Introduction to Information Security

Learn Information Security from scratch

Instructed by Moamen M. El Sayed

  • Includes all Standard Features
  • Get Unlimited access to all the courses
  • No Contract. Cancel Anytime
Starting in just $19 / mo see all plans
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
  • Information Security Overview.
  • Information Security Components.
  • Attacks, Concepts and Techniques.
  • Protecting Your Data and Privacy.
  • Protecting the Organization.

Introduction to Information Security is an intermediate-level information security course. It teaches the basic concepts and principles of information security, ethical hacking, and the fundamental approaches to secure computers and networks. Its main topics include: security history and overview, security components, operating systems security, cryptography, malicious software, network threats and defenses, web security, mobile security, ethical issues, and privacy.

  • IT Fundamental Knowledge
  • Users, IT Specialists, IT Managers, IT Auditors, System Administrators, Network Administrators
View More...

Section 1 : Introduction

  • Lecture 1 :
  • Lecture 2 :
  • Information Security Overview (Part: 1)
  • Lecture 3 :
  • Information Security Overview (Part: 2)

Section 2 : Information Security Components (CIA)

  • Lecture 1 :
  • Information Security Components (CIA) Overview
  • Lecture 2 :
  • Information Security Components (CIA) Practical

Section 3 : Attacks, Concepts and Techniques

  • Lecture 1 :
  • Attacks, Concepts and Techniques (Part: 1)
  • Lecture 2 :
  • Attacks, Concepts and Techniques (Part: 2)

Section 4 : Protecting Your Data and Privacy

  • Lecture 1 :
  • Protecting Your Data and Privacy (Part: 1)
  • Lecture 2 :
  • Protecting Your Data and Privacy (Part: 2)

Section 5 : Protecting the Organization

  • Lecture 1 :
  • Protecting the Organization

Section 6 : References

  • Lecture 1 :
  • References

Moamen M. El Sayed,

I am an energetic and versatile trainer who is able to deliver a wide range of Computer and IT topics. I've a strong background in planning lectures, organizing extra activities and excellent communication skills. As a professional I can turn best practices into high quality and goal-driven results. I have more than 18 years of experience in IT infrastructure, networks, system administration, database administration, security, management and consulting. I am a certified trainer from Microsoft (MCT) and a certified instructor from EC-Council (CEI). Certifications include: ITIL-F, CEI, MCT, CCNA CYBER OPS, CEH, MCSA 2016 – 2012 – 2008 – 2003, MCSA: Messaging. حاصل علي بكالوريوس هندسة قسم اتصالات ، ومسجل حاليا للحصول علي درجة ماجستير في أمن المعلومات من جامعة الاسكندرية - مصر. مدرب قادر على تقديم مجموعة واسعة من مواضيع الكمبيوتر وتكنولوجيا المعلومات. لدي خلفية قوية في تصميم الحقائب التدريبية وتخطيط المحاضرات وتنظيم أنشطة إضافية ومهارات اتصال ممتازة. كمحترف ، يمكنني تحويل أفضل الممارسات إلى نتائج عالية الجودة وموجهة نحو تحقيق الأهداف. أكثر من 18 عامًا من الخبرة في البنية التحتية لتكنولوجيا المعلومات والشبكات وإدارة النظام وإدارة قواعد البيانات والأمن والإدارة والاستشارات التقنية. مدرب معتمد من شركة Microsoft وجامعة EC-Council الأمريكية المتخصصة في أمن المعلومات (CEI). قمت بتدريس برامج تدريبية مثل: مايكروسوفت أوفيس 2019. مايكروسوفت ويندوز. الرخصة الدولية لقيادة الكمبيوتر ICDL. الصيانة. الشبكات. أمن المعلومات. الاختراق الأخلاقي. إدارة النظام "السيرفر". وغيرها من البرامج التدريبية... الشهادات الدولية الحاصل عليها: ITIL-F, CEI, MCT, CCNA CYBER OPS, CEH, MCSA 2016 – 2012 – 2008 – 2003, MCSA: Messaging.
View More...

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80


TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17


The Complete Ethical Hacking Certif...

By : Mohamed Amer

Lecture 151


VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6


CISSP- Certification Introduction


Lecture 18


Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40



Enjoy Limitless Learning. Get Access to Unlimited Courses with Premium Subscrption Subscribe Now

Sign up and start learning
By signing up. you agree to our Terms of Use and Privacy Policy
Forget Password