Cyber Security Fundamentals One

Cyber Security Essentials For Beginners

Ratings 4.71 / 5.00
Cyber Security Fundamentals One

What You Will Learn!

  • Learn Cyber Security In An Easy Way
  • Understand The Basic Concepts And Terminologies Used In The Information / Cyber Security Field
  • Apply For Entry Level Roles (like Internships) Of Cybersecurity Positions
  • Take More Advanced Information Security Courses

Description

Introduction:


Building your knowledge base is similar to building a house; without a solid foundation, it will be weak, and will fail when it is actually required. In this course my goal will be to lay solid foundation of Cyber Security for you. This course is designed to provide you with a solid foundation in cyber security, covering topics and terms used by Cyber Security Professionals.


What you will be able to do after completion of this course ?


  • You will be able to understand Cyber Security basics terminologies ( which will be very useful, if you have to collaborate with Cyber Security professionals).

  • You can take any advance level courses.


Topics Covered:


  1. Course Intro.

  2. What is data ?

  3. What is information ?

  4. State of data information.

  5. Data is equivalent to asset.

  6. Information security definition.

  7. Are Information Security & Cyber Security same ?

  8. CIA Triad (Objectives of Cyber Security)

    1. Summarization Of CIA

  9. AAA of Security Introduction.

    1. Authentication

    2. Five Methods Of Authentication

    3. Authorization

    4. Accounting

    5. Non-Repudiation

    6. Summarization Of AAA

  10. Types Of Hackers.

  11. Scenario To Understand Threat, Vulnerability, Exploit, Risk & Impact.

    1. Cyber Security Threats

    2. Threat Category - Malware

    3. Threat category - Un-authorized Access.

      • Threat category - System Failure.

      • Threat Category - Social Engineering

      • Threat Category - Natural Calamities

    4. Threat actors and it's types

      • Threat actor - External

      • Threat Actor - Internal

    5. Vulnerabilities

    6. Risk

    7. Exposure

  12. Types of controls: Physical, Technical, Administrative,

  13. Functionalities Of Security Controls.

  14. Summarization of threat actor, threat, vulnerability, risk and impact.

Who Should Attend!

  • Any one who want to begin his journey of Cyber Security. Building your knowledge base is similar to building a house: without a solid foundation, it will be weak, unpredictable, and fail in the most critical of moments. In this course you will lay your foundation of Cyber Security Knowledge.

TAKE THIS COURSE

Tags

  • Cyber Security

Subscribers

569

Lectures

37

TAKE THIS COURSE



Related Courses