Information Security For Beginners And Intermediates

Course

Online

£ 30 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

This course is designed for Cyber security enthusiast, students and even as a refresher course for those who re already part of cyber security domain. It provides holistic approach towards cyber security and covers almost all the aspects of Cyber security domain. It provides Technical , Administrative as well as Management aspect of Cyber security. The course is designed with real world scenario and issues. It provides insight into cyber security issues as well as ways to address them.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Terminologies
Misconceptions
Types of Phishing
Fundamentals of Information Security
Attack techniques
Security Mechanisms 
Vulnerability Management
Defence id Depth Concept and its Implementation
Access Control Models
Business Continuity Planning and Disaster Recovery
Cryptography
Do's and Dont's
Best Practices
IT Certification paths
Many More.....

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Protocol
  • Hacking
  • Statistics
  • Technology

Course programme

Introduction 2 lectures 05:24 Introduction about Author Course Topics Introduction 2 lectures 05:24 Introduction about Author Course Topics Introduction about Author Introduction about Author Introduction about Author Introduction about Author Course Topics Course Topics Course Topics Course Topics Cyber Attack and Breach Statistics 2 lectures 09:08 Understanding Important Statistics Important Facts Cyber Attack and Breach Statistics 2 lectures 09:08 Understanding Important Statistics Important Facts Understanding Important Statistics Understanding Important Statistics Understanding Important Statistics Understanding Important Statistics Important Facts Important Facts Important Facts Important Facts Introduction to Information Security 4 lectures 14:57 Use of Information Technology Information security and Protection Important points to Understand Sources of Threats , Attack Motives and Consequences Introduction to Information Security 4 lectures 14:57 Use of Information Technology Information security and Protection Important points to Understand Sources of Threats , Attack Motives and Consequences Use of Information Technology Use of Information Technology Use of Information Technology Use of Information Technology Information security and Protection Information security and Protection Information security and Protection Information security and Protection Important points to Understand Important points to Understand Important points to Understand Important points to Understand Sources of Threats , Attack Motives and Consequences Sources of Threats , Attack Motives and Consequences Sources of Threats , Attack Motives and Consequences Sources of Threats , Attack Motives and Consequences Fundamentals of Information Security 3 lectures 06:13 CIA Fundamentals and Confidentiality All about Availability All about Integrity Fundamentals of Information Security 3 lectures 06:13 CIA Fundamentals and Confidentiality All about Availability All about Integrity CIA Fundamentals and Confidentiality CIA Fundamentals and Confidentiality CIA Fundamentals and Confidentiality CIA Fundamentals and Confidentiality All about Availability All about Availability All about Availability All about Availability All about Integrity All about Integrity All about Integrity All about Integrity Understanding Terminologies 3 lectures 05:36 Information Security Vs Cyber Security Terms Other Information Security Terminologies Security Teams defined Understanding Terminologies 3 lectures 05:36 Information Security Vs Cyber Security Terms Other Information Security Terminologies Security Teams defined Information Security Vs Cyber Security Terms Information Security Vs Cyber Security Terms Information Security Vs Cyber Security Terms Information Security Vs Cyber Security Terms Other Information Security Terminologies Other Information Security Terminologies Other Information Security Terminologies Other Information Security Terminologies Security Teams defined Security Teams defined Security Teams defined Security Teams defined Misconceptions and Fallacies 3 lectures 09:36 Misconceptions – Management Misconceptions – Technical Important Quotes Misconceptions and Fallacies 3 lectures 09:36 Misconceptions – Management Misconceptions – Technical Important Quotes Misconceptions – Management Misconceptions – Management Misconceptions – Management Misconceptions – Management Misconceptions – Technical Misconceptions – Technical Misconceptions – Technical Misconceptions – Technical Important Quotes Important Quotes Important Quotes Important Quotes Introduction to Hacking 6 lectures 24:23 Hacking and its Phases Understanding Reconnaissance Phase Understanding Scanning Phase Understanding Gaining Access Phase Understanding Maintaining Access Phases Understanding Covering Tracks Phase Introduction to Hacking /strong Understanding Asymmetric Cryptography Introduction to Asymmetric Protocol Introduction to Digital Certificates Cryptography Fundamentals Cryptography Fundamentals Cryptography Fundamentals Cryptography Fundamentals Cryptographic Methods and Understanding Symmetric Cryptography Cryptographic Methods and Understanding Symmetric Cryptography Cryptographic Methods and Understanding Symmetric Cryptography Cryptographic Methods and Understanding Symmetric Cryptography Understanding Asymmetric Cryptography Understanding Asymmetric Cryptography Understanding Asymmetric Cryptography Understanding Asymmetric Cryptography Introduction to Asymmetric Protocol Introduction to Asymmetric Protocol Introduction to Asymmetric Protocol Introduction to Asymmetric Protocol Introduction to Digital Certificates Introduction to Digital Certificates Introduction to Digital Certificates Introduction to Digital Certificates Understanding Security Domains 6 lectures 40:04 Introduction to Security Domains Understanding Application and Software Security Understanding Identity Management Understanding...

Additional information

One should have computers and internet knowledge. Also IT students or IT professionals with some basic knowledge of IT infrastructure will be an added advantage

Information Security For Beginners And Intermediates

£ 30 VAT inc.