Sharing Is Caring:

Certified Security Analyst Training Preview

  • Learn the pillars of information security and need for security analysis.
  • Free tutorial
  • Rating: 3.9 out of 53.9 (1,460 ratings)
  • 34,770 students
  • 1hr 7min of on-demand video
  • Created by CyberTraining 365
  • English

What you’ll learn

  • Define Security and Information Security
  • Know the pillars of information security
  • Understand the need for security analysis

Requirements

  • Nothing. This course is for beginners

Description

This course is designed for anyone who wants an understanding of information security analysis. More than ever, information security analysts are needed to rescue business when they have been breached as well as put in the controls and countermeasures to prevent cyber-attacks.

Learn the pillars of information security and need for security analysis.

This course will go over the following information security concepts:

  • Security and Information Technology Security – Defending information from unauthorized access use, Disclosure, Disruption, Modification, Perusal, Inspection, Recording or destruction.
  • Pillars of Information Security –
    • Confidentiality – a state of secrecy or keeping secrets
    • Integrity – protecting information from being modified by unauthorized parties.
    • Authentication – It’s the process of determining whether someone or something is, in fact, who or what it is or they are declared to be.
    • Authorization – Authorization is the process of giving someone permission to do or have something.
    • Availability – ensuring that authorized parties are able to access the information when needed.
    • Non-Repudiation – ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message.
  • Security Analysis and the need for Security Analysis
    • Concerning Elements – Theft, Fraud/Forgery, Unauthorized Information Access, Interception / Modification of Data, Data Loss.
    • Major assets to protect – Your assets, your network infrastructure, your personal data, availability of your networks, your credentials.
Read Also -->   Theoretical and Computational Methods for Biology

Who this course is for:

  • Anyone who wants to expand their knowledge on information security
  • Those interested in a career as information security analyst

Show less

Course content

1 section • 10 lectures • 1h 7m total length

The Pillars of Information Security and the need for Security Analysis10 lectures • 1hr 7min

  • Course Intro02:33
  • Pillars of Information Security – Confidentiality04:50
  • Pillars of Information Security – Integrity & Authentication06:10
  • Pillars of Information Security – Authentication & Authorization05:08
  • Pillars of Information Security – Authorization and Availability03:53
  • Pillars of Information Security – Non-Repudiation04:16
  • Need for Security Analysis Part 110:04
  • Need for Security Analysis Part 209:25
  • BONUS – Cybersecurity Greatest Challenges20:49
  • BONUS **DISCOUNT COUPONS**00:09

👇👇👇👇 Click Below to Enroll in Free Udemy Course 👇👇👇👇

Go to Course

👇👇 See Also 👇👇

Join Us Join Us Join Us
Sharing Is Caring:

Leave a Comment

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock