Description:
2019 Introduction to Cyber Security and Information Security!
Created by: e-Learning PRO
Last updated: 1/2019
Language: English
Caption (CC): Included
BestBeller: 4.9 (12 ratings)
Torrent Contains: 146 Files, 1 Folders
Course Source:
https://www.udemy.com/the-2019-guide-to-cyber-security-and-information-security/ What you'll learn
• Students who complete this course will go from having no prior knowledge of Cyber Security to having an advanced understanding of core principals, theoretical knowledge, and real world applications.
• Learn Information and Cybersecurity efficiently with my INCLUDED DOWNLOADABLE PDF COURSE NOTES!!!!
• Students will learn about a wide array of topics relating to information and cyber security. Everything from control frameworks to encryption and algorithms.
• Gain a robust understanding of the CIA Triad, Asset Security, Governance, Public Key Infrastructure (PKI), Security Frameworks, and MUCH MORE!
• Learn both practical and theoretical cyber security principles!
• Identify and understand key Security Frameworks!
• Acquire practical and theoretical skills taught to you buy a subject matter expect in the field of information security and cyber security
Requirements
• Everything is taught. No previous experience or knowledge is required. Learn it all in this course!
Description
This course covers everything you've ever wanted to know about information security and cyber security. We'll review the following concepts:
• Confidentiality
• Integrity
• Availability
• Information Security
• Control Frameworks
• Security Governance
• Risk Management
• Business Continuity Planning
• Digital Signatures
• Digital Certificates
• Hashing
• Organizational Processes
• Security Roles and Responsibilities
• Compliance
• Ethics
• Computer Crimes
• Software Licensing
• Export Controls
• Data Breaches
• Security Policies
• RAID Technology
• Risk Assessment Techniques
• Quantitative Risk Factors
• Risk Management Strategies
• Security Controls
• Understanding Data Security
• Security Policies
• Developing Security Baselines
• Data Security Roles
• Customizing Security Standards
• Data Privacy
• Customizing Security Standards
• Leveraging Industry Standards
• Data Encryption
• Secure Design Principles
• Security Models
• Security Requirements
• Virtualization
• Cloud Computing Models
• Public Cloud Tiers
• Memory Protection
• Interface Protection
• High Availability and Fault Tolerance
• OWASP Top 10
• SQL Injections
• Cross-Site Scripting (XSS)
• Cross-Request Forgery
• Understanding Encryption
• Symmetric vs. Asymmetric Cryptography
• Goals of Cryptography
• Codes vs. Ciphers
• Key Lifecycle Management
• Data Encryption Standard (DES)
• Triple DES (3DES)
• Advanced Encryption Standard (AES)
• Blowfish
• Twofish
• RC4
• RSA Cryptography
• Elliptic Curve & Quantum Cryptography
• Key Exchange
• Diffie-Hellman Key Exchange
• Key Escrow
• Trust Models
• PKI and Digital Certificates
• Hash Functions and Digital Certificates
• Digital Signatures
These are just a few of the topics covered in this course. Each lecture is designed to introduce concepts in manner that breaks down core concepts into fundamental principles. Whether you're a beginner in the field of information and cybersecurity, or an experience professional, you will gain valuable knowledge that can be applied in your personal and professional life.
Who this course is for:
• This course is for anyone interested in information security and cyber security.
• This course is for all levels (beginner, mid-level, and advanced)