Cyber Security and Information Security for Beginners!
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 2.03 GB
Duration: 4 hours | Genre: eLearning | Language: English
2019 Introduction to Cyber Security and Information Security!
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 2.03 GB
Duration: 4 hours | Genre: eLearning | Language: English
2019 Introduction to Cyber Security and Information Security!
What you'll learn
Students who complete this course will go from having no prior knowledge of Cyber Security to having an advanced understanding of core principals, theoretical knowledge, and real world applications.
Learn Information and Cybersecurity efficiently with my INCLUDED DOWNLOADABLE PDF COURSE NOTES!!!!
Students will learn about a wide array of topics relating to information and cyber security. Everything from control frameworks to encryption and algorithms.
Gain a robust understanding of the CIA Triad, Asset Security, Governance, Public Key Infrastructure (PKI), Security Frameworks, and MUCH MORE!
Learn both practical and theoretical cyber security principles!
Identify and understand key Security Frameworks!
Acquire practical and theoretical skills taught to you buy a subject matter expect in the field of information security and cyber security
Requirements
Everything is taught. No previous experience or knowledge is required. Learn it all in this course!
Description
This course covers everything you've ever wanted to know about information security and cyber security. We'll review the following concepts:
Confidentiality
Integrity
Availability
Information Security
Control Frameworks
Security Governance
Risk Management
Business Continuity Planning
Digital Signatures
Digital Certificates
Hashing
Organizational Processes
Security Roles and Responsibilities
Compliance
Ethics
Computer Crimes
Software Licensing
Export Controls
Data Breaches
Security Policies
RAID Technology
Risk Assessment Techniques
Quantitative Risk Factors
Risk Management Strategies
Security Controls
Understanding Data Security
Security Policies
Developing Security Baselines
Data Security Roles
Customizing Security Standards
Data Privacy
Customizing Security Standards
Leveraging Industry Standards
Data Encryption
Secure Design Principles
Security Models
Security Requirements
Virtualization
Cloud Computing Models
Public Cloud Tiers
Memory Protection
Interface Protection
High Availability and Fault Tolerance
OWASP Top 10
SQL Injections
Cross-Site Scripting (XSS)
Cross-Request Forgery
Understanding Encryption
Symmetric vs. Asymmetric Cryptography
Goals of Cryptography
Codes vs. Ciphers
Key Lifecycle Management
Data Encryption Standard (DES)
Triple DES (3DES)
Advanced Encryption Standard (AES)
Blowfish
Twofish
RC4
RSA Cryptography
Elliptic Curve & Quantum Cryptography
Key Exchange
Diffie-Hellman Key Exchange
Key Escrow
Trust Models
PKI and Digital Certificates
Hash Functions and Digital Certificates
Digital Signatures
These are just a few of the topics covered in this course. Each lecture is designed to introduce concepts in manner that breaks down core concepts into fundamental principles. Whether you're a beginner in the field of information and cybersecurity, or an experience professional, you will gain valuable knowledge that can be applied in your personal and professional life.
Who this course is for:
This course is for anyone interested in information security and cyber security.
This course is for all levels (beginner, mid-level, and advanced)