Introduction to Cyber Security and Information Security 2019
4.0 (44 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,393 students enrolled

Introduction to Cyber Security and Information Security 2019

2019 Introduction to Cyber Security and Information Security!
4.0 (44 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,393 students enrolled
Created by e-Learning PRO
Last updated 1/2019
English
English [Auto-generated]
Current price: $11.99 Original price: $99.99 Discount: 88% off
3 days left at this price!
30-Day Money-Back Guarantee
This course includes
  • 4 hours on-demand video
  • 14 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to Udemy's top 3,000+ courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Students who complete this course will go from having no prior knowledge of Cyber Security to having an advanced understanding of core principals, theoretical knowledge, and real world applications.
  • Learn Information and Cybersecurity efficiently with my INCLUDED DOWNLOADABLE PDF COURSE NOTES!!!!

  • Students will learn about a wide array of topics relating to information and cyber security. Everything from control frameworks to encryption and algorithms.

  • Gain a robust understanding of the CIA Triad, Asset Security, Governance, Public Key Infrastructure (PKI), Security Frameworks, and MUCH MORE!
  • Learn both practical and theoretical cyber security principles!
  • Identify and understand key Security Frameworks!
  • Acquire practical and theoretical skills taught to you buy a subject matter expect in the field of information security and cyber security
Requirements
  • Everything is taught. No previous experience or knowledge is required. Learn it all in this course!
Description


This course covers everything you've ever wanted to know about information security and cyber security. We'll review the following concepts:   

  • Confidentiality 

  • Integrity 

  • Availability 

  • Information      Security 

  • Control      Frameworks 

  • Security      Governance 

  • Risk      Management 

  • Business      Continuity Planning 

  • Digital      Signatures 

  • Digital      Certificates 

  • Hashing 

  • Organizational      Processes 

  • Security      Roles and Responsibilities 

  • Compliance 

  • Ethics 

  • Computer      Crimes 

  • Software      Licensing 

  • Export      Controls 

  • Data      Breaches 

  • Security      Policies 

  • RAID      Technology 

  • Risk      Assessment Techniques 

  • Quantitative      Risk Factors 

  • Risk      Management Strategies 

  • Security      Controls 

  • Understanding      Data Security 

  • Security      Policies 

  • Developing      Security Baselines 

  • Data      Security Roles 

  • Customizing      Security Standards 

  • Data      Privacy 

  • Customizing      Security Standards 

  • Leveraging      Industry Standards 

  • Data      Encryption 

  • Secure Design Principles   

  • Security Models   

  • Security Requirements   

  • Virtualization   

  • Cloud Computing Models   

  • Public Cloud Tiers   

  • Memory Protection   

  • Interface Protection   

  • High Availability and Fault Tolerance   

  • OWASP Top 10   

  • SQL Injections   

  • Cross-Site Scripting (XSS)   

  • Cross-Request Forgery   

  • Understanding Encryption   

  • Symmetric vs. Asymmetric Cryptography   

  • Goals of Cryptography   

  • Codes vs. Ciphers   

  • Key Lifecycle Management   

  • Data Encryption Standard (DES)   

  • Triple DES (3DES)   

  • Advanced Encryption Standard (AES)   

  • Blowfish   

  • Twofish   

  • RC4   

  • RSA Cryptography   

  • Elliptic Curve & Quantum Cryptography   

  • Key Exchange   

  • Diffie-Hellman Key Exchange   

  • Key Escrow   

  • Trust Models   

  • PKI and Digital Certificates   

  • Hash Functions and Digital Certificates   

  • Digital Signatures   

These are just a few of the topics covered in this course. Each  lecture is designed to introduce concepts in manner that breaks down  core concepts into fundamental principles. Whether you're a beginner in  the field of information and cybersecurity, or an experience  professional, you will gain valuable knowledge that can be applied in  your personal and professional life. 

Who this course is for:
  • This course is for anyone interested in information security and cyber security.
  • This course is for all levels (beginner, mid-level, and advanced)
Course content
Expand 63 lectures 04:11:32
+ Introduction
63 lectures 04:11:32
Understanding Information Security
03:29
Hashing
02:52
Digital Signatures and Digital Certificates
02:12
Availability
02:30
Security Governance
02:12
Organizational Processes
02:34
Security Roles and Responsibilities
02:04
Compliance and Ethics
02:44
Industry Specific Laws
03:11
Computer Crimes
02:08
Software Licensing
02:57
Data Breaches and Ethics
01:34
Security Policy Framework
02:27
Common Policies and Key Principles
03:49
Business Continuity Planning
01:46
Business Continuity Controls and Key Technical Concepts
04:30
RAID Technology
03:04
Risk Management
03:10
Risk Assessment Techniques
02:58
Quantitative Risk Factors
04:08
Risk Management Strategies
03:14
Security Controls
03:03
Understanding Data Security
02:38
Data Security Policies
02:52
Data Security Roles
02:40
Data Privacy
03:50
Developing Security Baselines
02:40
Leveraging Industry Standards
04:45
Customizing Security Standards
02:35
Understanding Encryption
03:14
Secure Design Principles
07:34
Security Models
05:52
Security Requirements
08:52
Virtualization
07:17
Cloud Computing Models
05:54
Public Cloud Tiers
05:56
Memory Protection
06:23
Interface Protection
08:04
High Availability and Fault Tolerance
05:51
SQL Injection Prevention
04:06
Cross-Site Scripting Prevention
03:50
Cross-Site Request Forgery
02:40
Understanding Encryption
03:14
Symmetric and Asymmetric Cryptography
06:34
Cryptography Goals
02:18
Codes and Ciphers
02:57
Key Lifecycle Management
10:25
Data Encryption Standards (DES)
03:35
Triple DES (3DES)
03:45
AES, Blowfish, and Twofish
08:21
RC4
03:04
RSA Encryption
07:24
Elliptic-Curve Cryptography and Quantum Cryptography
03:20
Key Exchange
03:20
Key Escrow
04:00
Trust Models
02:58
Public Key Infrastructure (PKI) and Digital Certificates
04:05
Hash Functions
02:52
Digital Signatures and Digital Certificates
02:12