Cyber Security and Information Security for Beginners!

Posted By: Sigha

Cyber Security and Information Security for Beginners!
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 2.03 GB
Duration: 4 hours | Genre: eLearning | Language: English

2019 Introduction to Cyber Security and Information Security!


What you'll learn

Students who complete this course will go from having no prior knowledge of Cyber Security to having an advanced understanding of core principals, theoretical knowledge, and real world applications.
Learn Information and Cybersecurity efficiently with my INCLUDED DOWNLOADABLE PDF COURSE NOTES!!!!
Students will learn about a wide array of topics relating to information and cyber security. Everything from control frameworks to encryption and algorithms.
Gain a robust understanding of the CIA Triad, Asset Security, Governance, Public Key Infrastructure (PKI), Security Frameworks, and MUCH MORE!
Learn both practical and theoretical cyber security principles!
Identify and understand key Security Frameworks!
Acquire practical and theoretical skills taught to you buy a subject matter expect in the field of information security and cyber security

Requirements

Everything is taught. No previous experience or knowledge is required. Learn it all in this course!

Description


This course covers everything you've ever wanted to know about information security and cyber security. We'll review the following concepts:

Confidentiality

Integrity

Availability

Information Security

Control Frameworks

Security Governance

Risk Management

Business Continuity Planning

Digital Signatures

Digital Certificates

Hashing

Organizational Processes

Security Roles and Responsibilities

Compliance

Ethics

Computer Crimes

Software Licensing

Export Controls

Data Breaches

Security Policies

RAID Technology

Risk Assessment Techniques

Quantitative Risk Factors

Risk Management Strategies

Security Controls

Understanding Data Security

Security Policies

Developing Security Baselines

Data Security Roles

Customizing Security Standards

Data Privacy

Customizing Security Standards

Leveraging Industry Standards

Data Encryption

Secure Design Principles

Security Models

Security Requirements

Virtualization

Cloud Computing Models

Public Cloud Tiers

Memory Protection

Interface Protection

High Availability and Fault Tolerance

OWASP Top 10

SQL Injections

Cross-Site Scripting (XSS)

Cross-Request Forgery

Understanding Encryption

Symmetric vs. Asymmetric Cryptography

Goals of Cryptography

Codes vs. Ciphers

Key Lifecycle Management

Data Encryption Standard (DES)

Triple DES (3DES)

Advanced Encryption Standard (AES)

Blowfish

Twofish

RC4

RSA Cryptography

Elliptic Curve & Quantum Cryptography

Key Exchange

Diffie-Hellman Key Exchange

Key Escrow

Trust Models

PKI and Digital Certificates

Hash Functions and Digital Certificates

Digital Signatures

These are just a few of the topics covered in this course. Each lecture is designed to introduce concepts in manner that breaks down core concepts into fundamental principles. Whether you're a beginner in the field of information and cybersecurity, or an experience professional, you will gain valuable knowledge that can be applied in your personal and professional life.

Who this course is for:

This course is for anyone interested in information security and cyber security.
This course is for all levels (beginner, mid-level, and advanced)