Lectures - Introduction to Information Assurance and Security (University of Phoenix online)


Week 1

View video (30:15): Lecture, Week 1

This is the recorded lecture for Week 1 of CMGT400 Introduction to Information Assurance and Security (University of Phoenix). I wrote and recorded this lecture and the others on this page to assist my students in understanding key concepts.

In this lecture, I discuss the basics of security and take a high-level look at risk management.


Week 2

View video (21:39): Lecture, Week 2

This is the recorded lecture for Week 2 of CMGT400 Introduction to Information Assurance and Security (University of Phoenix). In this lecture, I assess the value of network segmentation, explain the how's and why's of vulnerability detection, and provide an overview of security information and event management (SIEM). I close with a discussion of security controls cost/benefit analysis and various regulations mandating security in the United States.


Week 3

View video (37:04): Lecture, Week 3

This is the recorded lecture for Week 3 of CMGT400 Introduction to Information Assurance and Security (University of Phoenix). It begins with a look at various types of access control (MAC, DAC, and RBAC). I follow this with a discussion of firewalls and intrusion prevention. I close with an analysis of business continuity planning and the existence of aggregate risk.


Week 4

View video (24.19): Lecture, Week 4

This is lecture 4 of a five part series I wrote and deliver to my students during the class I facilitate online for the University of Phoenix. In this lecture, I discuss how to develop a security program, including policies, standards, and guidelines. Also discussed is how to measure and audit expected outcomes, including use of penetration tests. I close the lecture with a look at user training and awareness.


Week 5

View video (33.16): Lecture, Week 4

This is lecture 4 of a five part series I wrote and deliver to my students during the class I facilitate online for the University of Phoenix. In this lecture, I discuss how to develop a security program, including policies, standards, and guidelines. Also discussed is how to measure and audit expected outcomes, including use of penetration tests. I close the lecture with a look at user training and awareness.