| Cyber Security | |||
| FUNDAMENTALS OF NETWORKING | |||
| Network Topologies | 00:06:00 | ||
| History and Applications of Computer Networking | 00:06:00 | ||
| Protocols and Standards | 00:04:00 | ||
| Introduction to OSI Model | 00:04:00 | ||
| Layers of OSI Model | 00:07:00 | ||
| Introduction to TCP/IP Model | 00:10:00 | ||
| OSI Model vs TCP/IP Model | 00:04:00 | ||
| Addressing in Computer Networks | 00:09:00 | ||
| IP Address- IPv4 and IPv6 | 00:07:00 | ||
| Classes of IP Address | 00:10:00 | ||
| PRACTICAL : HOW TO FIND OUT YOUR PC’s IP ADDRESS | 00:03:00 | ||
| PRACTICAL : HOW TO FIND OUT YOUR PC’S MAC ADDRESS5 | 00:05:00 | ||
| The Internet Protocol (IP) | 00:07:00 | ||
| Address Resolution Protocol (ARP) | 00:09:00 | ||
| Dynamic Host Configuration Protocol (DHCP) | 00:08:00 | ||
| Internet Control Message Protocol (ICMP) | 00:06:00 | ||
| RIP and OSPF Protocols | 00:05:00 | ||
| PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT | 00:03:00 | ||
| What are Sockets? | 00:05:00 | ||
| File Transfer Protocol (FTP) | 00:03:00 | ||
| Hypertext Transfer Protocol (HTTP) | 00:04:00 | ||
| Hyptertext Transfer Protocol/Secure Socket Layer (HTTPS) | 00:05:00 | ||
| Domain Name System (DNS) | 00:03:00 | ||
| GETTING STARTED WITH CYBER SECURITY | |||
| Definition of Computer Security | 00:03:00 | ||
| Interesting Facts about Cyber Security | 00:05:00 | ||
| History of Cyber Security | 00:07:00 | ||
| Scope and Career Insights in Cyber Security | 00:08:00 | ||
| LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY | |||
| Introduction | 00:01:00 | ||
| Types of Computer Security | 00:03:00 | ||
| Key Terms in Cyber Security | 00:07:00 | ||
| The Elements of Information Security | 00:06:00 | ||
| Types of Attacks | 00:10:00 | ||
| Roles in Cyber Security : Part 1 | 00:08:00 | ||
| Roles in Cyber Security : Part 2 | 00:06:00 | ||
| DIVING DEEP INTO CYBER SECURITY | |||
| Security Architect’s View of Security | 00:08:00 | ||
| What is Vulnerability Assessment? | 00:05:00 | ||
| 4 Phases of Vulnerability Assessment | 00:09:00 | ||
| Introduction to Cryptography | 00:06:00 | ||
| Symmetric Encryption | 00:03:00 | ||
| Asymmetric Encryption | 00:04:00 | ||
| Hashing | 00:07:00 | ||
| Security Organizations | 00:05:00 | ||
| Critical Thinking in Cyber Security | 00:04:00 | ||
| The Five Critical Thinking Skills | 00:06:00 | ||
| PRACTICAL : USING NSLOOKUP TOOL | 00:03:00 | ||
| TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES | |||
| Different types of Actors in Cyber Security | 00:10:00 | ||
| Types of Cyber Attacks | 00:04:00 | ||
| Hacking Organizations around the Globe | 00:05:00 | ||
| Security Services and Mechanisms | 00:03:00 | ||
| Introduction to Threats | 00:03:00 | ||
| What is a Malware? | 00:07:00 | ||
| Types of Trojans | 00:06:00 | ||
| Types of Virus | 00:07:00 | ||
| Have you ever heard about a Ransomware? | 00:09:00 | ||
| The Cyber Kill Chain | 00:09:00 | ||
| Introduction to Social Engineering | 00:05:00 | ||
| Types of Social Engineering | 00:07:00 | ||
| KEY SECURITY CONCEPTS | |||
| Confidentiality – The Most Important Element of Security | 00:04:00 | ||
| Introduction to Incident Response Team | 00:05:00 | ||
| Phases of Incident Response | 00:05:00 | ||
| Laws in Cyber Security | 00:05:00 | ||
| What are Audits in Cyber Security | 00:04:00 | ||
| Internal Audit vs External Audit | 00:04:00 | ||
| The NIST Framework | 00:03:00 | ||
| The COBIT Framework | 00:04:00 | ||
| FIREWALLS AND ANTIVIRUS | |||
| Intrusion Detection System | 00:05:00 | ||
| Introduction to Firewalls | 00:05:00 | ||
| What is DMZ? | 00:04:00 | ||
| Different types of Firewalls | 00:09:00 | ||
| Assignment: Cyber Security | |||
| Assignment – Cyber Security | 1 week | ||
| Information Management | |||
| Module 01: Introduction to Information Management | |||
| Introduction to Information Management | 00:32:00 | ||
| Module 02: Information Management Strategy | |||
| Information Management Strategy | 00:17:00 | ||
| Module 03: Databases and Information Management | |||
| Databases and Information Management | 00:29:00 | ||
| Module 04: Management Information Systems (MIS) | |||
| Management Information Systems (MIS) | 00:16:00 | ||
| Module 05: Auditing Information Systems | |||
| Auditing Information Systems | 00:16:00 | ||
| Module 06: Ethical and Social Issues and Data Protection | |||
| Ethical and Social Issues and Data Protection | 00:27:00 | ||
| Assignment: Information Management | |||
| Assignment – Information Management | 6 days, 16 hours | ||