The ‘Designing and Executing Information Security Strategies’ course led by Mike Simon (University of Washington) provides a great no nonsense, non technical glimpse into the real world of Information Security practitioners. It does not get hung up on theoretical issues but focuses on real challenges and scenarios from Mike’s experience in the field. Obviously it is not ‘Zero to Hero’ Information Security professional course but it is a good introduction particularly to those who are not overly familiar with Information Security and like to know what all the fuss is about.
Financial Services ASP, provides credit clearance software services for 20 large banks worldwide
We provide the platform and the software, their (the banks) people operate the system
Our DBAs have access to the banks databases for support reasons
Network security, database security, application security are all ours
All of our customers audit us, using whatever standard they see fit ISO 27002, BS 7799, SS 627799, etc

Information in the database includes
Names
Date of birth
Financial details (income, savings, net worth)
Credit Card info
SSN
They want to know that every person with access to the data meets certain criteria
Background checked
Qualified for the work
Authorized specifically for access to their data

They want to know that there is distinct separation of duties for adding authenticated access to the database
They want to know exactly how network (not authenticated) access to web servers, application servers and database servers is protected
They want to know who has access to what, and they want to audit these accesses.

DOWNLOAD
(Buy premium account for maximum speed and resuming ability)

http://nitroflare.com/view/2BE769318AC869E/q3u1f.Designing.and.Executing.Information.Security.Strategies.part01.rar
http://nitroflare.com/view/0F93BE9969F1BCF/q3u1f.Designing.and.Executing.Information.Security.Strategies.part02.rar
http://nitroflare.com/view/12DCD09D1AD38E7/q3u1f.Designing.and.Executing.Information.Security.Strategies.part03.rar
http://nitroflare.com/view/D5A70CAD73867F6/q3u1f.Designing.and.Executing.Information.Security.Strategies.part04.rar
http://nitroflare.com/view/F15A51898F392ED/q3u1f.Designing.and.Executing.Information.Security.Strategies.part05.rar
http://nitroflare.com/view/5FC201A65B6B7A4/q3u1f.Designing.and.Executing.Information.Security.Strategies.part06.rar
http://nitroflare.com/view/865122B4CFA67FC/q3u1f.Designing.and.Executing.Information.Security.Strategies.part07.rar
http://nitroflare.com/view/8BDBB7A2E2787C3/q3u1f.Designing.and.Executing.Information.Security.Strategies.part08.rar
http://nitroflare.com/view/13F6C474A188E31/q3u1f.Designing.and.Executing.Information.Security.Strategies.part09.rar
http://nitroflare.com/view/C3C5994FC0248A5/q3u1f.Designing.and.Executing.Information.Security.Strategies.part10.rar
https://rapidgator.net/file/846efefeb06c755b7ccbbca4eb2f22ae/q3u1f.Designing.and.Executing.Information.Security.Strategies.part01.rar
https://rapidgator.net/file/405e0cf9ec633d20eef60b2358510aa1/q3u1f.Designing.and.Executing.Information.Security.Strategies.part02.rar
https://rapidgator.net/file/e1ba0008fe0535608b8d33aed2a9dec3/q3u1f.Designing.and.Executing.Information.Security.Strategies.part03.rar
https://rapidgator.net/file/6a524d2ea8389f6a073b8778f4b2ba8d/q3u1f.Designing.and.Executing.Information.Security.Strategies.part04.rar
https://rapidgator.net/file/9f70715357e2ddb499f57109fa4b863d/q3u1f.Designing.and.Executing.Information.Security.Strategies.part05.rar
https://rapidgator.net/file/793a0cb67ccdfbcc24a67cdcebeb5c45/q3u1f.Designing.and.Executing.Information.Security.Strategies.part06.rar
https://rapidgator.net/file/5072f0bfcd87d853e27ca0d9ce8f62e4/q3u1f.Designing.and.Executing.Information.Security.Strategies.part07.rar
https://rapidgator.net/file/a015dc1533917ec00e3d2cdf10d901ac/q3u1f.Designing.and.Executing.Information.Security.Strategies.part08.rar
https://rapidgator.net/file/4a5ef33c4839ef9cbc7854869a1a6296/q3u1f.Designing.and.Executing.Information.Security.Strategies.part09.rar
https://rapidgator.net/file/dd7fb59f7c2a2395a9c252f2f369d177/q3u1f.Designing.and.Executing.Information.Security.Strategies.part10.rar