Browse Library

Information Security from A to Z

Infosec for Beginners, Intermediaries and Enthusiast.

Instructed by Rahul Jamgade

$15 $20 25% off

2 days left at this price! Buy Now

30-Day Money Back Guarantee

Full Access to this course
Play & Pause Videos
High Quality Recorded Lectures 24
Learn Online from Mobile/PC/Tablet
Download Course for Offline Viewing
Inlcudes Real Projects
Lifetime access & free updates
Certificate of Completion
Free Instructor Support

$19 /month

Buy Subscription See all plans
  • Access to all marketplace courses
  • Access to all new courses
  • Play & Pause Videos
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Download Course for Offline Viewing
  • Inlcudes Real Projects
  • Certificate of Completion
  • Free Instructor Support

$199 /month

Buy Subscription See all plans
  • Access to all marketplace courses
  • Access to all new courses
  • Play & Pause Videos
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Download Course for Offline Viewing
  • Inlcudes Real Projects
  • Certificate of Completion
  • Free Instructor Support
  • The course is designed with holistic approach on Information Security. It covers not only technical aspects but also Administrative. Management aspects as well. It will help those students who are freshers and want to leap into the Information Security domain.

This course is designed for students who are interested in the area of information security and want to make their career  in this area. It is also helpful as a refresher course for the information security professionals and will help those people who just concentrate on "Ethical Hacking" aspect of information security that too from technical perspective.  Also this course is useful to organisations that are concerned about the information security of their organisation and wants to  train their  employees in this area. 
 
 
It will be beneficial for  the job role of "SysAdmin" , "System Engineer" and of course people working in the managerial role in IT.
 
It  provides holistic approach towards information security for organisations as it covers Management , Administrative and physical aspect of information security in addition to the technical aspect which people tend to concentrate more.

  • Anyone who has understanding of computers and IT can attend it. Just need a computer and internet connectivity to watch videos.
  • IT Students and Beginners with little bit of knowledge about Computers and networks. Also helpful for Intermediaries with area of interest in Infosec domain. IT Administrator/ Sysadmins can get benefited out of it.
View More...

Section 1 : Introduction

  • Lecture 1 :
  • Introduction about Trainer Preview
  • Lecture 2 :
  • Course Topics

Section 2 : Important Facts and Statistics

  • Lecture 1 :
  • Cyber Attack and Breach Statistics
  • Lecture 2 :
  • Important Facts

Section 3 : Introduction to Information Security

  • Lecture 1 :
  • Use of Information Technology
  • Lecture 2 :
  • Information security and Protection
  • Lecture 3 :
  • Important points to Understand
  • Lecture 4 :
  • Sources of Threats , Attack Motives and Consequences

Section 4 : Fundamentals of Information Security

  • Lecture 1 :
  • CIA Fundamentals and Confidentiality
  • Lecture 2 :
  • All about Integrity
  • Lecture 3 :
  • All about Availability

Section 5 : Understanding Terminologies

  • Lecture 1 :
  • Information Security Vs Cyber Security Terms
  • Lecture 2 :
  • Other Information Security Terminologies
  • Lecture 3 :
  • Security Teams defined

Section 6 : Misconceptions and Fallacies

  • Lecture 1 :
  • Misconceptions – Management
  • Lecture 2 :
  • Misconceptions – Technical
  • Lecture 3 :
  • Important Quotes

Section 7 : Introduction to Hacking

  • Lecture 1 :
  • Hacking and its Phases
  • Lecture 2 :
  • Understanding Reconnaissance Phase
  • Lecture 3 :
  • Understanding Scanning Phase
  • Lecture 4 :
  • Understanding Gaining Access Phase
  • Lecture 5 :
  • Understanding Maintaining Access Phases
  • Lecture 6 :
  • Understanding Covering Tracks Phase

Section 8 : Understanding Vulnerabilities and Threats

  • Lecture 1 :
  • Types of Vulnerabilities
  • Lecture 2 :
  • Vulnerability Management
  • Lecture 3 :
  • Understanding Threats

Section 9 : Understanding Attack Types

  • Lecture 1 :
  • Types of Attacks
  • Lecture 2 :
  • Attack Vectors and Techniques
  • Lecture 3 :
  • Types of Phishing
  • Lecture 4 :
  • Infamous Attacks
  • Lecture 5 :
  • Individuals Cyber Security

Section 10 : Information Security Controls

  • Lecture 1 :
  • Understanding Information Security Controls
  • Lecture 2 :
  • Understanding Administrative Controls
  • Lecture 3 :
  • Understanding Technical Controls
  • Lecture 4 :
  • Understanding Physical Controls
  • Lecture 5 :
  • Security Control Types and the Holistic view

Section 11 : Understanding Cryptography

  • Lecture 1 :
  • Cryptography Fundamentals
  • Lecture 2 :
  • Cryptographic Methods and Understanding Symmetric Cryptography
  • Lecture 3 :
  • Understanding Asymmetric Cryptography
  • Lecture 4 :
  • Introduction to Asymmetric Protocols
  • Lecture 5 :
  • Introduction to Digital Signatures

Section 12 : Understanding Security Domains

  • Lecture 1 :
  • Introduction to Security Domains
  • Lecture 2 :
  • Understanding Application and Software Security
  • Lecture 3 :
  • Understanding Identity Management
  • Lecture 4 :
  • Understanding Business Continuity Planning and Disaster Recovery
  • Lecture 5 :
  • Understanding Mobile Device Threats and Protections
  • Lecture 6 :
  • Cloud Computing Issues,Threats and Considerations

Section 13 : Challenges with Emerging Technologies

  • Lecture 1 :
  • Introduction to Information Security Challenges
  • Lecture 2 :
  • Understanding IoT Security
  • Lecture 3 :
  • Understanding Ransomware
  • Lecture 4 :
  • Understanding Supply Chain Attacks
  • Lecture 5 :
  • Understanding Advance Persistent Threats
  • Lecture 6 :
  • Understanding Zero Day Attacks
  • Lecture 7 :
  • Overview of Additional Challenges

Section 14 : Understanding Security Measures

  • Lecture 1 :
  • Introduction to Security Measures
  • Lecture 2 :
  • Understanding Firewalls
  • Lecture 3 :
  • Understanding Proxy Servers
  • Lecture 4 :
  • Intrusion Detection System and Intrusion Prevention System
  • Lecture 5 :
  • Understanding VLAN
  • Lecture 6 :
  • Understanding VPN
  • Lecture 7 :
  • Understanding Patch Management
  • Lecture 8 :
  • Access Control Models
  • Lecture 9 :
  • Additional Security Measures
  • Lecture 10 :
  • Encryption Measures
  • Lecture 11 :
  • Backups Measures
  • Lecture 12 :
  • End Point Security Measures
  • Lecture 13 :
  • Host Based Security Measures
  • Lecture 14 :
  • Monitoring Systems
  • Lecture 15 :
  • Perimeter Security Measures
  • Lecture 16 :
  • Protection Measures - More
  • Lecture 17 :
  • Introduction to Redundancy
  • Lecture 18 :
  • Measures for Remote - Home Users
  • Lecture 19 :
  • Secure Coding Practices
  • Lecture 20 :
  • Understanding Top Down Approach
  • Lecture 21 :
  • Policies and their types

Section 15 : Defence in Depth

  • Lecture 1 :
  • The Concept of Defence in Depth
  • Lecture 2 :
  • Important Security Solutions

Section 16 : Roles of Stake Holders

  • Lecture 1 :
  • Understanding Different Roles in Companies
  • Lecture 2 :
  • Understanding Management Role
  • Lecture 3 :
  • Understanding Human Resource Department Role
  • Lecture 4 :
  • Understanding Training Department Role
  • Lecture 5 :
  • Employee Security Training
  • Lecture 6 :
  • Understanding Sysadmin Role
  • Lecture 7 :
  • Understanding Security Admins Role
  • Lecture 8 :
  • Understanding Incidence Response Team Role

Section 17 : Best Practices / Do’s and Dont’s

  • Lecture 1 :
  • Best Practices
  • Lecture 2 :
  • Individual’s Do’s and Dont’s
  • Lecture 3 :
  • Organization's Do’s

Section 18 : Certification Paths in IT Security

  • Lecture 1 :
  • IT Security Certifications Part 1
  • Lecture 2 :
  • IT Security Certifications Part 2

Section 19 : Summary and Conclusion

  • Lecture 1 :
  • Summary and Conclusion
  • 1. How do i access the course after purchase?

    Once you purchase a course (Single course or Subscription), you will be able to access the courses instantly online by logging into your account. Use the user name & password that you created while signing up. Once logged in, you can go to the "My Courses" section to access your course.
  • 2. Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • 3. Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • 4. How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • 5. Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • 6. Do i get any certification after completing the course?

    Yes. Once you succesfully complete any course on Learnfly marketplace, you get a certiifcate of course completion emailed to you within 24 hours with your name & the Learnfly badge. You can definately brag about it & share it on your social media or with friends as one of your achievement. Click here to view the sample certificate Click Here
  • 7. For how long can i access my course after the purchase?

    If you buy a single course, that course is accessible to you for a lifetime. If you go for a premium subcription, you can access all the courses on Learnfly marketplace till your subscription is Active.
  • 8. Whats the difference between Single Course Purchase & Go Premium option?

    With Single Course Purchase, you only get an access of one single course. Whereas, with premium monhtly or annual subscription, you can access all the existing or new courses on learnfly marketplace. You can decide what option suits you the best and accordingly you can make your purchase.
  • 9. Is there any free trial?

    Currently, we don't have any free trial but it may be available in near future.
  • 10. What is the refund policy?

    We would hate you to leave us. However, if you are not satisfied, you can ask for a full refund within 30 days & we will be happy to assist you further.

Rahul Jamgade,

IT Security Trainer and Consultant, CISSP. Author and Speaker - Cyber Security. Blogger - Information Security topics. Worked into IT industry at various positions into the IT infrastructure area. Received honours and awards.
View More...
learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

the-complete-ethical-hacking-certification-course

The Complete Ethical Hacking Certif...

By : Mohamed Atef

Lecture 151

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

cissp-certification-introduction

CISSP- Certification Introduction

By : MUKESH SINGH

Lecture 18

practical-blockchain-smart-contracts-ethereum-solidity

Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40

Buy

$15

Sign up and start learning
By signing up, you agree to our Terms of Use and Privacy Policy
Forget Password