All Courses Free Udemy Courses

Certified Security Analyst Training Preview – Free Udemy Courses

Certified Security Analyst Training Preview – Free Udemy Courses

Learn the pillars of information security and the need for security analysis.

What you’ll learn

Certified Security Analyst Training Preview – Free Udemy Courses

  • Define Security and Information Security
  • Know the pillars of information security
  • Understand the need for security analysis

Requirements

  • Nothing. This course is for beginners

Description

This course is designed for anyone who wants an understanding of information security analysis. More than ever, information security analysts are needed to rescue businesses when they have been breached as well as put in the controls and countermeasures to prevent cyber-attacks.



Learn the pillars of information security and the need for security analysis.

This course will go over the following information security concepts:



  • Security and Information Technology Security –



    Defending information from unauthorized access use, Disclosure, Disruption, Modification, Perusal, Inspection, Recording, or destruction.


  • Pillars of Information Security



    –



    • Confidentiality



      – a state of secrecy or keeping secrets


    • Integrity



      – protecting information from being modified by unauthorized parties.


    • Authentication



      – It’s the process of determining whether someone or something is who or what it is or they are declared to be.


    • Authorization



      – Authorization is the process of giving someone permission to do or have something.


    • Availability



      – ensuring that authorized parties can access the information when needed.


    • Non-Repudiation



      – ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message.


  • Security Analysis and the need for Security Analysis

    • Concerning Elements – Theft, Fraud/Forgery, Unauthorized Information Access, Interception / Modification of Data, Data Loss.
    • Major assets to protect – Your assets, your network infrastructure, your data, the availability of your networks, and your credentials.

Who this course is for:

  • Anyone who wants to expand their knowledge of information security
  • Those interested in a career as an information security analyst










If the links does not work, contact us we will fix them











Categories

Advertisement