Information Security Foundations

"softddl.org"
14-09-2022, 14:48
Rating:
0
0 vote
  • Information Security Foundations
    Last updated 6/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 4.43 GB | Duration: 13h 7m

Information Security Foundations
Last updated 6/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.43 GB | Duration: 13h 7m


This course is what do you need to do a kick start in cyber-security, information security and more , are you ready?
What you'll learn
Information Security foundations
Basics of Risk Management and Security Governance
Basics of Cyber attacks, malware and countermeasures to protect from it
Physical Security and Logical Security
Social engineering and user awareness
System resiliency and disaster recovery planning
Security Frameworks, Standards and regulations
Requirements
No thing, all will be discussed from scratch ~ in case you are missing some point, drop me a message and I will upload a video explaining it.
Description
In this training, we provide you with all needed information to master cybersecurity and information security from scratch, this course includes very wealthy information that cover information security dimensions and provide in-depth overview about the key topics that you are expected as Information Security officer to master. during this training the instructor will illustrate in every possible way the different security term and how to relate it from practical point of view, we will do labs and we will understand a lot of interesting information.we will start in discussing basic information security concepts, going through different attack techniques, and differences between different malware variants, we will discuss risk management, cryptography, physical security as well as business continuity and incident management, social engineering and trends related to information security in the modern era and possible ways to counter it.Also, this course will be full of labs, the labs give you overview about the different types of attacks that you are expected to encounter in real life and you need to make your envirnoment secured from.This course is must in case you pursue on the following certifications- ISACA CISA- ISACA CISM- ISC2 CISSP- ISACA CRISC- E-COUNCIL CEH- ISC2 SSCP- COMPTIA SECURITY+what are you waiting for, it is money back guaranteed if the content does not meet your expectations?
Overview
Section 1: Course
Lecture 1 Introduction
Lecture 2 CIA Concept
Lecture 3 Securing Systems - Understand Normal system components
Lecture 4 Understand Basic security concepts - Asset - Risk - Impact - Vulnerabilitiy
Lecture 5 Understand System Vulnerabilities and CVE - CVSS
Lecture 6 Malware and how to stay protected against it
Lecture 7 Denial of Service Attacks and Man in Middle Attacks
Lecture 8 Exploitation of System Vulnerability using Kali Linux
Lecture 9 Security Controls - Policies - Standards
Lecture 10 Risk Management concept and its relation to Security
Lecture 11 Cryptography basics - Stegnography for beginners
Lecture 12 IT Networking Basics for beginners
Lecture 13 Understand Datalink Mac address IPv4 addresses and Subnet Mask
Lecture 14 Basics of Infrastructure - Servers - RAID and Infra Services
Lecture 15 Hardening Systems and Networks
Lecture 16 IAAA and Identity Access Management
Lecture 17 Web Application pentesting - OWASP - ASVS and GHDB
Lecture 18 Cross site scripting - XSS - InfoSec Basics
Lecture 19 SQL Injection Attack Lab - InfoSec Basics
Lecture 20 Physical Security
Lecture 21 Basics of Virtualization - Cloud - Contnainers
Lecture 22 Social Engineering
Lecture 23 Incident Response and Incident Management
Lecture 24 Business Continuity - DRP - BCP
Lecture 25 Security Frameworks - Regulation - Challenges
Beginners in Cyber security and Information Security,Whoever interested in the content of the training,Whoever need to learn and explore new opportunities for career growth


Homepage
https://www.udemy.com/course/infosec-english-2022/




Download from UploadCloud
https://www.uploadcloud.pro/6zwzprsstzp1/fkdux.Information.Security.Foundations.part3.rar.html
https://www.uploadcloud.pro/bt1yi96vjbbu/fkdux.Information.Security.Foundations.part4.rar.html
https://www.uploadcloud.pro/c9t8k7m7pi71/fkdux.Information.Security.Foundations.part2.rar.html
https://www.uploadcloud.pro/x5doakd2e9tl/fkdux.Information.Security.Foundations.part1.rar.html
https://www.uploadcloud.pro/zgcuqber3ue4/fkdux.Information.Security.Foundations.part5.rar.html

https://rapidgator.net/file/16973049377f09dadb06bb2e7a70c807/fkdux.Information.Security.Foundations.part1.rar.html
https://rapidgator.net/file/9d1e0da5f2c995c2f81b0b3c75d53977/fkdux.Information.Security.Foundations.part3.rar.html
https://rapidgator.net/file/acf5fb28872190c3910cf318cdb993fe/fkdux.Information.Security.Foundations.part2.rar.html
https://rapidgator.net/file/b10b08839f2f337f6e1fe608ca2f4be7/fkdux.Information.Security.Foundations.part4.rar.html
https://rapidgator.net/file/ce57364e699b8488075473e34654175f/fkdux.Information.Security.Foundations.part5.rar.html

https://uploadgig.com/file/download/3ed7598b7dcfE2cB/fkdux.Information.Security.Foundations.part5.rar
https://uploadgig.com/file/download/5815500884fFabbf/fkdux.Information.Security.Foundations.part4.rar
https://uploadgig.com/file/download/6c1fdb992ebBd05b/fkdux.Information.Security.Foundations.part2.rar
https://uploadgig.com/file/download/84714B1BE4e54871/fkdux.Information.Security.Foundations.part1.rar
https://uploadgig.com/file/download/de0924c59047b5cA/fkdux.Information.Security.Foundations.part3.rar

https://nitroflare.com/view/1790A2F485F90C5/fkdux.Information.Security.Foundations.part2.rar
https://nitroflare.com/view/4F4EB447173DC70/fkdux.Information.Security.Foundations.part3.rar
https://nitroflare.com/view/C527E33BF9B35E3/fkdux.Information.Security.Foundations.part1.rar
https://nitroflare.com/view/D3425880886F08D/fkdux.Information.Security.Foundations.part5.rar
https://nitroflare.com/view/EC0783C29A58DC2/fkdux.Information.Security.Foundations.part4.rar

Links are Interchangeable - No Password - Single Extraction
 
Comments
The minimum comment length is 50 characters. comments are moderated
There are no comments yet. You can be the first!
Download free » Tutorials » Information Security Foundations
Copyright holders