Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Cyber Security Fundamentals One

    Posted By: ELK1nG
    Cyber Security Fundamentals One

    Cyber Security Fundamentals One
    Published 2/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 230.12 MB | Duration: 0h 43m

    Cyber Security Course For Beginners

    What you'll learn

    Learn Cyber Security In An Easy Way

    Understand The Basic Concepts And Terminologies Used In The Information / Cyber Security Field

    Apply For Entry Level Roles (like Internships) Of Cybersecurity Positions

    Take More Advanced Information Security Courses

    Requirements

    Cyber Security is easy to learn. You need not to be a software developer or a network administrator to learn the fundamentals of Cyber Security.

    Description

    Introduction:Building your knowledge base is similar to building a house; without a solid foundation, it will be weak, and will fail when it is actually required. In this course my goal will be to lay solid foundation of Cyber Security for you. This course is designed to provide you with a solid foundation in cyber security, covering topics and terms used by Cyber Security Professionals. What you will be able to do after completion of this course ?You will be able to understand Cyber Security basics terminologies ( which will be very useful, if you have to collaborate with Cyber Security professionals).You can take any advance level courses.Topics Covered:Course Intro.What is data ?What is information ?State of data information.Data is equivalent to asset.Information security definition.Are Information Security & Cyber Security same ?CIA Triad (Objectives of Cyber Security)Summarization Of CIAAAA of Security Introduction.AuthenticationFive Methods Of AuthenticationAuthorizationAccountingNon-RepudiationSummarization Of AAATypes Of Hackers.Scenario To Understand Threat, Vulnerability, Exploit, Risk & Impact.Cyber Security ThreatsThreat Category - MalwareThreat category - Un-authorized Access.Threat category - System Failure.Threat Category - Social EngineeringThreat Category - Natural CalamitiesThreat actors and it's typesThreat actor - ExternalThreat Actor - InternalVulnerabilitiesRiskExposureTypes of controls: Physical, Technical, Administrative, Functionalities Of Security Controls.Summarization of threat actor, threat, vulnerability, risk and impact.

    Overview

    Section 1: Course Introduction

    Lecture 1 Course Intro.

    Section 2: Course Intro.

    Lecture 2 What is data ?

    Lecture 3 What is information ?

    Lecture 4 State of data / information.

    Lecture 5 Data is equivalent to asset.

    Section 3: Are Information & Cyber Security ?

    Lecture 6 Information security definition.

    Lecture 7 Are Information Security & Cyber Security same ?

    Section 4: CIA Triad (Objectives of Cyber Security)

    Lecture 8 CIA Triad

    Lecture 9 Summarization Of CIA

    Section 5: AAA of Security Introduction.

    Lecture 10 AAA of Security Introduction

    Lecture 11 Authentication

    Lecture 12 Five Methods Of Authentication

    Lecture 13 Authorization

    Lecture 14 Accounting

    Lecture 15 Non-Repudiation

    Lecture 16 Summarization Of AAA

    Section 6: Types Of Hackers

    Lecture 17 Types Of Hackers

    Section 7: Scenario To Understand Threat, Vulnerability, Exploit, Risk & Impact.

    Lecture 18 Threat, Vulnerability, Exploit, Risk & Impact

    Lecture 19 Cyber Security Threats

    Lecture 20 Threat Category - Malware

    Lecture 21 Threat category - Un-authorized Access

    Lecture 22 Threat category - System Failure

    Lecture 23 Threat Category - Social Engineering

    Lecture 24 Threat Category - Natural Calamities

    Lecture 25 Threat actors and it's types

    Lecture 26 Threat actor - External

    Lecture 27 Threat Actor - Internal

    Lecture 28 Vulnerabilities

    Lecture 29 Risk

    Lecture 30 Exposure

    Lecture 31 Types of controls

    Lecture 32 Types of controls: Physical Controls

    Lecture 33 Technical Controls

    Lecture 34 Administrative Controls

    Lecture 35 Functionalities Of Security Controls.

    Lecture 36 Summarization of threat actor, threat, vulnerability, risk and impact.

    Any one who want to begin his journey of Cyber Security. Building your knowledge base is similar to building a house: without a solid foundation, it will be weak, unpredictable, and fail in the most critical of moments. In this course you will lay your foundation of Cyber Security Knowledge.