Learn Cyber Security
[dearpdf id=”24187″ ][/dearpdf]
Instructors
FAQs
The word Cybersecurity is made up of two words. Cyber and security. So, this course is about these two combined words and their application to our daily lives.
The word "cyber" denotes a relationship with information technology (IT), i.e., computers. Basically, it involves all aspects of computing, including storing data, protecting data, accessing data, processing data, transmitting data, etc. In the late 1940s, the term cybernetics was coined by mathematician Norbert Wiener. It’s defined as the study of control systems and communication between people and machines. Weiner used the ancient Greek word cyber, which is related to the idea of governing.
Security is protection from, or resilience against, potential harm and or other unwanted coercive acts caused by others, such as restraining the freedom of others to act. Referents of security may be persons and social groups, objects, institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change. For example, A
Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.
Application security focuses on keeping software and devices free of threats.
Information security protects the integrity and privacy of data, both in storage and in transit
A policy is a set of rules or guidelines for your organization and employees to follow in or to achieve compliance. Policies answer questions about what employees do and why they do it. A procedure is the instructions on how a policy is followed.
A security policy is a clearly defined document that states in writing how a company plans to protect its physical and information technology (IT) resources. As technology changes, these documents are also updated and or changed to reflect the new vulnerabilities.
The intentional commission or omission of an act usually deemed socially harmful or dangerous and specifically defined, prohibited, and punishable under criminal law
A Criminal activity that involves a computer, the internet, or a computer network. The computer may have been used in committing the crime, or the computer may be the target to harm someone's security and or finances.
Requirements
- Learners need to possess an understanding of the English language
- No Information Technology Knowledge Experience Necessary
- The willingness to Learn at Your Own Pace Online
- Full Internet Access to be able to learn from any location globally
Features
- Improved Computer Data Security
- Better Regulatory Compliance
Target audiences
- End-user who uses cyber infrastructure to conduct their business
- Technical People that are responsible for parts or all of the infrastructure and the services that this infrastructure provides.
- People in different levels of management
- All levels of IT auditor/penetration tester
- Security consultants/managers
- Information Technology directors/managers/consultants
- Internet Security auditors/architects
- Security systems engineers
- Chief information security officers (CISOs)
- Chief compliance/privacy/risk officers
- Network specialists, analysts, managers, architects, consultants or administrators
- Technical support engineers and Systems analysts or administrators