Information Security Fundamentals

The very basics of InfoSec

Information Security

Computer Security

CIA Triad

Non-repudiation

Risk Assessment

Risk Management

Cryptography Basics

Authentication

Authorization

Security Policies

Security Auditing

Security Laws and Regulations

Security Defense

Security Monitoring

Incident Response

Vulnerability Management

Security Patching

Penetration testing

This course is meant for anyone curious about InfoSec and just starting out in this field. Terminology and concepts are explained with the goal of being clear even to those who hear of them for the very first time.

The following topics are covered mainly with definitions and theoretical explanations, but also with some practical examples:

– The need for InfoSec

– CIA Triad (Confidentiality, Integrity, Availability)

– Non-repudiation

– Risk Assessment & Risk Management

– Cryptography and it’s place in InfoSec

– Authentication and Authorization

– Governance and Information Security Policies

– Security Auditing

– Laws & Regulations related to Security and Privacy of Data

– Security Detection and Response

– Vulnerability Management

– Security Patching

– Penetration Testing

As an experienced Cybersecurity expert, I’ve changed a few roles and seen different approaches to security, mainly in large corporations. I’m happy to provide insight into how those systems operate, and more importantly, how they’re secured. You will learn that it’s not all about advanced technology you hear about these days, but also about people, processes, education, and analytical thinking. I truly hope you will find value in these lessons, and feel free to reach out shall you have any questions, suggestions, or ideas to share.

Later on, I will add tests in between lessons, including some additional information on differences between all the security disciplines: infosec, cybersec, physical, fraud…

Tutorial Bar
Logo