Companies Home Search Profile

Basics of Information Security

Focused View

Gayathri VM

2:06:10

151 View
  • 1 - Concepts of Information Security.html
  • 1 - Introduction to Information Security.mp4
    34:19
  • 2 - Attacks.html
  • 2 - Introduction to Risk System.mp4
    20:17
  • 3 - Risk Management.html
  • 3 - Threats and Vulnerabilities.mp4
    20:18
  • 4 - Security Approaches.mp4
    24:15
  • 5 - Types of Security.mp4
    27:01
  • Description


    Threats, Vulnerabilities, Risk Assessment, SecSDLC

    What You'll Learn?


    • Understand the concepts of Information Security
    • Define the importance of Risk Management
    • Classify and Identify the threats and Vulnerabilities
    • Understand the security approaches and its contributions

    Who is this for?


  • Beginners who are very curious of Security domain
  • What You Need to Know?


  • No prior knowledge about Information security is needed. It teaches the basics about Information Security
  • More details


    Description

    The "Basics of Information Security" course provides a comprehensive introduction to the essential principles and practices that safeguard information systems. The course begins with an overview of the various types of security attacks, such as malware, phishing, and denial-of-service attacks, emphasizing the evolving nature of these threats in the digital age.

    Understanding threats and vulnerabilities forms a crucial part of the curriculum, where students learn to identify and assess potential weaknesses within systems that could be exploited by malicious entities. This includes studying common vulnerabilities like software bugs, configuration errors, and human factors that can lead to security breaches.

    Risk management is a key component of the course, teaching students how to evaluate and prioritize risks to effectively allocate resources towards mitigating potential threats. This involves learning about risk assessment methodologies and frameworks, as well as practical techniques for implementing risk management strategies.

    The course also delves into various safeguard mechanisms, exploring both technical and administrative controls designed to protect information systems. This includes an in-depth look at encryption, firewalls, intrusion detection systems, and access control measures. Students gain hands-on experience in deploying and managing these safeguards to fortify information security.

    Security approaches are examined, encompassing both proactive and reactive strategies. Proactive measures focus on prevention and preparedness, while reactive strategies deal with incident response and recovery. The course emphasizes the importance of a balanced security posture, integrating both approaches to create robust defense mechanisms.

    By the end of the course, students will have a solid foundation in the principles of information security, equipping them with the knowledge and skills needed to protect information assets in various organizational contexts.

    Who this course is for:

    • Beginners who are very curious of Security domain

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dr.V.M.Gayathri is currently working as an Associate Professor in SRM Institute of science and technology in the department of Networking and Communications from June 2017. She Completed her Ph.D., in Saveetha Institute of Medical and Technical Sciences in the year 2019 on Ad-hoc Network security. She received her Master’s Degree in the field of Computer Science and Engineering from B.S.Abdur Rahman Crescent University. She earned her Bachelor’s Degree in the field of Computer Science from Anna University. She got placed in on-campus drive of Cognizant Technical Solutions (CTS) during the end of third year of her UG studies. After completing her UG, she worked as a lecturer in SBC Engineering College for 6 months till Cognizant Technical Solutions called out for employment. That experience gave her the right route to serve the society in the way of teaching. It showed her the path and gave self-realization about her career. Then, she worked in CTS as Program Analyst Trainee for 8 months. As teaching is her passion, she has started her career as an Assistant Professor in Saveetha School of Engineering around 4 years. In total, she has 9 years of Teaching Experience. Her Areas of Interests are Wireless Communication, Network Security, Deep Learning and Artificial Intelligence.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 5
    • duration 2:06:10
    • Release Date 2024/07/26