Information Security from A to Z

Infosec for Beginners, Intermediaries and Enthusiast.

Instructed by Rahul Jamgade

  • Includes all Standard Features
  • Get Unlimited access to all the courses
  • No Contract. Cancel Anytime
Starting in just $19 / mo see all plans
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
  • The course is designed with holistic approach on Information Security. It covers not only technical aspects but also Administrative. Management aspects as well. It will help those students who are freshers and want to leap into the Information Security domain.

This course is designed for students who are interested in the area of information security and want to make their career  in this area. It is also helpful as a refresher course for the information security professionals and will help those people who just concentrate on "Ethical Hacking" aspect of information security that too from technical perspective.  Also this course is useful to organisations that are concerned about the information security of their organisation and wants to  train their  employees in this area. 
 
 
It will be beneficial for  the job role of "SysAdmin" , "System Engineer" and of course people working in the managerial role in IT.
 
It  provides holistic approach towards information security for organisations as it covers Management , Administrative and physical aspect of information security in addition to the technical aspect which people tend to concentrate more.

  • Anyone who has understanding of computers and IT can attend it. Just need a computer and internet connectivity to watch videos.
  • IT Students and Beginners with little bit of knowledge about Computers and networks. Also helpful for Intermediaries with area of interest in Infosec domain. IT Administrator/ Sysadmins can get benefited out of it.
View More...

Section 1 : Introduction

  • Lecture 1 :
  • Introduction about Trainer Preview
  • Lecture 2 :
  • Course Topics

Section 2 : Important Facts and Statistics

  • Lecture 1 :
  • Cyber Attack and Breach Statistics
  • Lecture 2 :
  • Important Facts

Section 3 : Introduction to Information Security

  • Lecture 1 :
  • Use of Information Technology
  • Lecture 2 :
  • Information security and Protection
  • Lecture 3 :
  • Important points to Understand
  • Lecture 4 :
  • Sources of Threats , Attack Motives and Consequences

Section 4 : Fundamentals of Information Security

  • Lecture 1 :
  • CIA Fundamentals and Confidentiality
  • Lecture 2 :
  • All about Integrity
  • Lecture 3 :
  • All about Availability

Section 5 : Understanding Terminologies

  • Lecture 1 :
  • Information Security Vs Cyber Security Terms
  • Lecture 2 :
  • Other Information Security Terminologies
  • Lecture 3 :
  • Security Teams defined

Section 6 : Misconceptions and Fallacies

  • Lecture 1 :
  • Misconceptions – Management
  • Lecture 2 :
  • Misconceptions – Technical
  • Lecture 3 :
  • Important Quotes

Section 7 : Introduction to Hacking

  • Lecture 1 :
  • Hacking and its Phases
  • Lecture 2 :
  • Understanding Reconnaissance Phase
  • Lecture 3 :
  • Understanding Scanning Phase
  • Lecture 4 :
  • Understanding Gaining Access Phase
  • Lecture 5 :
  • Understanding Maintaining Access Phases
  • Lecture 6 :
  • Understanding Covering Tracks Phase

Section 8 : Understanding Vulnerabilities and Threats

  • Lecture 1 :
  • Types of Vulnerabilities
  • Lecture 2 :
  • Vulnerability Management
  • Lecture 3 :
  • Understanding Threats

Section 9 : Understanding Attack Types

  • Lecture 1 :
  • Types of Attacks
  • Lecture 2 :
  • Attack Vectors and Techniques
  • Lecture 3 :
  • Types of Phishing
  • Lecture 4 :
  • Infamous Attacks
  • Lecture 5 :
  • Individuals Cyber Security

Section 10 : Information Security Controls

  • Lecture 1 :
  • Understanding Information Security Controls
  • Lecture 2 :
  • Understanding Administrative Controls
  • Lecture 3 :
  • Understanding Technical Controls
  • Lecture 4 :
  • Understanding Physical Controls
  • Lecture 5 :
  • Security Control Types and the Holistic view

Section 11 : Understanding Cryptography

  • Lecture 1 :
  • Cryptography Fundamentals
  • Lecture 2 :
  • Cryptographic Methods and Understanding Symmetric Cryptography
  • Lecture 3 :
  • Understanding Asymmetric Cryptography
  • Lecture 4 :
  • Introduction to Asymmetric Protocols
  • Lecture 5 :
  • Introduction to Digital Signatures

Section 12 : Understanding Security Domains

  • Lecture 1 :
  • Introduction to Security Domains
  • Lecture 2 :
  • Understanding Application and Software Security
  • Lecture 3 :
  • Understanding Identity Management
  • Lecture 4 :
  • Understanding Business Continuity Planning and Disaster Recovery
  • Lecture 5 :
  • Understanding Mobile Device Threats and Protections
  • Lecture 6 :
  • Cloud Computing Issues,Threats and Considerations

Section 13 : Challenges with Emerging Technologies

  • Lecture 1 :
  • Introduction to Information Security Challenges
  • Lecture 2 :
  • Understanding IoT Security
  • Lecture 3 :
  • Understanding Ransomware
  • Lecture 4 :
  • Understanding Supply Chain Attacks
  • Lecture 5 :
  • Understanding Advance Persistent Threats
  • Lecture 6 :
  • Understanding Zero Day Attacks
  • Lecture 7 :
  • Overview of Additional Challenges

Section 14 : Understanding Security Measures

  • Lecture 1 :
  • Introduction to Security Measures
  • Lecture 2 :
  • Understanding Firewalls
  • Lecture 3 :
  • Understanding Proxy Servers
  • Lecture 4 :
  • Intrusion Detection System and Intrusion Prevention System
  • Lecture 5 :
  • Understanding VLAN
  • Lecture 6 :
  • Understanding VPN
  • Lecture 7 :
  • Understanding Patch Management
  • Lecture 8 :
  • Access Control Models
  • Lecture 9 :
  • Additional Security Measures
  • Lecture 10 :
  • Encryption Measures
  • Lecture 11 :
  • Backups Measures
  • Lecture 12 :
  • End Point Security Measures
  • Lecture 13 :
  • Host Based Security Measures
  • Lecture 14 :
  • Monitoring Systems
  • Lecture 15 :
  • Perimeter Security Measures
  • Lecture 16 :
  • Protection Measures - More
  • Lecture 17 :
  • Introduction to Redundancy
  • Lecture 18 :
  • Measures for Remote - Home Users
  • Lecture 19 :
  • Secure Coding Practices
  • Lecture 20 :
  • Understanding Top Down Approach
  • Lecture 21 :
  • Policies and their types

Section 15 : Defence in Depth

  • Lecture 1 :
  • The Concept of Defence in Depth
  • Lecture 2 :
  • Important Security Solutions

Section 16 : Roles of Stake Holders

  • Lecture 1 :
  • Understanding Different Roles in Companies
  • Lecture 2 :
  • Understanding Management Role
  • Lecture 3 :
  • Understanding Human Resource Department Role
  • Lecture 4 :
  • Understanding Training Department Role
  • Lecture 5 :
  • Employee Security Training
  • Lecture 6 :
  • Understanding Sysadmin Role
  • Lecture 7 :
  • Understanding Security Admins Role
  • Lecture 8 :
  • Understanding Incidence Response Team Role

Section 17 : Best Practices / Do’s and Dont’s

  • Lecture 1 :
  • Best Practices
  • Lecture 2 :
  • Individual’s Do’s and Dont’s
  • Lecture 3 :
  • Organization's Do’s

Section 18 : Certification Paths in IT Security

  • Lecture 1 :
  • IT Security Certifications Part 1
  • Lecture 2 :
  • IT Security Certifications Part 2

Section 19 : Summary and Conclusion

  • Lecture 1 :
  • Summary and Conclusion

Rahul Jamgade,

IT Security Trainer and Consultant, CISSP. Author and Speaker - Cyber Security. Blogger - Information Security topics. Worked into IT industry at various positions into the IT infrastructure area. Received honours and awards.
View More...
learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

the-complete-ethical-hacking-certification-course

The Complete Ethical Hacking Certif...

By : Mohamed Amer

Lecture 151

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

cissp-certification-introduction

CISSP- Certification Introduction

By : MUKESH SINGH

Lecture 18

practical-blockchain-smart-contracts-ethereum-solidity

Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40

Buy

$19

Enjoy Limitless Learning. Get Access to Unlimited Courses with Premium Subscrption Subscribe Now

Sign up and start learning
By signing up. you agree to our Terms of Use and Privacy Policy
Forget Password