Introduction to Cyber Security
A framework for planning the successful implementation of cybersecurity best practices into your apps and infrastructure
IT & Software,Network & Security,Cyber Security
Lectures -11
Quizzes -1
Duration -58 mins
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
It's our job as IT managers, admins, developers of one kind or another, or even security professionals to ensure that our applications and services are running smoothly. And that includes maintaining safe and reliable connectivity for our teams and end users. But no matter how many best-practices and automated monitoring solutions we adopt, there'll always be another threat trying to ruin your day.
You know you and your team should be doing a better job incorporating security into everything you do, but there are just so many threats out there and just so much to know. Where should you even begin?
In this short course, you'll learn about the core principles driving modern cyber security operations. We'll talk about how to perform comprehensive risk assessments for your infrastructure, develop protocols for risk control, and build effective plans for incident management and recovery.
When you're done, you won't have any specific new skills using log analysis, penetration testing, or vulnerability assessment tools. Instead I'll give you a big picture view of what processes you'll need to adopt so that you'll know which tools are right for you, and so you can be confident you're not leaving anything out.
Who this course is for:
- IT project managers looking to plan more secure deployments
- System administrators looking to improve the security of their infrastructure
- Application developers and admins responsible for infrastructure health
- Individuals exploring a career in cyber security
Goals
What will you learn in this course:
Identify the greatest threats to your IT systems
Perform a risk assessment that's specific to your infrastructure
Understand the principles involved with applying risk controls to your systems
Understand the principles involved with incorporating external and internal security audits
Develop a full incident management plan
Create an incident recovery playbook
Prerequisites
What are the prerequisites for this course?
No pre-requisite knowledge or skills are needed for this course
Curriculum
Check out the detailed breakdown of what’s inside the course
Introducing the Cyber Security
1 Lectures
- Introducing the Cyber Security Problem 05:05 05:05
Identifying the Modern Threat Environment
2 Lectures
Understanding Incident Prevention
3 Lectures
Preparing for Incident Response and Recovery
2 Lectures
Utilizing Resources and Opportunities
3 Lectures
Instructor Details
David Clinton
eCourse Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now