Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Cyber Security and Information Security for Beginners!

    Posted By: Sigha
    Cyber Security and Information Security for Beginners!

    Cyber Security and Information Security for Beginners!
    .MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 2.03 GB
    Duration: 4 hours | Genre: eLearning | Language: English

    2019 Introduction to Cyber Security and Information Security!


    What you'll learn

    Students who complete this course will go from having no prior knowledge of Cyber Security to having an advanced understanding of core principals, theoretical knowledge, and real world applications.
    Learn Information and Cybersecurity efficiently with my INCLUDED DOWNLOADABLE PDF COURSE NOTES!!!!
    Students will learn about a wide array of topics relating to information and cyber security. Everything from control frameworks to encryption and algorithms.
    Gain a robust understanding of the CIA Triad, Asset Security, Governance, Public Key Infrastructure (PKI), Security Frameworks, and MUCH MORE!
    Learn both practical and theoretical cyber security principles!
    Identify and understand key Security Frameworks!
    Acquire practical and theoretical skills taught to you buy a subject matter expect in the field of information security and cyber security

    Requirements

    Everything is taught. No previous experience or knowledge is required. Learn it all in this course!

    Description


    This course covers everything you've ever wanted to know about information security and cyber security. We'll review the following concepts:

    Confidentiality

    Integrity

    Availability

    Information Security

    Control Frameworks

    Security Governance

    Risk Management

    Business Continuity Planning

    Digital Signatures

    Digital Certificates

    Hashing

    Organizational Processes

    Security Roles and Responsibilities

    Compliance

    Ethics

    Computer Crimes

    Software Licensing

    Export Controls

    Data Breaches

    Security Policies

    RAID Technology

    Risk Assessment Techniques

    Quantitative Risk Factors

    Risk Management Strategies

    Security Controls

    Understanding Data Security

    Security Policies

    Developing Security Baselines

    Data Security Roles

    Customizing Security Standards

    Data Privacy

    Customizing Security Standards

    Leveraging Industry Standards

    Data Encryption

    Secure Design Principles

    Security Models

    Security Requirements

    Virtualization

    Cloud Computing Models

    Public Cloud Tiers

    Memory Protection

    Interface Protection

    High Availability and Fault Tolerance

    OWASP Top 10

    SQL Injections

    Cross-Site Scripting (XSS)

    Cross-Request Forgery

    Understanding Encryption

    Symmetric vs. Asymmetric Cryptography

    Goals of Cryptography

    Codes vs. Ciphers

    Key Lifecycle Management

    Data Encryption Standard (DES)

    Triple DES (3DES)

    Advanced Encryption Standard (AES)

    Blowfish

    Twofish

    RC4

    RSA Cryptography

    Elliptic Curve & Quantum Cryptography

    Key Exchange

    Diffie-Hellman Key Exchange

    Key Escrow

    Trust Models

    PKI and Digital Certificates

    Hash Functions and Digital Certificates

    Digital Signatures

    These are just a few of the topics covered in this course. Each lecture is designed to introduce concepts in manner that breaks down core concepts into fundamental principles. Whether you're a beginner in the field of information and cybersecurity, or an experience professional, you will gain valuable knowledge that can be applied in your personal and professional life.

    Who this course is for:

    This course is for anyone interested in information security and cyber security.
    This course is for all levels (beginner, mid-level, and advanced)

    Cyber Security and Information Security for Beginners!