About the Course
This course is second part of courses named Introduction to Concepts & Principles of Information Security. These courses are designed for those who have a basic knowledge of information technology but not much basic knowledge of cyber security.
In first part of this course you got familiar with concepts of Information Security, Risk Management and Threats, Attacks and Vulnerabilities. In this part you will find how to manage the threats and keep your information safe and secure. This course includes two major parts which are Safeguards for managing the Risks and Business Continuity.
- What is Information Security
- Various Types of Controls
- Security Solutions
- Tools to Assess the Security Posture of an Organization
- Security Technologies
- Mobile Devices Security
- Secure Protocols
- Security Protocols
- Secure Architecture and Design
- Identity and Access Management
- Cryptography and PKI
- Security Policy
- Business Continuity
- Disaster Recovery and Continuity of Operation Concepts
- Incident Management
- Data Security and Privacy Practices
This course manages theory part of information security so no need to any system.
Who Should Attend
Anybody who wants to make his/her carrier in Information Security and be an expert in Industrial Systems’ Security, Network Penetration Testing, Network Infrastructures’ Security, Information Security Audit, Information Security Monitoring, Information Security Incident Management, Web Application Penetration Testing, Secure Application Development, Information Security System, Human Resource & Physical & Environmental Security
Basic knowledge about Networking Concepts and Protocols, Network Architecture, OSI layers & TCP/IP, Network equipment such as Switch and Router, Operating Systems Structure and Services and passing Introduction to Concepts & Principles of Information Security – Primary course.
What You Will Receive
- MP3 audio files of the complete course lecture
You Will Be Able To
- Explain concepts related to applied cryptography, including plaintext, cipher text, symmetric cryptography, asymmetric cryptography, and digital signatures.
- Explain the theory behind the security of different cryptographic algorithms
- Explain common network defense mechanisms against network attacks, and cryptographic protection mechanisms.
- Identify the ways to protect against threats to different systems
- Explain the ways to provide privacy, source authentication, message integrity, non-repudiation, proof of submission, and proof of delivery, message flow confidentiality, and anonymity.