informationppdcagra.dcmsme.gov.in/ppdcagra/web/pages/isjm.pdf · introduction: what is information...
TRANSCRIPT
Sept 26,27 2020
INFORMATIONSECURITY
MSME - PPDC AGRA :
CER T I F I E D COURSE
What is Information Security, Why is it important.
Threat Landscape, Threats and Attack Vectors, Comparing attack types, Information
Security Controls
Assessing incidents, Information Response Process, Indicators of Compromise,
Forensics Investigation
Computer Forensics,
Security Auditing:
Security Governance:
INTRODUCTION:
Information security is the body of technologies, processes, and practices designed to
protect networks, computers, and data from attack, damage, and unauthorized access.
Information Security course teach students & professionals to spot vulnerabilities,
fend off attacks, and immediately respond to emergencies.
Are you looking to learn the basics of information security ? Are you a business or
aspiring IT professional that needs to better understand how information security
works? If so, this is the perfect course for you!In this 10-hour course, I'll show you step-
by-step, the fundamentals of information security management, teaching you essential
information security core principles you need to know.If you’re looking to advance or
begin your career in Information Technology (IT), this course is a must!
WHAT YOU WILL LEARN:
BENEFIT:
A Information certification validates your skills in IT security. Information security
Ventures predicts a total of 3.5 million Information Security jobs by 2021. The global
Information Security market is expected to reach USD $282.3 Billion by 2024, growing
at a rate of 11.1-percent annually.
CERTIFIEDINFORMATION SECURITYCOURSE
TABLE OFCONTENTS
1INTRODUCTION: WHAT IS INFORMATION SECURITY, WHY IS IT IMPORTANT.PRINCIPLES OF INFORMATION SECURITY.:KEY CONCEPTS OF INFORMATIONSECURITY, CONFIDENTIALITY, INTEGRITY, AVAILABILITY.NEED FOR INFORMATION SECURITY: THREATS, VULNERABILITIES, RISK
2
3
ETHICAL HACKING:THREAT LANDSCAPE, THREATS AND ATTACK VECTORS,COMPARING ATTACK TYPES, INFORMATION SECURITY CONTROLSSUPPORTING ETHICAL HACKING: DATA PROTECTION IN DIGITAL WORLD,UNDERSTANDING VULNERABILITIES, PENETRATION TESTING METHODOLOGY,HACKING PHASES
COMPUTER FORENSICS: COMPUTER FORENSICS, TYPES OFINVESTIGATIONS,CHALLENGES, ANTI-FORENSICS TECHNIQUES, CYBER SECURITY ANDFORENSICSSUB-BRANCHES: NETWORK FORENSICS, OPERATING SYSTEM FORENSICS, WEBFORENSICS, CLOUD FORENSICS, MALWARE FORENSICS, MOBILE FORENSICS, EMAILFORENSICS
SECURITY AUDITING: TECHNICAL SECURITY ASSESSMENTS, IDENTIFY STRENGTHSAND SECURITY WEAKNESSES, PRIORITIZATION OF RISKS, RISK MITIGATIONRECOMMENDATIONSSECURITY GOVERNANCE: SECURITY POLICIES, REGULATORY COMPLIANCE,PERSONNEL SECURITY, AWARENESS AND TRAINING ON SECURITY
4