Course Summary

Get a summary of this course.

“When good people in any country cease their vigilance and struggle, then evil men prevail.” - Pearl S. Buck

Best practices

Though it might sometimes seem complicated, a solid InfoSec foundation can be built by implementing well-known security best practices. These can be broken down into individual controls and processes implemented in a phased approach. As they’re used, the three tenets of information security will be served:

  • Protect

  • Detect

  • Respond

If best practices are focused on and implemented effectively, an organization’s exposure to attacks can be significantly reduced.

Note: At an Enterprise Security webcast in November 2015, Microsoft CEO Satya Nadella summed up the ...