O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Information Security

Video Description

Build your own Information Security Framework and become a secure computer user

About This Video

  • Learn to build your own information security framework, best-fit for your organization
  • Build on the concepts of threat modelling, incidence response and security analysis
  • Practical approach towards strengthening your security framework

In Detail

Information security mechanism is one of the most crucial factor for any organization. Important assets of organization demand a proper risk management and threat model for security and hence, information security concepts are gaining a lot of traction. This course will initially cover the concept of information security and software installations process. It will then move on to modules like threat modelling, risk management and mitigation.

This Course covers the network and web scanning . Later in the course it teaches how to use Kali Linux for ethical hacking, it will have different practicals on using Kali Linux such as for information gathering, vulnerability analysis, web application analysis, database assessment and password attacks and have some hands-on experience. It will also cover concepts of incident response system, information rights management and so on. It will then guide you towards building your own information security framework best fit for your organization.

At the end of this course, you will be well versed with all the factors involved with information security which would help you build a security framework which will be perfect fit for your organizational requirement