Introduction to Cyber Security
Learn about the Fundamentals of Cyber Security, Enterprise architecture, Information governance and Incident response.
Hi, The following serves as a course description, discussing what each section comprises of.
In Section One: We will start with the basics and key Terms. Then we will learn about malware and various types of malware. Then we will learn what social engineering attacks are and the different types of social engineering attacks carried out by bad actors. Once we are done with that, then we will learn about the security policies and procedures an organization should follow. We will learn about the Information Technology control, Information Technology types, and Information Technology categories based on functionality. We will learn about Defense in depth/layered approach and Identity management (also known as IAM in short). We will also learn about patch management, patch management tasks, what data is, data management, System Hardening, and System Hardening activities Change control, the Purpose of Change control, and the change control flow diagram.
We will also learn about asset management, asset management lifecycle, Data management, states of data, data classification, and information lifecycle. Lastly, we will cover encryption, the importance of encryption, cryptography, types of encryption – symmetric encryption and asymmetric, factors influencing encryption, and incident response. goals of incident response and security training.
In Section two: we will learn more about the Enterprise Architecture and its components. We will begin with secure architecture and then we will learn about wireless networks, Bluetooth Technology, network security controls, Cloud Technology, what virtualization is and its importance, BYOD – Bring Your Own Device Policy, IoT Security, and role of Security Testing.
In Section Three: We will learn more about the Information Security Governance. we will learn what Cloud is, what virtualization is and its applications, Bring your Own device Policy and Security Testing and its role. We will begin with Virtualization and later learn about what risk management is, the process of risk management, how to analyze risk, how to manage risks, and what the risk IT framework is. We will also learn what Information Security Program is, its components, what its objectives are, the Types of IS Programs, its challenges, and outcomes, and Supply Chain Management
In Section 4 : We will learn about incident response. We will learn about Incident Management and Response Systems.
Lastly in Section 5: we will learn about the science of Digital Forensics.
I sincerely hope that you will find this course useful in understanding the fundamentals of Cyber Security. Please feel free to write a review and I will do my best to improve the content quality. Happy learning.
–
SKILLS YOU WILL GAIN
You will learn about the Network Security Controls and it’s importance.
You will learn the Fundamentals of Cyber Security
You will learn about Information Security
You will learn about Security policies and Procedures
WHAT YOU WILL LEARN
You will be more Cyberaware
You will gain an understanding of the vital concepts of Cybersecurity
You will learn about the Science of Digital Forensics
You will learn about Incident Response System
User Reviews
Be the first to review “Introduction to Cyber Security”
Original price was: ₹995.00.₹199.00Current price is: ₹199.00.
There are no reviews yet.