Cyber Security and Information Security Fundamentals

Download Tutorial Cyber Security and Information Security Fundamentals

This course covers everything you’ve ever wanted to know about information security and cyber security.We’ll review the following concepts:

  • Confidentiality 
  • Integrity 
  • Availability 
  • Information      Security 
  • Control      Frameworks 
  • Security      Governance 
  • Risk      Management 
  • Business      Continuity Planning 
  • Digital      Signatures 
  • Digital      Certificates 
  • Hashing 
  • Organizational      Processes 
  • Security      Roles and Responsibilities 
  • Compliance 
  • Ethics 
  • Computer      Crimes 
  • Software      Licensing 
  • Export      Controls 
  • Data      Breaches 
  • Security      Policies 
  • RAID      Technology 
  • Risk      Assessment Techniques 
  • Quantitative      Risk Factors 
  • Risk      Management Strategies 
  • Security      Controls 
  • Understanding      Data Security 
  • Security      Policies 
  • Developing      Security Baselines 
  • Data      Security Roles 
  • Customizing      Security Standards 
  • Data      Privacy 
  • Customizing      Security Standards 
  • Leveraging      Industry Standards 
  • Data      Encryption 
  • Secure Design Principles   
  • Security Models   
  • Security Requirements   
  • Virtualization   
  • Cloud Computing Models   
  • Public Cloud Tiers   
  • Memory Protection   
  • Interface Protection   
  • High Availability and Fault Tolerance   
  • OWASP Top 10   
  • SQL Injections   
  • Cross-Site Scripting (XSS)   
  • Cross-Request Forgery   
  • Understanding Encryption   
  • Symmetric vs. Asymmetric Cryptography   
  • Goals of Cryptography   
  • Codes vs. Ciphers   
  • Key Lifecycle Management   
  • Data Encryption Standard (DES)   
  • Triple DES (3DES)   
  • Advanced Encryption Standard (AES)   
  • Blowfish   
  • Twofish   
  • RC4   
  • RSA Cryptography   
  • Elliptic Curve & Quantum Cryptography   
  • Key Exchange   
  • Diffie-Hellman Key Exchange   
  • Key Escrow   
  • Trust Models   
  • PKI and Digital Certificates   
  • Hash Functions and Digital Certificates   
  • Digital Signatures   

These are just a few of the topics covered in this course. Each  lecture is designed to introduce concepts in manner that breaks down  core concepts into fundamental principles. Whether you’re a beginner in  the field of information and cybersecurity, or an experience  professional, you will gain valuable knowledge that can be applied in  your personal and professional life.

Who this course is for:
  • This course is for anyone interested in information security and cyber security.
  • This course is for all levels (beginner, mid-level, and advanced)

Download Free Tutorial Cyber Security and Information Security Fundamentals


Password : freetuts.download

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Also

Back to top button