Cyber Security Fundamentals
Learn Cyber Security In An Easy Way
Cyber Security,IT & Software,Network & Security
Lectures -36
Duration -42 mins
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
Introduction:
Building your knowledge base is similar to building a house; without a solid foundation, it will be weak, and will fail when it is actually required. In this course my goal will be to lay solid foundation of Cyber Security for you. This course is designed to provide you with a solid foundation in cyber security, covering topics and terms used by Cyber Security Professionals.
What you will be able to do after completion of this course ?
You will be able to understand Cyber Security basics terminologies ( which will be very useful, if you have to collaborate with Cyber Security professionals).
You can take any advance level courses.
Topics Covered:
Course Intro.
What is data ?
What is information ?
State of data information.
Data is equivalent to asset.
Information security definition.
Are Information Security & Cyber Security same ?
CIA Triad (Objectives of Cyber Security)
Summarization Of CIA
AAA of Security Introduction.
Authentication
Five Methods Of Authentication
Authorization
Accounting
Non-Repudiation
Summarization Of AAA
Types Of Hackers.
Scenario To Understand Threat, Vulnerability, Exploit, Risk & Impact.
Cyber Security Threats
Threat Category - Malware
Threat category - Un-authorized Access.
Threat category - System Failure.
Threat Category - Social Engineering
Threat Category - Natural Calamities
Threat actors and it's types
Threat actor - External
Threat Actor - Internal
Vulnerabilities
Risk
Exposure
Types of controls: Physical, Technical, Administrative,
Functionalities Of Security Controls.
Summarization of threat actor, threat, vulnerability, risk and impact.
Goals
What will students learn in your course?
- Understand The Basic Concepts And Terminologies Used In The Information / Cyber Security Field.
- Apply For Entry Level Roles (like Internships) Of Cybersecurity Positions.
- Take More Advanced Information Security Courses
Prerequisites
Cyber Security is easy to learn. You need not to be a software developer or a network administrator to learn the fundamentals of Cyber Security.
![Cyber Security Fundamentals Cyber Security Fundamentals](https://d3mxt5v3yxgcsr.cloudfront.net/courses/15283/course_15283_image.jpg)
Curriculum
Check out the detailed breakdown of what’s inside the course
Course Introduction
1 Lectures
-
Introduction 00:37 00:37
What is data ?
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
What is information ?
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
State of data / information.
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Data is equivalent to asset.
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Are Information & Cyber Security Same ?
2 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
CIA Triad (Objectives of Cyber Security)
2 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
AAA of Security Introduction.
7 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Types Of Hackers
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Scenario To Understand Threat, Vulnerability, Exploit, Risk & Impact
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Cyber Security Threats
6 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Threat actors and it's types
3 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Vulnerabilities
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Risk
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Exposure
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Types of controls
4 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Functionalities Of Security Controls
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Summarization of threat actor, threat, vulnerability, risk and impact
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Instructor Details
![user profile image](/market/public/assets/newDesign/img/default-user-img.jpg)
Mycyberly
Course Certificate
Use your certificate to make a career change or to advance in your current career.
![sample Tutorialspoint certificate](/market/public/assets/newDesign/img/primePacks/V-certificate.png)
Our students work
with the Best
![adobe logo](/market/public/assets/newDesign/img/adobe.png)
![adp logo](/market/public/assets/newDesign/img/adp.png)
![apple logo](/market/public/assets/newDesign/img/apple.png)
![armani logo](/market/public/assets/newDesign/img/armani.jpg)
![bosch logo](/market/public/assets/newDesign/img/bosch.png)
![capegemini logo](/market/public/assets/newDesign/img/capegemini.png)
![cisco logo](/market/public/assets/newDesign/img/cisco.png)
![hdfc bank logo](/market/public/assets/newDesign/img/hdfcbank.png)
![ibm logo](/market/public/assets/newDesign/img/ibm.png)
![intel logo](/market/public/assets/newDesign/img/intel.png)
![mastercard logo](/market/public/assets/newDesign/img/mastercard.png)
![netflix logo](/market/public/assets/newDesign/img/netflix.png)
![qualcomm logo](/market/public/assets/newDesign/img/qualcomm.png)
![samsung logo](/market/public/assets/newDesign/img/samsung.png)
![sony logo](/market/public/assets/newDesign/img/sony.png)
![unilever logo](/market/public/assets/newDesign/img/unilever.png)
![walmart logo](/market/public/assets/newDesign/img/walmart.png)
![adobe logo](/market/public/assets/newDesign/img/adobe.png)
![adp logo](/market/public/assets/newDesign/img/adp.png)
![apple logo](/market/public/assets/newDesign/img/apple.png)
![armani logo](/market/public/assets/newDesign/img/armani.jpg)
![bosch logo](/market/public/assets/newDesign/img/bosch.png)
![capegemini logo](/market/public/assets/newDesign/img/capegemini.png)
![cisco logo](/market/public/assets/newDesign/img/cisco.png)
![hdfcbank logo](/market/public/assets/newDesign/img/hdfcbank.png)
![ibm logo](/market/public/assets/newDesign/img/ibm.png)
![intel logo](/market/public/assets/newDesign/img/intel.png)
![mastercard logo](/market/public/assets/newDesign/img/mastercard.png)
![netflix logo](/market/public/assets/newDesign/img/netflix.png)
![qualcomm logo](/market/public/assets/newDesign/img/qualcomm.png)
![samsung logo](/market/public/assets/newDesign/img/samsung.png)
![sony logo](/market/public/assets/newDesign/img/sony.png)
![unilever logo](/market/public/assets/newDesign/img/unilever.png)
![walmart logo](/market/public/assets/newDesign/img/walmart.png)
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now![Annual Membership Annual Membership](/market/public/assets/newDesign/img/membership-large-small.jpg)
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now![Online Certifications Online Certifications](/market/public/assets/newDesign/img/traning-for-a-team.png)