Introduction to Cybersecurity
You will learn the fundamentals of cybersecurity and information security, common types of cyber attacks, and how to secure your systems and networks.
Course Information
-
Module-1
People, Process, Technology and CIA triad (00:33:55)
Components and Concepts In Information Security. (00:32:16)
Technology concepts in Information Security-1 (00:48:33)
Technology concepts in Information Technology-2 (00:42:59)
Principles in Security Design (zero trust least privilege) (00:47:12)
Principles in Security Design (00:36:42)
Concepts and Introduction (00:46:28)
Security Architecture and design (00:24:01)
Security Architecture and design (00:31:09)
Security Architecture and design (00:21:49)
Test (00:00:00)
People, Process, Technology and CIA Triad Concept (00:03:04)
Technology Concepts in Information Security - Networking, IP, etc Concept (00:03:05)
Concept and intro to information security Concept (00:02:58)
Assignment Module1 (00:00:00)
-
Module-2
Introduction to Standards, Regulations, Laws and frameworks (00:10:59)
Introduction to Standards, Regulations, Laws and frameworks2 (00:18:11)
Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE-2 (00:40:39)
Standards - NIST, CIS etc (00:30:11)
Implementation of ISO / NIST standards - ISO22301 (00:25:17)
Post implementation management of security (00:22:58)
Frameworks - PCI DSS, HIPAA, GDPR, ITIL-2 (00:22:41)
Introduction to Standards, Regulations, Laws and Frameworks Concept (00:02:36)
Post implementation management of security Concept (00:03:06)
Standards - ISMS and ISO 27001 - the fundamental building block of IS_CS Concept (00:03:24)
Test (00:00:00)
Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE-1 (00:35:53)
Implementation of ISO / NIST standards - ISO27001 (00:14:27)
Implementation of ISO / NIST standards - NIST (00:15:31)
Implementation of ISO / NIST standards - NIST-3/1 (00:29:31)
Implementation of ISO / NIST standards - NIST-3/2 (00:19:34)
Assignment Module2 (00:00:00)
-
Module-3
Cybersecurity Controls - intro to controls, KPI and monitoring (00:40:53)
Auditing Concepts Including Categories, Terminologies, Evidence Types etc (00:45:22)
Auditing Vendors and Third Parties (00:15:04)
Risk Management - introduction and concepts (00:32:01)
Human Resources Security (00:27:21)
BGV, Induction etc practices and risks (00:19:33)
Asset Management (00:24:21)
Data Lifecycle management (00:24:23)
Asset Management Concept (00:03:19)
Auditing concept including Audit ISMS Concept (00:03:03)
Cybersecurity Controls - Introduction to Controls, KPIs, and Monitoring Concept (00:02:51)
Data Classification. Concept (00:03:29)
Data Lifecycle management Concept (00:03:41)
Risk Management Concept (00:02:45)
Test (00:00:00)
Awareness programs - planning and execution (00:20:41)
Assignment Module3 (00:00:00)
-
Module-4
Access Management (00:29:25)
Physical Security (00:31:43)
Access Management Concept (00:03:35)
Introduction to Cryptography and encryption (00:42:16)
IT Operations Security (00:54:15)
IT Operations Security (00:44:35)
IT Operations Security (00:21:21)
Incident Management & Response (00:30:22)
Forensics, Incident investigation and RCA (00:30:22)
Patch Management (00:25:04)
Technology Testing and Management - Introduction (00:21:20)
Technology Testing and Management - Introduction (00:20:30)
Access Control Lists Concept (00:03:11)
Identity _ Access Management (SSO, MFA) Concept (00:03:26)
Test (00:00:00)
Technology Testing and Management - Introduction (00:11:19)
DevSecOps-1 (00:25:01)
Introduction to Cryptography and encryption Concept (00:02:43)
Technology Testing and Management - introduction Concept (00:02:48)
Assignment Module4 (00:00:00)
-
Module-5
Networks, Servers and Devices (Device types, Architecture, Addressing)-4 (00:30:45)
Networks, Servers and Devices (Topologies)-5 (00:27:37)
Networks, Servers and Devices (networks firewalls servers)-1 (00:40:14)
Network, Server, Devices and Database Security-3 (00:26:26)
Fundamentals of networks-1 (00:23:41)
Fundamentals of networks-3 (00:20:21)
Network, Server, Devices and Database Security-7 (00:20:38)
Network, Server, Devices and Database Security-8 (00:18:00)
Network, Server, Devices and Database Security-9 (00:26:05)
Network, Server, Devices and Database Security-10 (00:22:29)
Test (00:00:00)
Networks, Servers and Devices (Protocols 1)-2 (00:50:03)
Network, Server, Dev and Dbase Security (Introduction to Infrastructure Security)-6 (00:21:21)
Fundamentals of Networks-2 (00:17:42)
Fundamentals of networks Concept (00:03:00)
Network, Server and Database Security Concept (00:03:07)
Assignment Module5 (00:00:00)
-
Module-6
Security Operations Center - concept, tools and demo-1 (00:28:27)
Security Operations Center - concept, tools and demo-2 (00:40:27)
SOC Setup and operations - Part 2 (00:36:22)
Vendor Risk Management (00:18:14)
Vendor Risk Management (00:13:16)
Test (00:00:00)
Security Operations Center - concept, tools and demo-3 (00:40:27)
Security Operations Center - concept, tools, and demos-4 (00:15:30)
Business Continuity Management (00:33:59)
Report Writing and soft skills (MS Office, emails, chat etc) (00:17:05)
Vendor Risk Management Concept (00:02:22)
Security Operations Center - concept, tools and demo Concept (00:04:24)
Business Continuity Management Concept (00:03:05)
Report Writing and soft skills (MS Office, emails, chat etc) Concept (00:02:46)
Assignment Module6 (00:00:00)
-
Final Certification Examination
Final Test (00:00:00)
Course Content
Authors
Dinesh Bareja
15 DAYS ACCESS
₹0
Start learning today! Switch to full course access, when satisfied with the trial.
PROJECT
Data Modeling with Postgres
In this project, you’ll model user activity data for a music streaming app called Sparkify. You’ll create a relational database and ETL pipeline designed to optimize queries for understanding what songs users are listening to. In PostgreSQL you will also define Fact and Dimension tables and insert data into your new tables.