->
Information Security & Cyber Security - Made Easy! (Updated)
 
Information Security & Cyber Security - Made Easy! (Updated)
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 4 hour | Size: 2.03 GB
Information Security & Cyber Security - Made Easy!


What you'll learn

Students who complete this course will go from having no prior knowledge of Cyber Security to having an advanced understanding of core principals, theoretical knowledge, and real world applications.
Learn Information and Cybersecurity efficiently with my included FREE DOWNLOADABLE PDF COURSE NOTES!!!!
Students will learn about a wide array of topics relating to information and cyber security. Everything from control frameworks to encryption and algorithms.
Gain a robust understanding of the CIA Triad, Asset Security, Governance, Public Key Infrastructure (PKI), Security Frameworks, and MUCH MORE!
Learn both practical and theoretical cyber security principles!
Identify and understand key Security Frameworks!
Acquire practical and theoretical skills taught to you buy a subject matter expect in the field of information security and cyber security

Requirements

Everything is taught. No previous experience or knowledge is required. Learn it all in this course!

Description

This course covers everything you've ever wanted to know about information security and cyber security. We'll review the following concepts:

Confidentiality
Integrity
Availability
Information Security
Control Frameworks
Security Governance
Risk Management
Business Continuity Planning
Digital Signatures
Digital Certificates
Hashing
Organizational Processes
Security Roles and Responsibilities
Compliance
Ethics
Computer Crimes
Software Licensing
Export Controls
Data Breaches
Security Policies
RAID Technology
Risk Assessment Techniques
Quantitative Risk Factors
Risk Management Strategies
Security Controls
Understanding Data Security
Security Policies
Developing Security Baselines
Data Security Roles
Customizing Security Standards
Data Privacy
Customizing Security Standards
Leveraging Industry Standards
Data Encryption
Secure Design Principles
Security Models
Security Requirements
Virtualization
Cloud Computing Models
Public Cloud Tiers
Memory Protection
Interface Protection
High Availability and Fault Tolerance
OWASP Top 10
SQL Injections
Cross-Site Scripting (XSS)
Cross-Request Forgery
Understanding Encryption
Symmetric vs. Asymmetric Cryptography
Goals of Cryptography
Codes vs. Ciphers
Key Lifecycle Management
Data Encryption Standard (DES)
Triple DES (3DES)
Advanced Encryption Standard (AES)
Blowfish
Twofish
RC4
RSA Cryptography
Elliptic Curve & Quantum Cryptography
Key Exchange
Diffie-Hellman Key Exchange
Key Escrow
Trust Models
PKI and Digital Certificates
Hash Functions and Digital Certificates
Digital Signatures

These are just a few of the topics covered in this course. Each lecture is designed to introduce concepts in manner that breaks down core concepts into fundamental principles. Whether you're a beginner in the field of information and cybersecurity, or an experience professional, you will gain valuable knowledge that can be applied in your personal and professional life.

Who this course is for:

This course is for anyone interested in information security and cyber security.
This course is for all levels (beginner, mid-level, and advanced)

 

Homepage: https://www.udemy.com/information-security-cyber-security-made-easy/

Information Security & Cyber Security - Made Easy! (Updated)


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Broknote   |  

Information
Members of Guests cannot leave comments.




rss