Companies Home Search Profile

Cybersecurity & Information Security Fundamentals for all

Focused View

4:07:10

0 View
  • 1 -Course Agenda.pdf
  • 1 -Curriculum and Agenda of this course.mp4
    03:34
  • 2 -Abut Me.mp4
    01:48
  • 3 -What in this course.mp4
    02:51
  • 1 -Overview of Information Security.mp4
    04:15
  • 2 -Importance of Information Security.mp4
    03:15
  • 2 -Lec 3- Internet Data Privacy Resources.pdf
  • 3 -Key Concepts Confidentiality, Integrity, and Availability or (CIA Triad).mp4
    05:12
  • 4 -Legal and Regulatory Compliance.mp4
    05:21
  • 4 -List of Key Regulations.txt
  • 1 -Understanding Cyber Threats.mp4
    01:31
  • 2 -Lec 7- Ransomware.pdf
  • 2 -Types of Threats Malware, Phishing, Social Engineering, etc (Part 1).mp4
    02:44
  • 3 -Lec 8- Targeted Phishing Resources.pdf
  • 3 -Types of Threats Malware, Phishing, Social Engineering, etc (Part 2).mp4
    04:34
  • 4 -Common Vulnerabilities (Part 1).mp4
    04:40
  • 5 -Common Vulnerabilities (Part 2).mp4
    02:55
  • 6 -Case Studies of Major Security Breaches.mp4
    03:52
  • 7 -Vulnerability Assessment (Part 1).mp4
    05:20
  • 8 -Vulnerability Assessment (Part 2).mp4
    03:12
  • 1 -Introduction to Security Policies and Procedures.mp4
    00:37
  • 2 -Importance of Security Policies.mp4
    03:18
  • 3 -Developing Effective Security Policies.mp4
    03:56
  • 3 -Developing Effective Security Policies- Templates.docx
  • 4 -Incident Response Plan.mp4
    06:15
  • 4 -Incident Response Plan-Exercise.doc
  • 4 -Incident Response Scenario Test.docx
  • 5 -Disaster Recovery Plan.mp4
    05:07
  • 6 -Business Continuity Plan.mp4
    05:19
  • 1 -Fundamentals of Network Security.mp4
    05:10
  • 2 -Firewalls and Intrusion Detection Systems.mp4
    05:28
  • 3 -Virtual Private Networks (VPNs).mp4
    05:22
  • 4 -Secure Network Architecture.mp4
    06:21
  • 5 -Resources.pdf
  • 5 -Wireless Network Security.mp4
    06:23
  • 1 -Introduction to Cryptography.mp4
    05:07
  • 2 -Lec 26- Encryption.pdf
  • 2 -Types of Encryption Symmetric and Asymmetric.mp4
    03:59
  • 3 -Digital Signatures and Certificates.mp4
    04:02
  • 4 -Public Key Infrastructure (PKI).mp4
    04:27
  • 5 -Lec 29- 2-Factor Authentication (2FA) Resources.pdf
  • 5 -Practices in Cryptography.mp4
    04:20
  • 1 -Importance of Endpoint Security.mp4
    04:24
  • 2 -Antivirus and Antimalware Solutions.mp4
    04:20
  • 3 -Secure Configuration of Endpoints.mp4
    03:47
  • 4 -Mobile Device Security.mp4
    03:23
  • 5 -Endpoint Detection and Response (EDR).mp4
    05:43
  • 1 -Understanding Application Security.mp4
    04:28
  • 2 -Secure Software Development Life Cycle (SDLC).mp4
    05:42
  • 3 -Common Application Vulnerabilities OWASP Top 10.mp4
    05:00
  • 4 -Web Application Firewalls (WAFs).mp4
    05:26
  • 5 -Secure Coding Practices.mp4
    04:06
  • 1 -Principles of Identity and Access Management (IAM).mp4
    06:24
  • 2 -Authentication vs. Authorization.mp4
    03:42
  • 3 -Multi-Factor Authentication (MFA).mp4
    04:20
  • 4 -Role-Based Access Control (RBAC).mp4
    03:09
  • 5 -Identity Management Solutions.mp4
    06:12
  • 1 -Importance of Security Awareness.mp4
    02:57
  • 2 -Building a Security-Aware Culture.mp4
    04:45
  • 3 -Training Programs for Employees.mp4
    05:00
  • 4 -Phishing Simulation Exercises.mp4
    04:07
  • 5 -Continuous Learning and Improvement.mp4
    04:01
  • 6 -PowerPiont TEMPLATE Awareness Trainign on Cybersecurity.mp4
    01:06
  • 6 ----Click Read Only to Open----Cybersecurity Awareness by MrShapon.pptx
  • 1 -Cloud Security.mp4
    06:31
  • 2 -Internet of Things (IoT) Security.mp4
    04:15
  • 3 -Artificial Intelligence and Machine Learning in Security.mp4
    04:05
  • 4 -Blockchain and Security.mp4
    04:36
  • 5 -Preparing for Future Challenges.mp4
    03:40
  • 1 -Course Wrap-Up and Looking Ahead.mp4
    01:46
  • Description


    Learn the Fundamentals of Information Security and Cybersecurity Management | ISO/ IEC 27001:2022 & ISMS

    What You'll Learn?


    • Introduction to Information Security
    • Threats and Vulnerabilities
    • Security Policies and Procedures
    • Enhance Network Security
    • Network Security
    • Cryptography
    • Endpoint Security
    • Application Security
    • Identity and Access Management
    • Security Awareness and Training
    • Emerging Trends and Future of Information Security

    Who is this for?


  • People who want to sharpened their knowledge on Information Security. It could for your personal information safety, for your proffessional information safety or for your skill development.
  • What You Need to Know?


  • A Basic Understanding of Computers and browsing
  • Very Basic Understanding of Networks
  • Strong ambition to learn
  • More details


    Description

    "Information Security is a fundamental right for everyone – for you, your children, your friends, and your relatives. Whether at home, in the workplace, or anywhere else, understanding and implementing information security is essential. It is a crucial topic that helps protect your information from hackers and intruders, ensuring your digital safety and privacy in today's interconnected world."

    Are you ready to take your information security knowledge to the next level? Welcome to my "Comprehensive Guide to Information Security & Cybersecurity" course, designed for beginners and professionals alike who want to master the essentials of cybersecurity.


    Course Highlights:

    • Introduction to Information Security

    • Threats and Vulnerabilities

    • Network Security

    • Cryptography

    • Application Security

    • Identity and Access Management (IAM)

    • Security Awareness and Training

    • Emerging Trends and Future of Information Security


    Why Enroll in This Course?

    Expert Instructor:  Learn from an experienced information security professional with a proven track record in the industry.

    Hands-On Learning:  Engage with practical examples, case studies, and real-world scenarios.

    Comprehensive Curriculum: Cover all aspects of information security, from basic principles to advanced strategies.


    Who Should Enroll?

    • Aspiring cybersecurity professionals looking to build a solid foundation.

    • IT professionals seeking to enhance their security skills.

    • Business leaders wanting to understand and mitigate cyber risks.

    • Anyone interested in learning about the critical aspects of information security.


    By the end of this course, you’ll have the knowledge and skills to effectively protect digital assets and mitigate cyber threats. This will help you to be more aware on your corporate and personal information security.

    Who this course is for:

    • People who want to sharpened their knowledge on Information Security. It could for your personal information safety, for your proffessional information safety or for your skill development.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 58
    • duration 4:07:10
    • Release Date 2024/12/05