YoVDO

Introduction to Security and Network Forensics - Lecture 1

Offered By: Bill Buchanan OBE via YouTube

Tags

Network Security Courses Cybersecurity Courses Compliance Courses Malware Courses Firewalls Courses OSI Model Courses Defense in Depth Courses

Course Description

Overview

Explore the fundamentals of security and network forensics in this introductory lecture covering key concepts such as layered systems, perimeter firewalls, compliance, various types of cyber threats, defense strategies, and network models. Gain insights into the Information Age, levels of security, ISAE 2702, and the importance of defense in depth. Learn about Trojan horses, worms, denial of service attacks, inference, cover channels, and active attacks through practical examples. Understand the significance of demilitarized zones, the OSI model, and the Internet model in network security. Delve into this comprehensive overview based on Prof Bill Buchanan's book "Introduction to Security and Network Forensics" to build a strong foundation in cybersecurity principles.

Syllabus

Introduction
Information Age
Layered Systems
Levels of Security
Perimeter Firewall
ISAE 2702
Compliance
Trojan Horses
Worms
Denial of Service
Inference
Cover Channels
Active Attack
Example Email
Defense in Depth
Demilitarized Zone
Defense
OSI Model
Internet Model


Taught by

Bill Buchanan OBE

Related Courses

Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera
Secure Networked System with Firewall and IDS
University of Colorado System via Coursera
Networking in Google Cloud: Fundamentals
Google Cloud via Coursera
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Introduction to Cybersecurity Tools & Cyberattacks
IBM via Coursera