Certified Security Analyst Training Preview
4.2 (309 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
8,470 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Certified Security Analyst Training Preview to your Wishlist.

Add to Wishlist

Certified Security Analyst Training Preview

Learn the pillars of information security and need for security analysis.
4.2 (309 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
8,470 students enrolled
Created by CyberTraining 365
Last updated 12/2016
English
English [Auto-generated]
Price: Free
Includes:
  • 1 hour on-demand video
  • 1 Article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Define Security and Information Security
  • Know the pillars of information security
  • Understand the need for security analysis
View Curriculum
Requirements
  • Nothing. This course is for beginners
Description

This course is designed for anyone who wants an understanding of information security analysis. More than ever, information security analysts are needed to rescue business when they have been breached as well as put in the controls and countermeasures to prevent cyber-attacks.

Learn the pillars of information security and need for security analysis.

This course will go over the following information security concepts:

  • Security and Information Technology Security - Defending information from unauthorized access use, Disclosure, Disruption, Modification, Perusal, Inspection, Recording or destruction.
  • Pillars of Information Security – 
    • Confidentiality - a state of secrecy or keeping secrets
    • Integrity - protecting information from being modified by unauthorized parties.
    • Authentication - It's the process of determining whether someone or something is, in fact, who or what it is or they are declared to be.
    • Authorization - Authorization is the process of giving someone permission to do or have something.
    • Availability - ensuring that authorized parties are able to access the information when needed.
    • Non-Repudiation - ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message.
  • Security Analysis and the need for Security Analysis
    • Concerning Elements – Theft, Fraud/Forgery, Unauthorized Information Access, Interception / Modification of Data, Data Loss.
    • Major assets to protect – Your assets, your network infrastructure, your personal data, availability of your networks, your credentials.
Who is the target audience?
  • Anyone who wants to expand their knowledge on information security
  • Those interested in a career as information security analyst
Students Who Viewed This Course Also Viewed
Curriculum For This Course
10 Lectures
01:07:17
+
The Pillars of Information Security and the need for Security Analysis
10 Lectures 01:07:27

This lecture will introduce to you security, how it's defined and the pillars of information security.

Course Intro
02:33

This lecture will go over the first pillar of information security, Confidentiality. 

Pillars of Information Security - Confidentiality
04:50

This lecture will go over the second and third pillars of information security, Integrity & Authentication.

Pillars of Information Security - Integrity & Authentication
06:10

This lecture will go over the third and fourth pillars of information security, Authentication and Authorization.

Pillars of Information Security - Authentication & Authorization
05:08

This lecture will go over the fourth and fifth pillars of information security, Authorization and Availability.

Pillars of Information Security - Authorization and Availability
03:53

This lecture will go over the sixth pillar of information security, Non-Repudiation.

Pillars of Information Security - Non-Repudiation
04:16

Need for Security Analysis Part 1
10:04

Need for Security Analysis Part 2
09:25

BONUS - Cybersecurity Greatest Challenges
20:49

BONUS **DISCOUNT COUPONS**
00:19
About the Instructor
CyberTraining 365
4.1 Average rating
2,263 Reviews
44,842 Students
16 Courses
Best Selling Instructor, 30,000+ Students

 Join the Cyber Security Industry in 2017!

Interested in starting a career in the Cyber Security Industry? 2017 is the time! 

Learning the fundamentals of Cyber Security provides you with a powerful, and very useful, set of skills. Learn to think like a hacker so you can better defend your networks and data by studying Penetration Testing and Ethical Hacking.   

Jobs in Cyber Security are plentiful. Receiving your Certified Ethical Hacker, Certified Hacker Forensic Investigator, Penetration Tester and Security+ certification will give you a strong background to more easily tackle and pick up more advanced exams, such as the CISSP certification.  

Get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over one million Cyber Security job openings globally. Demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take our word for it... take a look at the FREE previews (they are available in all our courses) and see for yourself!

About Us:

CyberTraining 365 is an online academy that offers most in-demand cybersecurity training and certification through different subscription models. Members have access to the ever growing library of quality, engaging videos that are taught by some of industry’s best and most recognized experts.

CyberTraining365 is powered by Social27's patented cloud-based eLearning platform, providing members with an engaging and collaborative learning environment. Through best in class content, social learning tools, and gamification, CyberTraining365 is taking eLearning from Isolation to Collaboration.