Cyber Security Essentials For Beginners
What you will learn
Learn Cyber Security In An Easy Way
Understand The Basic Concepts And Terminologies Used In The Information / Cyber Security Field
Apply For Entry Level Roles (like Internships) Of Cybersecurity Positions
Take More Advanced Information Security Courses
Description
Introduction:
Building your knowledge base is similar to building a house; without a solid foundation, it will be weak, and will fail when it is actually required. In this course my goal will be to lay solid foundation of Cyber Security for you. This course is designed to provide you with a solid foundation in cyber security, covering topics and terms used by Cyber Security Professionals.
What you will be able to do after completion of this course ?
- You will be able to understand Cyber Security basics terminologies ( which will be very useful, if you have to collaborate with Cyber Security professionals).
- You can take any advance level courses.
Topics Covered:
- Course Intro.
- What is data ?
- What is information ?
- State of data information.
- Data is equivalent to asset.
- Information security definition.
- Are Information Security & Cyber Security same ?
- CIA Triad (Objectives of Cyber Security)
- Summarization Of CIA
- AAA of Security Introduction.
- Authentication
- Five Methods Of Authentication
- Authorization
- Accounting
- Non-Repudiation
- Summarization Of AAA
- Types Of Hackers.
- Scenario To Understand Threat, Vulnerability, Exploit, Risk & Impact.
- Cyber Security Threats
- Threat Category – Malware
- Threat category – Un-authorized Access.
- Threat category – System Failure.
- Threat Category – Social Engineering
- Threat Category – Natural Calamities
- Threat actors and it’s types
- Threat actor – External
- Threat Actor – Internal
- Vulnerabilities
- Risk
- Exposure
- Types of controls: Physical, Technical, Administrative,
- Functionalities Of Security Controls.
- Summarization of threat actor, threat, vulnerability, risk and impact.
English
language
Content
Course Introduction
Course Intro.
Course Intro.
What is data ?
What is information ?
State of data / information.
Data is equivalent to asset.
Are Information & Cyber Security ?
Information security definition.
Are Information Security & Cyber Security same ?
CIA Triad (Objectives of Cyber Security)
CIA Triad
Summarization Of CIA
AAA of Security Introduction.
AAA of Security Introduction
Authentication
Five Methods Of Authentication
Authorization
Accounting
Non-Repudiation
Summarization Of AAA
Types Of Hackers
black / white / grey hackers
Scenario To Understand Threat, Vulnerability, Exploit, Risk & Impact.
Threat, Vulnerability, Exploit, Risk & Impact
Cyber Security Threats
Threat Category – Malware
Threat category – Un-authorized Access
Threat category – System Failure
Threat Category – Social Engineering
Threat Category – Natural Calamities
Threat actors and it’s types
Threat actor – External
Threat Actor – Internal
Vulnerabilities
Risk
Exposure
Types of controls
Types of controls: Physical Controls
Technical Controls
Administrative Controls
Functionalities Of Security Controls.
Summarization of threat actor, threat, vulnerability, risk and impact.