Information Security & Cyber Security Training

Ultimate training with exclusive certified program from TRANSATSECURITY.
4.0 (15 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
133 students enrolled
$20
Take This Course
  • Lectures 32
  • Contents Video: 1 hour
    Other: 13 mins
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2015 English

Course Description

If your work or future career is related to any field of security and want to make a strong ground for it, than this training is for you! Based on unique express training format in less than 1 hour you will learn information security fundamentals from zero. You will never find such an easy training with such an incredible guaranties. And we feel so confident about our training, that we offer 30 days money back guaranty.

As we always use three fundamental disciplines in our security training, for the first time on web, information security training provided with intelligence, cyber security and anti terrorism perspectives. As an Instructor my experience includes 5 years of teaching military, law enforcement, military and corporate students, that gives me a great opportunity to deliver valuable knowledge with very significant aspects.

Inside this training you will also find the bonus slides with powerful tips for security professionals.

One of the greatest part of this training is that you don't need to have any background in IT to enroll in this training. You don't even need books, software or platform. Everything that you need to learn INFOSEC fundamentals is inside this training. So you are ready to go!

After successful completion of that training, you will receive our special certificate to validate your security knowledge. We will be in touch with you all the time using Udemy and other our web-resources to support your professional development.

What are the requirements?

  • The greatest part of this training is that you don't need to have any background in IT to enroll in this training. You don't even need books, software or platform. Everything that you need to learn INFOSEC fundamentals is inside this training. So you are ready to go!
  • Certification: After successful completion of that training you will receive our certificate with PDF format. For the printed version of certificate additional sipping costs may apply.

What am I going to get from this course?

  • Enhance critical thinking
  • Identify threats
  • Learn the most important aspects of security
  • Better manage security in any organization
  • Train your employees
  • Prepare policies and guidelines
  • Dealing with managers
  • You will get our special software for free and learn how to use it

What is the target audience?

  • Individuals who want to make a career in any field of security
  • Individuals who are already employed in security business
  • Professionals in any fields whose work is related to sensitive data and valuable assets
  • It field professional
  • Managers

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction to INFOSEC
About The Training
Preview
01:58
Introduction
Preview
02:11
Section 2: Information Security as a Profession
Why Information Security
Preview
02:12
Security Landscape
Preview
01:12
Critical Infrastructure
Preview
02:10
Section 3: Information Security Fundamentals
Introduction
Preview
00:40
Holistic Approach
00:37
CIA Triad
01:51
Security Layers
01:44
Standards Compliance
02:10
Information Security Lifecycle
01:28
INFOSEC Policy examples
2 pages
Section 4: Dealing with Managers
Dealing with Managers
01:34
Dealing with Managers
2 pages
Section 5: Know your enemy
Introduction
00:56
Hackers
03:42
Cyber Threats
00:42
The Nature of Cyber Terrorism
3 pages
Module 5: Recommended Book
1 page
Section 6: Dealing with Insiders
Introduction
00:56
Your answer
1 question
Alternative view of Information Security
01:37
Dealing with the Insider Threat
03:36
Data Breach Statistics
2 pages
Module 6: Recommended Book
1 page
Section 7: Biometric Technology
Overview
03:00
Section 8: Social Engineering
Social Engineering - Methods and Scenarios
06:53
Social Engineering Module: Recommended Book
1 page
Section 9: Data Destruction
Data Destruction
02:53
Data Shredder - Practical Guide
01:15
Section 10: Knowledge check
The Final Quiz
10 questions
Section 11: Certification
Instruction
Article
Section 12: Conclusion
What you have learned
1 page
Congratulations
00:34

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Lasha Pataraia, Information Security Expert, Author, Instructor & Speaker

Information Security and Cyber Intelligence expert. Author, Speaker, Instructor and Entrepreneur. Managing 4 security companies around the globe. Including TransatSecurity, Caucasus Academy of Security Experts, Information Security Studies and Analysis Center and PowerTies Consulting Group. Member of Cyber Security forum initiative US and certified policy compliance, vulnerability management and risk assessment specialist. In educational background Mr. Pataraia has the Diplomatic and Legal specialties as well as numerous trainings with certifications from world’s leading companies. Such as IFS, FORS, ORACLE, QUALYS and so on. With qualification of information security analyst and manager, also developer of Enterprise Resource Planning systems and business process analyst. In 2008-2010 He was working in Israeli’s company as a sub-contractor of Ministry of Defence of Georgia, where he was the leading information security analyst. Managing very first projects he was involved in implementation of ERP systems of international brands in the Caucasus region. In 2010 Mr. Lasha Pataraia established the first and so far the only in the Caucasus Information Security Studies and Analysis Center - ISSAC. Recently Mr. Pataraia has published several works on information security and intelligence. In 2012 Mr. Pataraia founded The Caucasus Academy of Security Experts - CASE which is the first and only think tank providing interdisciplinary program of intelligence, antiterrorism and cyber security. Being the author of numerous software products and scientific researches, he implemented a number of successful projects at private and governmental sectors. Mr. Pataraia recently published the first book in Georgia about Cyber Crime –legal and intelligence aspects. He also is an independent consultant working on cyber investigations and legal consulting. In 2014 Mr. Pataraia gathered team of experienced professionals and founded TRANSATSECURITY, where he is a CEO and also security analyst. He also is an instructor in information security and cyber intelligence trainings.

Instructor Biography

TRANSAT SECURITY, TRANSATLANTIC COMMUNITY FOR SECURITY PROFESSIONALS

TRANSATSECURITY is a transatlantic community for security professionals ranging from the public to private sectors, within every industry, and for organizations of all sizes as well as for individual security practitioners. Our network is dedicated to increasing the productivity of security professionals by giving them timely, valuable, and accurate information. We also provide training and special tools and access to our extended database of members.

TRANSATSECURITY focuses solely on intelligence, cyber security, military defense and anti-terrorism issues. In this era where espionage holds a significant technological component, threats are considerably difficult to manage. The risk of new threats emerging is very high. Consequently, the security of any and all sensitive information has become a vital aspect for all nations and businesses globally in their day-to-day operations.
Taking into consideration the current threats and challenges that global security faces, we gathered a team of experienced and highly trained professionals - former intelligence officers, legal professionals, cyber security specialists, military defense experts and other field specialists from public and private sectors. We have also established the instructional tools to aid security professionals in the private and public sector to fight cyber-espionage, cyber-terrorism, piracy, corporate espionage and other significant alarming problems in the field. Raising public awareness is significantly beneficial for all individuals collecting, handling, storing or providing information electronically.

TRANSATSECURITY wants to make it supremely difficult for people looking to steal sensitive information from companies and individuals by arming everyone with our instruction and advice. At TRANSATSECURITY, we build security network, analyze several aspects of global security, educate professionals and provide powerful capabilities to advance security as a profession!

Ready to start learning?
Take This Course