* Cantinho Satkeys

Refresh History
  • FELISCUNHA: Uma santa sexta feira para todo o auditório  4tj97u<z
    18 de Abril de 2025, 11:12
  • JPratas: try65hytr Pessoal  4tj97u<z classic k7y8j0
    18 de Abril de 2025, 03:28
  • cereal killa: try65hytr malta  classic 2dgh8i
    14 de Abril de 2025, 23:14
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  101041
    13 de Abril de 2025, 11:45
  • j.s.: e um bom domingo de Ramos  43e5r6 43e5r6
    11 de Abril de 2025, 21:02
  • j.s.: tenham um excelente fim de semana  49E09B4F
    11 de Abril de 2025, 21:01
  • j.s.: try65hytr a todos  4tj97u<z
    11 de Abril de 2025, 21:00
  • JPratas: try65hytr  y5r6t Pessoal  classic k7y8j0
    11 de Abril de 2025, 04:15
  • JPratas: dgtgtr A Todos  4tj97u<z classic k7y8j0
    10 de Abril de 2025, 18:29
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    09 de Abril de 2025, 11:59
  • cereal killa: try65hytr pessoal  2dgh8i
    08 de Abril de 2025, 23:21
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  43e5r6
    06 de Abril de 2025, 11:13
  • cccdh: Ola para todos!
    04 de Abril de 2025, 23:41
  • j.s.: tenham um excelente fim de semana  49E09B4F
    04 de Abril de 2025, 21:10
  • j.s.: try65hytr a todos  4tj97u<z
    04 de Abril de 2025, 21:10
  • FELISCUNHA: dgtgtr pessoal  49E09B4F  bom fim de semana  4tj97u<z
    04 de Abril de 2025, 14:29
  • JPratas: try65hytr Pessoal  4tj97u<z classic k7y8j0
    04 de Abril de 2025, 04:22
  • j.s.: try65hytr a todos  4tj97u<z
    03 de Abril de 2025, 21:00
  • migcontins: Quim Barreiros - A Esteticista (EP) 2025
    03 de Abril de 2025, 15:42
  • FELISCUNHA: ghyt74   49E09B4F  E bom fim de semana   4tj97u<z
    29 de Março de 2025, 10:06

Autor Tópico: Information security in practice  (Lida 226 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Online mitsumi

  • Moderador Global
  • ***
  • Mensagens: 118839
  • Karma: +0/-0
Information security in practice
« em: 11 de Julho de 2019, 13:53 »

Information security in practice
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 3.1 GB
Duration: 7.5 hours | Genre: eLearning Video | Language: English
How to set up information security (including application, network and physical) framework for your organization?

What you'll learn

    The course covers the main concepts related to information security.
    What information needs to be secured?
    How to evaluate your information assets? How to make risk assessment? What is the difference between risk assessment and audit?
    How to protect information and make balance between availability, confidentiality and integrity of information?
    What are the regulations and standards in information security domain?
    How to run security operations?
    How to handle disasters and security incidents?
    What are ethical consideration in information security domain?
    What are available techniques from network, application, and physical security perspective?
    How to utilize bot offensive (penetration testing) and defensive security for the benefits of the information security of your orgaization

Requirements

    Basic knowledge of computer science and networking can help
    Interest in information and cyber security
    Desire to learn

Description

In this course you will learn basics of information security and how to apply information security principles to your organization, regardless of its size.

Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or at least reducing the probability of unauthorized/inappropriate access, use, disclosure, disruption, deletion/destruction, corruption, modification, inspection, recording or devaluation, although it may also involve reducing the adverse impacts of incidents.

This course is following the content of CISSP (Certified Information Security Systems Professional) certification.

In this course you will learn about:

    Motivation for having information security framework

    Types of information security controls (application, network, physical security)

    How to evaluate information assets of your organization

    How to do risk assessment and where to include information security controls

    How to perform audits and when

    How to manage security operation of a certain organization

    What are and how to respond to information security incidents

    How to handle disaster recovery

    Ethics of information security

    What laws and regulations are in place (this may be specific to UK and EU, as it includes talks about GDPR but tries to generalize)

    Security standards in information security (ISO27001, ISO27003, ISO27005)

    History and main algorithms used for information security

    How to establish access control

    Basics of network security

    Basics of application security

    Basics of physical security

The tools that the course will be utilizing will be all open sources (such as SNORT or OSSEC).

Who this course is for:

    This course is for anyone who wants to become an expert in cyber-security and information security. This volume covers the required foundation building blocks of that skillset.

    For anyone who would love to gain a practical skillset in mitigating the risk from various kinds of information security threats  and would like to learn about managing information in the organization.

    For beginners and intermediate information security enthusiasts who are interested in security, safety, and privacy.

    This course is designed for personal and corporate information security.

The content of this course were delivered also in the University settings.

Who this course is for:

    This course is aimed at people wanting to start their careers in information security space.
    This course is for anyone who wants                                                                                                                                                                                                to become an expert in cyber-security and information security. This volume covers the required foundation building blocks of that skill-set.
    For anyone who would love to gain a practical skillset in mitigating the risk from various kinds of information security threats and would like to learn about managing information in the organization.
    For beginners and intermediate information security enthusiasts who are interested in security, safety, and privacy.
    This course is designed for personal and corporate information security.
         

               

Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction