Overview
Course Description
Information security is an increasingly important topic because of the growing importance of information and the importance of protecting it. The course will discuss various aspects of computer systems, such as basic network topologies, protocols, address conservation, services, and more.
What you'll learn
- You should learn Information security is vital for your business, protecting personal information and business infrastructure.
- How to protect yourself and your organization from cyberattacks.
- You should learn information security managers will be knowledgeable in designing security systems & incorporating new features into existing security architecture.
- How to use Information security professionals must be proficient in network configuration, monitoring, and management.
- How to integrate strategic thinking, technical skills, and leadership skills.
- How to Managing information security is a critical and growing field, with job prospects in high demand.
Course Content
Network Fundamentals
-
Lecture 1.1 Introduction to Ethernet, OSI layers, TCP/IP models
-
Lecture 1.2 TCP, UDP, IP ,ICMP, applications layers
-
Lecture 1.3 Network Topology, Working of Hub bridge
-
Lecture 1.4 Types of Networks, VLAN, Subnetting
-
Lecture 1.5 Fixed Length subnet masking, Variable Length subnet
-
Lecture 1.6 Static Routing, RIP, RIPv2, OSPF, EIGRP, IGRP
Introduction to cyber security and Attacks
-
Lecture 2.1 Fundamentals of information security
-
Lecture 2.2 Threats at Client systems
-
Lecture 2.3 Threats to Network, Web, Storage & Devices
-
Lecture 2.4 fundamental of web/mobile application security
-
Lecture 2.5 Mobile Application Attacks, data center security
-
Lecture 2.6 Cloud computing and data security
Cryptography
-
Lecture 3.1 Data Transmission and Organization, Error detecting
-
Lecture 3.2 Cryptology fundamentals, Symmetric-Asymmetric cryptography
-
Lecture 3.3 Private key encryption, Public key encryption, Protocols
-
Lecture 3.4 Data recovery agent, Symmetric key encryption algorithm
-
Lecture 3.5 Public key algorithm, RSA & ECC
-
Lecture 3.6 SHA-1 Secure Hash algorithm, HMAC
-
Lecture 3.7 Applications of cryptography
Security Auditing
-
Lecture 6.1 Audit planning, Risk management, Overall Audit Risk
-
Lecture 6.2 Control Self-Assessment, Risk analysis
-
Lecture 6.3 Purpose of risk analysis, Risk based auditing
-
Lecture 6.4 3 phase approach – Risk assessment IT/IS Audit
-
Lecture 6.5 Performing Audit for ISO27001 Standard
Cyber Forensics
-
Lecture 8.1 Digital Evidence, identification of digital evidence
-
Lecture 8.2 Analysis, authentication and presentations
-
Lecture 8.3 Disk imaging and analysis, Investigating Information-hiding
-
Lecture 8.4 Importance of report, writing of reports
-
Lecture 8.5 Laboratory documents and procedures
About Us
TECHINAUT
A LEVEL
100+ Courses
20+ Faculty
Industry Expert
45000+ students enrolled
UI/UX Designer, with 7+ Years Experience. Guarantee of High Quality Work.
Skills: Web Design, UI Design, UX/UI Design, Mobile Design, User Interface Design, Sketch, Photoshop, GUI, Html, Css, Grid Systems, Typography, Minimal, Template, English, Bootstrap, Responsive Web Design, Pixel Perfect, Graphic Design, Corporate, Creative, Flat, Luxury and much more.
Available for:
- 1. Full Time Office Work
- 2. Remote Work
- 3. Freelance
- 4. Contract
- 5. Worldwide
Reviews
Nicole Brown
UX/UI Designer
“ This is the second Photoshop course I have completed with Cristian. Worth every penny and recommend it highly. To get the most out of this course, its best to to take the Beginner to Advanced course first. The sound and video quality is of a good standard. Thank you Cristian. “
Reply
Post A comment