Cyber Security Fundamentals One


Cyber Security Essentials For Beginners

What you will learn

Learn Cyber Security In An Easy Way

Understand The Basic Concepts And Terminologies Used In The Information / Cyber Security Field

Apply For Entry Level Roles (like Internships) Of Cybersecurity Positions

Take More Advanced Information Security Courses

Description

Introduction:

Building your knowledge base is similar to building a house; without a solid foundation, it will be weak, and will fail when it is actually required. In this course my goal will be to lay solid foundation of Cyber Security for you. This course is designed to provide you with a solid foundation in cyber security, covering topics and terms used by Cyber Security Professionals.


Subscribe to latest coupons on our Telegram channel.

What you will be able to do after completion of this course ?

  • You will be able to understand Cyber Security basics terminologies ( which will be very useful, if you have to collaborate with Cyber Security professionals).
  • You can take any advance level courses.

Topics Covered:

  1. Course Intro.
  2. What is data ?
  3. What is information ?
  4. State of data information.
  5. Data is equivalent to asset.
  6. Information security definition.
  7. Are Information Security & Cyber Security same ?
  8. CIA Triad (Objectives of Cyber Security)
    1. Summarization Of CIA
  9. AAA of Security Introduction.
    1. Authentication
    2. Five Methods Of Authentication
    3. Authorization
    4. Accounting
    5. Non-Repudiation
    6. Summarization Of AAA
  10. Types Of Hackers.
  11. Scenario To Understand Threat, Vulnerability, Exploit, Risk & Impact.
    1. Cyber Security Threats
    2. Threat Category – Malware
    3. Threat category – Un-authorized Access.
      • Threat category – System Failure.
      • Threat Category – Social Engineering
      • Threat Category – Natural Calamities
    4. Threat actors and it’s types
      • Threat actor – External
      • Threat Actor – Internal
    5. Vulnerabilities
    6. Risk
    7. Exposure
  12. Types of controls: Physical, Technical, Administrative,
  13. Functionalities Of Security Controls.
  14. Summarization of threat actor, threat, vulnerability, risk and impact.
English
language

Content

Course Introduction

Course Intro.

Course Intro.

What is data ?
What is information ?
State of data / information.
Data is equivalent to asset.

Are Information & Cyber Security ?

Information security definition.
Are Information Security & Cyber Security same ?

CIA Triad (Objectives of Cyber Security)

CIA Triad
Summarization Of CIA

AAA of Security Introduction.

AAA of Security Introduction
Authentication
Five Methods Of Authentication
Authorization
Accounting
Non-Repudiation
Summarization Of AAA

Types Of Hackers

black / white / grey hackers

Scenario To Understand Threat, Vulnerability, Exploit, Risk & Impact.

Threat, Vulnerability, Exploit, Risk & Impact
Cyber Security Threats
Threat Category – Malware
Threat category – Un-authorized Access
Threat category – System Failure
Threat Category – Social Engineering
Threat Category – Natural Calamities
Threat actors and it’s types
Threat actor – External
Threat Actor – Internal
Vulnerabilities
Risk
Exposure
Types of controls
Types of controls: Physical Controls
Technical Controls
Administrative Controls
Functionalities Of Security Controls.
Summarization of threat actor, threat, vulnerability, risk and impact.