Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
***New Course Released March 29th, 2016 With Already 1,800+ Students Happily Enrolled***
ACTUAL STUDENT REVIEWS
"I am a completely newbie when it comes to IT but due to the extremely high demand in the field of IT security, I decided that this was something that I had to learn. I struggled trying to learn on my own, until I finally came across this course. This course provided me with the necessary information to understand the foundations of IT security. It feels good to say that I finally "get it"! I can now say that I have the confidence and knowledge to further my skills in IT security. Great beginner course! The instructor is also very clear and well spoken on the lessons, making it even easier to understand. I highly recommend this course to anyone seeking to start their career in the field of IT security." - Pedro
"Easy to follow and great for beginners. The course gives a nice insight in IT security and also this course will help you understand how networking works. Easy to follow, on point and the lectures are very clear and organized. Finally I am able to start my networking career. Thanks Sir. Recommended to all levels." - Naveed
INFORMATION SECURITY DEMYSTIFIED FOR NON-TECHIES
Are you a non-techie interested in learning about information security? Are you a business or aspiring IT professional that needs to better understand how cyber security works? Then you have come to the right place!
This course will teach you the fundamentals of information security and essential cyber security core principles, designed for Non-Techies!
WHAT YOU'LL LEARN IN THIS COURSE:
***Additional Course Material Added Daily***
COURSE MINI-CASE SCENARIOS
You'll also learn by the "case method" that is commonly used in both law and business school. I will be creating and uploaded course mini-cases, where I walk through and complete the entire case for you while you are watching. This will hopefully help you to think about the course and all of it's topics holistically and synergistic-ally.
Once you complete this course, you'll understand the core principles of information security to help you better protect your I.T. and business infrastructure!
SO WHAT ARE YOU WAITING FOR? ENROLL TODAY, YOUR 100% RISK-FREE ENROLLMENT IS BACKED BY UDEMY'S 30-DAY, NO QUESTIONS ASKED, MONEY BACK GUARANTEE!
PREVIEW OVER 1 HOUR OF THIS COURSE THROUGH MY 20 FREE LECTURES, JUST SCROLL DOWN BELOW AND CLICK THE BLUE PREVIEW BUTTONS.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Course Introduction|
Welcome to the Course!Preview
What This Course Is & What It Isn'tPreview
How to Get The Most Out Of This CoursePreview
Discussion Board Activity: Introduce Yourself
|Section 2: Getting Started In Information Security|
The Many Areas of Information SecurityPreview
Beginning Point Certifications & Degrees
Class Discussion Item: Your IT Security Aspirations
|Section 3: The Need for Information Security|
The Need for Information Security
Optional Student Activity: Vimeo & Youtube Videos to Watch
Links: Videos to Watch
Discussion Board Activity: Video Takeaways
|Section 4: Information Security Principles|
The CIA TriadPreview
General Password Rules
Designing an Authentication Strategy with Microsoft Technet
|Section 5: Access Control|
Physical and Logical Access Controls
Defense in DepthPreview
Access Control Models
Student Activity: Analyzing Your Organization's Access Control
|Section 6: Basic Network Zones|
Basic Network Zones
Mini-Case Scenario: Secure Network Design
|Section 7: Network Security Devices|
Intrusion Detection & Prevention Systems
Virtual Private Networks
|Section 8: Hardening Systems|
Hardening a System
Patch and Change ManagementPreview
|Section 9: Network Threats & Vulnerabilities|
Transmission Media Security ConcernsPreview
Wireless Networking Security Concerns
Network-Based Threats and Attacks
Student Activity: Locking Down Your Home's Wi-Fi
|Section 10: Network Scanning Tools|
SuperScan Port ScannerPreview
Nmap Zenmap Network Scanner
Tenable Nessus Vulnerability Scanner
|Section 11: Security Malware Threats|
Introduction to Malware
Spyware and Adware
Protecting Against Malware
Social Engineering Attacks
Why Social Engineering Succeeds
|Section 12: Introduction to Crytography|
Introduction to CrytographyPreview
|Section 13: Introduction to Risk Management|
Section Lectures Coming Soon!!!
|Section 14: Disaster Recovery|
Disaster Planning and Testing
Disaster Recovery and Redunancy
The Disaster Recovery Planning ProcessPreview
|Section 15: Personnel Policies|
Code of Ethics
Separation of Duties
Education and Training
|Section 16: Class Mini-Case Scenarios|
Mini-Case Scenario #1: Small Tax Accounting Office
Class Discussion Item: Mini-Case Scenario #1
|Section 17: Congratulations!|
Wisdom Begins with Wonder - Socrates
Alton is an educator, poker coach, self-published & best-selling author, and full-time IT and Business professional. He is also the founder of MicroGrinder, a free online website dedicated to micro stakes poker players, where he provides a wide array of free poker resources and poker training, included poker strategy articles and poker training video series.
Outside of poker, Alton is a full-time business and IT professional, where he works in the field of cyber security. He has earned two graduate degrees, an M.B.A. and M.S. in IT Network Management; moreover, he currently holds multiple IT industry certifications.
Alton also has a fond love for teaching. As an undergraduate he group tutored chemistry students and as a graduate student he taught a GMAT prep course. Upon graduating from his MBA program, he began teaching as an adjunct professional for the School of Business & Public Administration at his local state university in the field of Information Systems and IT Management.
The Beautiful Thing about Learning Is That No One Can Take It Away from You. - B.B. King