Ethics in Information Security.
(eVideo)

Book Cover
Average Rating
Published
Carpenteria, CA linkedin.com, 2022.
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Format
eVideo
Language
English

Notes

General Note
3/08/202212:00:00AM
Participants/Performers
Presenter: Jerod Brennen
Description
Learn about the ethics of working in cybersecurity and how to have challenging conversations about those ethics.
Description
Cybersecurity professionals frequently find themselves at the center of moral and ethical debates about what they do and how they go about doing it. This course can help cybersecurity professionals better understand the ethics of working in cybersecurity, the expectations that various stakeholders are likely to have, and the challenging conversations that are needed regarding those ethics. Instructor Jerod Brennen digs into several situations that you may face in your career. Jerod covers situations you may face in the workplace, such as handling sensitive information, hacking back, reporting an ethical violation, and more. Next, he goes into situations tied to research, including responsible disclosure, hacktivism, and social engineering. Jerod discusses the global impact of cybersecurity ethics and the cybersecurity workforce, then finishes up with practical guidance on putting ethics into practice.
System Details
Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.

Citations

APA Citation, 7th Edition (style guide)

Brennen, J. (2022). Ethics in Information Security . linkedin.com.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Brennen, Jerod. 2022. Ethics in Information Security. linkedin.com.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Brennen, Jerod. Ethics in Information Security linkedin.com, 2022.

MLA Citation, 9th Edition (style guide)

Brennen, Jerod. Ethics in Information Security linkedin.com, 2022.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
b8c73a4f-d280-e186-fdcc-ddc63103de63-eng
Go To Grouped Work

Grouping Information

Grouped Work IDb8c73a4f-d280-e186-fdcc-ddc63103de63-eng
Full titleethics in information security
Authorbrennen jerod
Grouping Categorymovie
Last Update2024-04-15 10:54:20AM
Last Indexed2024-04-28 00:42:39AM

Book Cover Information

Image Sourcesideload
First LoadedAug 9, 2023
Last UsedSep 21, 2023

Marc Record

First DetectedMar 21, 2022 01:09:30 PM
Last File Modification TimeApr 15, 2024 11:00:56 AM

MARC Record

LEADER02341ngm a22003133i 4500
001LDC3014071
003LDC
00520240415154237.9
006m        c        
007cr cna       a
008240415s2022    cau057        o   vleng d
040 |a linkedin.com|b eng
050 4|a LDC3014071
1001 |a Brennen, Jerod|e speaker.
24510|a Ethics in Information Security.|c with Jerod Brennen
264 1|a Carpenteria, CA|b linkedin.com,|c 2022.
306 |a 00h:57m:15s
337 |a computer|2 rdamedia
338 |a online resource|2 rdacarrier
500 |a 3/08/202212:00:00AM
5111 |a Presenter: Jerod Brennen
520 |a Learn about the ethics of working in cybersecurity and how to have challenging conversations about those ethics.
520 |a Cybersecurity professionals frequently find themselves at the center of moral and ethical debates about what they do and how they go about doing it. This course can help cybersecurity professionals better understand the ethics of working in cybersecurity, the expectations that various stakeholders are likely to have, and the challenging conversations that are needed regarding those ethics. Instructor Jerod Brennen digs into several situations that you may face in your career. Jerod covers situations you may face in the workplace, such as handling sensitive information, hacking back, reporting an ethical violation, and more. Next, he goes into situations tied to research, including responsible disclosure, hacktivism, and social engineering. Jerod discusses the global impact of cybersecurity ethics and the cybersecurity workforce, then finishes up with practical guidance on putting ethics into practice.
538 |a Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.
655 4|a Instructional films.|2 lcgft
655 4|a Educational films.|2 lcgft
7102 |a linkedin.com (Firm)
85640|u https://www.linkedin.com/learning/ethics-in-information-security?u=103732282&auth=true|z View course details on linkedin.com/learning
85642|3 thumbnail|u https://media.licdn.com/dms/image/C560DAQHXvNv9yB0p0w/learning-public-crop_288_512/0/1646425097393?e=2147483647&v=beta&t=oKbZeUxBcRFetaeEKoBVMGRVqmAi7EbO4WRP951ZdLE