Description
This course covers everything you’ve ever wanted to know about information security and cyber security.We’ll review the following concepts:- Confidentiality
- Integrity
- Availability
- Information Security
- Control Frameworks
- Security Governance
- Risk Management
- Business Continuity Planning
- Digital Signatures
- Digital Certificates
- Hashing
- Organizational Processes
- Security Roles and Responsibilities
- Compliance
- Ethics
- Computer Crimes
- Software Licensing
- Export Controls
- Data Breaches
- Security Policies
- RAID Technology
- Risk Assessment Techniques
- Quantitative Risk Factors
- Risk Management Strategies
- Security Controls
- Understanding Data Security
- Security Policies
- Developing Security Baselines
- Data Security Roles
- Customizing Security Standards
- Data Privacy
- Customizing Security Standards
- Leveraging Industry Standards
- Data Encryption
- Secure Design Principles
- Security Models
- Security Requirements
- Virtualization
- Cloud Computing Models
- Public Cloud Tiers
- Memory Protection
- Interface Protection
- High Availability and Fault Tolerance
- OWASP Top 10
- SQL Injections
- Cross-Site Scripting (XSS)
- Cross-Request Forgery
- Understanding Encryption
- Symmetric vs. Asymmetric Cryptography
- Goals of Cryptography
- Codes vs. Ciphers
- Key Lifecycle Management
- Data Encryption Standard (DES)
- Triple DES (3DES)
- Advanced Encryption Standard (AES)
- Blowfish
- Twofish
- RC4
- RSA Cryptography
- Elliptic Curve & Quantum Cryptography
- Key Exchange
- Diffie-Hellman Key Exchange
- Key Escrow
- Trust Models
- PKI and Digital Certificates
- Hash Functions and Digital Certificates
- Digital Signatures
Who this course is for:
- This course is for anyone interested in information security and cyber security.
- This course is for all levels (beginner, mid-level, and advanced)
Requirements
- Everything is taught. No previous experience or knowledge is required. Learn it all in this course!
Direct Download Links:
Torrent Download Links(Please seed after downloading):
Source: https://www.udemy.com/the-2019-guide-to-cyber-security-and-information-security/
NOTICE:
- Turn Off Your Ad-Blocker
- Highly Recommend to Use Torrent Links for Big Size Files
No comments:
Post a Comment