Description
In this course, you will learn :
- how various encryption algorithms and techniques work, as well as their advantages and disadvantages
- Various authentication systems and types are available.
- the distinction between authentication and authorization
- how to assess potential risks and make risk-reduction recommendations
- best practises for network security
- how to assist others in understanding security concepts and protecting themselves
Syllabus :
1. Understanding Security Threats
- The CIA Triad
- Essential Security Terms
- Malicious Software
- Malware Continued
- Network Attacks
- Denial-of-Service
- Client-Side Attacks
- Password Attacks
- Deceptive Attacks
2. Pelcgbybtl (Cryptology)
- Cryptography
- Symmetric Cryptography
- Symmetric Encryption Algorithms
- Rob What a Security Engineer Does
- Asymmetric Cryptography
- Asymmetric Encryption Algorithms
- Hashing
- Hashing Algorithms
- Hashing Algorithms (continued)
- Public Key Infrastructure
- Cryptography in Action
- Securing Network Traffic
- Cryptographic Hardware
3. AAA Security (Not Roadside Assistance)
- Authentication Best Practices
- Multifactor Authenticd
- Ari Interview
- Interview Role Play: Security