- Course Intro
- Pillars of Information Security - Confidentiality
- Pillars of Information Security - Integrity & Authentication
- Pillars of Information Security - Authentication & Authorization
- Pillars of Information Security - Authorization and Availability
- Pillars of Information Security - Non-Repudiation
- Need for Security Analysis Part 1
- Need for Security Analysis Part 2
- BONUS - Cybersecurity Greatest Challenges
- BONUS **DISCOUNT COUPONS**
What you'll learn
- Define Security and Information Security
- Know the pillars of information security
- Understand the need for security analysis
Description
This course is designed for anyone who wants an understanding of information security analysis. More than ever, information security analysts are needed to rescue business when they have been breached as well as put in the controls and countermeasures to prevent cyber-attacks.
Learn the pillars of information security and need for security analysis.
This course will go over the following information security concepts:
- Security and Information Technology Security - Defending information from unauthorized access use, Disclosure, Disruption, Modification, Perusal, Inspection, Recording or destruction.
- Pillars of Information Security –
- Confidentiality - a state of secrecy or keeping secrets
- Integrity - protecting information from being modified by unauthorized parties.
- Authentication - It's the process of determining whether someone or something is, in fact, who or what it is or they are declared to be.
- Authorization - Authorization is the process of giving someone permission to do or have something.
- Availability - ensuring that authorized parties are able to access the information when needed.
- Non-Repudiation - ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message.
- Security Analysis and the need for Security Analysis
- Concerning Elements – Theft, Fraud/Forgery, Unauthorized Information Access, Interception / Modification of Data, Data Loss.
- Major assets to protect – Your assets, your network infrastructure, your personal data, availability of your networks, your credentials.
Other Courses

Facilitate Innovation and Manage Change Effectively
Innovation and Change Management

Fresh Graduates: How To Get Hired? A Job Search Crash Course
Understand How Recruitment Works, Learn Resume and Interview Hacks, and Discover Your Purpose

How To Find Good Tenants | A Guide for Landlords
This course is all about how to find good tenants because good tenants make for great landlords.

Ultimate roulette systems analysis App (VRSEDGE App)
Universal and ultimate App for roulette systems creation, analysis, evaluation, tests and real LIVE play

Instagram Guide :From Beginner To Expert
Learn How To Use Instagram Efficiently And Start Making Money From It
About the instructors

- 4.28 Calificación
- 233373 Estudiantes
- 20 Cursos
CyberTraining 365
Best Selling Instructors, 209,966 + Students
Join the Cyber Security Industry in 2023!
Interested in starting a career in the Cyber Security Industry? 2023 is the time!
Learning the fundamentals of Cyber Security provides you with a powerful, and very useful, set of skills. Learn to think like a hacker so you can better defend your networks and data by studying Penetration Testing and Ethical Hacking.
Jobs in Cyber Security are plentiful. Receiving your Certified Ethical Hacker, Certified Hacker Forensic Investigator, Penetration Tester and Security+ certification will give you a strong background to more easily tackle and pick up more advanced exams, such as the CISSP certification.
Get certified and land an entry level Cyber Security position paying upwards of six figures. There are currently over one million Cyber Security job openings globally. Demand is greatly outpacing supply which means more opportunity, job security and higher pay for you.
But, don't take our word for it... take a look at the FREE previews (they are available in all our courses) and see for yourself.
About Us:
CyberTraining 365 is an online academy that offers most in-demand cybersecurity training and certification through different subscription models. Members have access to the ever growing library of quality, engaging videos that are taught by some of industry’s best and most recognized experts.
CyberTraining365 is powered by Social27's patented cloud-based eLearning platform, providing members with an engaging and collaborative learning environment. Through best in class content, social learning tools, and gamification, CyberTraining365 is taking eLearning from Isolation to Collaboration.
Student feedback
Course Rating
Reviews
really good and informative really helped me thank you
This course has a big title that does not match its content. The presenter lacks confidence and mastery of the subject matter. The concepts are poorly explained, and the presentation is underwhelming. I am disappointed to have purchased it. I do not even want to have its certificate. It's that bad.