img
TECHINAUT

A LEVEL

4.5 (15)
NIELIT

Information Security Management

A10-R5.1- A Level (NIELIT)

Information security management is a new discipline in organizational management. The course includes lessons in information security classification, safeguarding, and accountability.

Information Security Management

8 Lessons

Information Security Management

120 Hours - (Theory: 48 hrs + Practical: 72 hrs)

Information Security Management

100+ students enrolled

Overview
Course Description

Information security is an increasingly important topic because of the growing importance of information and the importance of protecting it. The course will discuss various aspects of computer systems, such as basic network topologies, protocols, address conservation, services, and more.

What you'll learn
  • You should learn Information security is vital for your business, protecting personal information and business infrastructure.
  • How to protect yourself and your organization from cyberattacks.
  • You should learn information security managers will be knowledgeable in designing security systems & incorporating new features into existing security architecture.
  • How to use Information security professionals must be proficient in network configuration, monitoring, and management.
  • How to integrate strategic thinking, technical skills, and leadership skills.
  • How to Managing information security is a critical and growing field, with job prospects in high demand.
Course Content
  • Information Security ManagementLecture 1.1 Introduction to Ethernet, OSI layers, TCP/IP models

    Information Security Management 02:53
  • Information Security ManagementLecture 1.2 TCP, UDP, IP ,ICMP, applications layers

    Information Security Management 02:53
  • Information Security ManagementLecture 1.3 Network Topology, Working of Hub bridge

    Information Security Management 02:53
  • Information Security ManagementLecture 1.4 Types of Networks, VLAN, Subnetting

    Information Security Management 02:53
  • Information Security ManagementLecture 1.5 Fixed Length subnet masking, Variable Length subnet

    Information Security Management 02:53
  • Information Security ManagementLecture 1.6 Static Routing, RIP, RIPv2, OSPF, EIGRP, IGRP

    Information Security Management 02:53
  • cyber security and AttacksLecture 2.1 Fundamentals of information security

    cyber security and Attacks 02:53
  • cyber security and AttacksLecture 2.2 Threats at Client systems

    cyber security and Attacks 02:53
  • cyber security and AttacksLecture 2.3 Threats to Network, Web, Storage & Devices

    cyber security and Attacks 02:53
  • cyber security and AttacksLecture 2.4 fundamental of web/mobile application security

    cyber security and Attacks 02:53
  • cyber security and AttacksLecture 2.5 Mobile Application Attacks, data center security

    cyber security and Attacks 02:53
  • cyber security and AttacksLecture 2.6 Cloud computing and data security

    cyber security and Attacks 02:53
  • CryptographyLecture 3.1 Data Transmission and Organization, Error detecting

    Cryptography 02:53
  • CryptographyLecture 3.2 Cryptology fundamentals, Symmetric-Asymmetric cryptography

    Cryptography 02:53
  • CryptographyLecture 3.3 Private key encryption, Public key encryption, Protocols

    Cryptography 02:53
  • CryptographyLecture 3.4 Data recovery agent, Symmetric key encryption algorithm

    Cryptography 02:53
  • CryptographyLecture 3.5 Public key algorithm, RSA & ECC

    Cryptography 02:53
  • CryptographyLecture 3.6 SHA-1 Secure Hash algorithm, HMAC

    Cryptography 02:53
  • CryptographyLecture 3.7 Applications of cryptography

    Cryptography 02:53
  • Network Security and countermeasuresLecture 4.1 Securing Networks, Network security devices

    Network Security and countermeasures 02:53
  • Network Security and countermeasuresLecture 4.2 Deployment, overview of IDS, Network-based IDS

    Network Security and countermeasures 02:53
  • Network Security and countermeasuresLecture 4.3 Overview of IPS, Host-based IPS

    Network Security and countermeasures 02:53
  • Network Security and countermeasuresLecture 4.4 wireless security, securing wireless networks

    Network Security and countermeasures 02:53
  • Web Server and Application SecurityLecture 5.1 Client-Server Relationship

    Web Server and Application Security 02:53
  • Web Server and Application SecurityLecture 5.2 Buffer overflow, SQL injection, cross site scripting

    Web Server and Application Security 02:53
  • Web Server and Application SecurityLecture 5.3 Web Application vulnerability scanning

    Web Server and Application Security 02:53
  • Web Server and Application SecurityLecture 5.4 Web application security challenges

    Web Server and Application Security 02:53
  • Security AuditingLecture 6.1 Audit planning, Risk management, Overall Audit Risk

    Security Auditing 02:53
  • Security AuditingLecture 6.2 Control Self-Assessment, Risk analysis

    Security Auditing 02:53
  • Security AuditingLecture 6.3 Purpose of risk analysis, Risk based auditing

    Security Auditing 02:53
  • Security AuditingLecture 6.4 3 phase approach – Risk assessment IT/IS Audit

    Security Auditing 02:53
  • Security AuditingLecture 6.5 Performing Audit for ISO27001 Standard

    Security Auditing 02:53
  • Cyber Law and IT ActLecture 7.1 Information Technology Act 2000

    Cyber Law and IT Act 02:53
  • Cyber Law and IT ActLecture 7.2 Rules under Information Technology Act 2000

    Cyber Law and IT Act 02:53
  • Cyber Law and IT ActLecture 7.3 The Rule of Cyberspace

    Cyber Law and IT Act 02:53
  • Cyber Law and IT ActLecture 7.4 Cyber Law

    Cyber Law and IT Act 02:53
  • Cyber Law and IT ActLecture 7.5 Domain Name Dispute, Harmful content in Internet

    Cyber Law and IT Act 02:53
  • Cyber ForensicsLecture 8.1 Digital Evidence, identification of digital evidence

    Cyber Forensics 02:53
  • Cyber ForensicsLecture 8.2 Analysis, authentication and presentations

    Cyber Forensics 02:53
  • Cyber ForensicsLecture 8.3 Disk imaging and analysis, Investigating Information-hiding

    Cyber Forensics 02:53
  • Cyber ForensicsLecture 8.4 Importance of report, writing of reports

    Cyber Forensics 02:53
  • Cyber ForensicsLecture 8.5 Laboratory documents and procedures

    Cyber Forensics 02:53
About Us
techinaut profile
TECHINAUT

A LEVEL

4.5 Instructor Rating
techinaut

100+ Courses

techinaut

20+ Faculty

techinaut

Industry Expert

techinaut

45000+ students enrolled

UI/UX Designer, with 7+ Years Experience. Guarantee of High Quality Work.

Skills: Web Design, UI Design, UX/UI Design, Mobile Design, User Interface Design, Sketch, Photoshop, GUI, Html, Css, Grid Systems, Typography, Minimal, Template, English, Bootstrap, Responsive Web Design, Pixel Perfect, Graphic Design, Corporate, Creative, Flat, Luxury and much more.

Available for:

  • 1. Full Time Office Work
  • 2. Remote Work
  • 3. Freelance
  • 4. Contract
  • 5. Worldwide
Reviews
techinaut
Nicole Brown

UX/UI Designer

4.5 Instructor Rating

“ This is the second Photoshop course I have completed with Cristian. Worth every penny and recommend it highly. To get the most out of this course, its best to to take the Beginner to Advanced course first. The sound and video quality is of a good standard. Thank you Cristian. “

Reply
Post A comment