Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Cyber Security by GreyCampus
#1
Video 
[Image: 7df7bbe509ead2a83e00d56780ad9754.jpeg]
Free Download Cyber Security by GreyCampus
Published 12/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.66 GB | Duration: 2h 46m
Cyber Security

What you'll learn
Understand the basic concepts and terminologies used in the information and cyber security fields
Learn information and data life cycle process
Understand Cyber Hygiene
Protect Information and manage information security threats
Requirements
No background requirements, we will take you step-by-step to expert level.
Description
GreyCampus' Information and Cybersecurity Foundations course focus on key areas that all users of information systems must understand to better ensure their support for a secure information system.Get started with a foundational understanding of cybersecurity. You will get to learn information and data life cycle process, cyber hygiene, forming security habits and procedures to protect information along with learning best practices to manage information security threats.There's a common saying in IT about security, "Everyone knows they need security, but no one knows what security really means." After your Cyber Security training, you will.With tutorial videos to engage you with the study material for online use, take the path of least resistance to acing Cybersecurity foundations concepts.It's important to translate your knowledge into real life. This course comes with access to a simulated exam that gives you an assessment of what you have learned in this course.This course covers the following topics:1. Course Introduction2. Confidentiality, Integrity, and Availability (CIA)3. Information security and Cybersecurity Definitions4. Identity and Access Management5. Data Security6. Data and Information Lifecycle Process7. Continuous Risk Awareness and Monitoring8. Cyber Attacks9. Cyber Hygiene10. Cloud and the importance of availability of data to the mission
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Confidentiality, Integrity, and Availability (CIA)
Lecture 2 Confidentiality, Integrity, and Availability (CIA)
Section 3: Information security and Cybersecurity Definitions
Lecture 3 Information security and Cybersecurity Definitions
Section 4: Identify and Access Management & Data Security
Lecture 4 Business, Governance
Lecture 5 Access control concepts
Lecture 6 User Identification, Authentication, and Session Protection
Lecture 7 Access Control Authorization Systems
Section 5: Data and Information Lifecycle Process
Lecture 8 Data and Information Lifecycle Process Part 1
Lecture 9 Data and Information Lifecycle Process Part 2
Section 6: Continuous Risk Awareness and Monitoring
Lecture 10 Risk Management
Lecture 11 Malware: Attacks and Defences
Section 7: Cyber Hygiene
Lecture 12 Cyber Hygiene
Section 8: Cloud Platforms and Data Management
Lecture 13 Cloud Computing
Lecture 14 Leveraging the Cloud for Business and Traffic Light Protocol
Section 9: Summary
Lecture 15 Summary
Section 10: Mock Exams
Anyone interested in understanding the basics of cybersecurity, and how information is created and needs to be protected within the network and cloud platforms.
Homepage

[To see links please register or login]



Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live

[To see links please register or login]

No Password - Links are Interchangeable
[Image: signature.png]
Reply


Download Now



Forum Jump:


Users browsing this thread:
1 Guest(s)

Download Now