Certified Security Analyst Training Preview
Offered By: Udemy
Course Description
Overview
Learn the pillars of information security and need for security analysis.
What you'll learn:
What you'll learn:
- Define Security and Information Security
- Know the pillars of information security
- Understand the need for security analysis
This course is designed for anyone who wants an understanding of information security analysis. More than ever, information security analysts are needed to rescue business when they have been breached as well as put in the controls and countermeasures to prevent cyber-attacks.
Learn the pillars of information security and need for security analysis.
This course will go over the following information security concepts:
- Security and Information Technology Security -Defending information from unauthorized access use, Disclosure, Disruption, Modification, Perusal, Inspection, Recording or destruction.
- Pillars of Information Security–
- Confidentiality - a state of secrecy or keeping secrets
- Integrity - protecting information from being modified by unauthorized parties.
- Authentication - It's the process of determining whether someone or something is, in fact, who or what it is or they are declared to be.
- Authorization - Authorization is the process of giving someone permission to do or have something.
- Availability - ensuring that authorized parties are able to access the information when needed.
- Non-Repudiation - ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message.
- Security Analysis and the need for Security Analysis
- Concerning Elements – Theft, Fraud/Forgery, Unauthorized Information Access, Interception / Modification of Data, Data Loss.
- Major assets to protect – Your assets, your network infrastructure, your personal data, availability of your networks, your credentials.
Taught by
CyberTraining 365
Related Courses
Authentication & Authorization: OAuthUdacity Rails with Active Record and Action Pack
Johns Hopkins University via Coursera Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Managing Identity
Microsoft via edX