Jump to content

Cyber Security and Information Security for Beginners!


Recommended Posts

 

ee8a3b3f6161b82f6d1392c6be3327c2.jpg

Cyber Security and Information Security for Beginners!

.MP4 | Video: 1280x720, 30 fps® | Audio: AAC, 44100 Hz, 2ch | 2.03 GB

Duration: 4 hours | Genre: eLearning | Language: English

 

2019 Introduction to Cyber Security and Information Security!

 

What you'll learn

 

Students who complete this course will go from having no prior knowledge of Cyber Security to having an advanced understanding of core principals, theoretical knowledge, and real world applications.

Learn Information and Cybersecurity efficiently with my INCLUDED DOWNLOADABLE PDF COURSE NOTES!!!!

Students will learn about a wide array of topics relating to information and cyber security. Everything from control frameworks to encryption and algorithms.

Gain a robust understanding of the CIA Triad, Asset Security, Governance, Public Key Infrastructure (PKI), Security Frameworks, and MUCH MORE!

Learn both practical and theoretical cyber security principles!

Identify and understand key Security Frameworks!

Acquire practical and theoretical skills taught to you buy a subject matter expect in the field of information security and cyber security

 

Requirements

 

Everything is taught. No previous experience or knowledge is required. Learn it all in this course!

 

Description

 

This course covers everything you've ever wanted to know about information security and cyber security. We'll review the following concepts:

 

Confidentiality

 

Integrity

 

Availability

 

Information Security

 

Control Frameworks

 

Security Governance

 

Risk Management

 

Business Continuity Planning

 

Digital Signatures

 

Digital Certificates

 

Hashing

 

Organizational Processes

 

Security Roles and Responsibilities

 

Compliance

 

Ethics

 

Computer Crimes

 

Software Licensing

 

Export Controls

 

Data Breaches

 

Security Policies

 

RAID Technology

 

Risk Assessment Techniques

 

Quantitative Risk Factors

 

Risk Management Strategies

 

Security Controls

 

Understanding Data Security

 

Security Policies

 

Developing Security Baselines

 

Data Security Roles

 

Customizing Security Standards

 

Data Privacy

 

Customizing Security Standards

 

Leveraging Industry Standards

 

Data Encryption

 

Secure Design Principles

 

Security Models

 

Security Requirements

 

Virtualization

 

Cloud Computing Models

 

Public Cloud Tiers

 

Memory Protection

 

Interface Protection

 

High Availability and Fault Tolerance

 

OWASP Top 10

 

SQL Injections

 

Cross-Site Scripting (XSS)

 

Cross-Request Forgery

 

Understanding Encryption

 

Symmetric vs. Asymmetric Cryptography

 

Goals of Cryptography

 

Codes vs. Ciphers

 

Key Lifecycle Management

 

Data Encryption Standard (DES)

 

Triple DES (3DES)

 

Advanced Encryption Standard (AES)

 

Blowfish

 

Twofish

 

RC4

 

RSA Cryptography

 

Elliptic Curve & Quantum Cryptography

Diffie-Hellman Key Exchange

 

Key Escrow

 

Trust Models

 

PKI and Digital Certificates

 

Hash Functions and Digital Certificates

 

Digital Signatures

 

These are just a few of the topics covered in this course. Each lecture is designed to introduce concepts in manner that breaks down core concepts into fundamental principles. Whether you're a beginner in the field of information and cybersecurity, or an experience professional, you will gain valuable knowledge that can be applied in your personal and professional life.

 

Who this course is for:

 

This course is for anyone interested in information security and cyber security.

This course is for all levels (beginner, mid-level, and advanced)

 

 

21e5c21c9e62a9bb831ef9b37b291048.jpg

DOWNLOAD

(Buy premium account for maximum speed and resuming ability)

 

http://nitroflare.com/view/124C8D1B05E0D08/1sash.Cyber.Security.and.Information.Security.for.Beginners.part1.rar

http://nitroflare.com/view/6E7642578A20755/1sash.Cyber.Security.and.Information.Security.for.Beginners.part2.rar

http://nitroflare.com/view/1060A525A6EC103/1sash.Cyber.Security.and.Information.Security.for.Beginners.part3.rar

 

https://rapidgator.net/file/014d680c9af610fbccb49cb2abbb65e7/1sash.Cyber.Security.and.Information.Security.for.Beginners.part1.rar

https://rapidgator.net/file/e061c3dc75016f569cb213301a6ff977/1sash.Cyber.Security.and.Information.Security.for.Beginners.part2.rar

https://rapidgator.net/file/e6f3d5e6aa77f8ce3276b776f8b3dce3/1sash.Cyber.Security.and.Information.Security.for.Beginners.part3.rar

 

http://turbobit.net/8tkpt9xx1hsk/1sash.Cyber.Security.and.Information.Security.for.Beginners.part1.rar.html

http://turbobit.net/cjxogi9imw8f/1sash.Cyber.Security.and.Information.Security.for.Beginners.part2.rar.html

http://turbobit.net/y8wd8aj2x9qp/1sash.Cyber.Security.and.Information.Security.for.Beginners.part3.rar.html

 

 

Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...