-
Module 1 3
Introduction
-
Lecture1.130 min
-
Lecture1.205 min
-
Lecture1.305 min
-
-
Module 2 18
Fundamental Elements of Cybersecurity
-
Lecture2.105 min
-
Lecture2.205 min
-
Lecture2.305 min
-
Lecture2.405 min
-
Lecture2.505 min
-
Lecture2.605 min
-
Lecture2.705 min
-
Lecture2.805 min
-
Lecture2.905 min
-
Lecture2.1005 min
-
Lecture2.1105 min
-
Lecture2.1205 min
-
Lecture2.1305 min
-
Lecture2.1405 min
-
Lecture2.1505 min
-
Lecture2.1605 min
-
Lecture2.1705 min
-
Lecture2.1805 min
-
-
Module 3 13
Introduction to Cyber Threats
-
Lecture3.105 min
-
Lecture3.205 min
-
Lecture3.305 min
-
Lecture3.405 min
-
Lecture3.505 min
-
Lecture3.605 min
-
Lecture3.705 min
-
Lecture3.805 min
-
Lecture3.905 min
-
Lecture3.1005 min
-
Lecture3.1105 min
-
Lecture3.1205 min
-
Lecture3.1305 min
-
-
Module 4 12
Security Risk Analysis and Management
-
Lecture4.105 min
-
Lecture4.205 min
-
Lecture4.305 min
-
Lecture4.405 min
-
Lecture4.505 min
-
Lecture4.605 min
-
Lecture4.705 min
-
Lecture4.805 min
-
Lecture4.905 min
-
Lecture4.1005 min
-
Lecture4.1105 min
-
Lecture4.1205 min
-
-
Module 5 3
Cybersecurity Laws
-
Lecture5.105 min
-
Lecture5.205 min
-
Lecture5.305 min
-
-
Module 6 1
Conclusion
-
Lecture6.105 min
-
-
Exam 1
-
Quiz7.130 questionsFinal
-
Information Security
Information security is a set of processes and practices that are meant to protect valuable information from unauthorized access, disclosure, destruction, or modification. Based on the nature of the business, the information that needs protection can vary. In this era of digitalization, information or data holds significant importance for organizations. Not all the processing information in the corporate sector holds the same importance. So, information security is meant to work differently for different types of data. Usually, information security setups focus on three prime objectives, as follow:
- Confidentiality: The first perspective in information security is that the information should not be disclosed to non-authorized entities, individuals, and processes.
- Integrity: The integrity of information assets much be maintained in order to keep data up-to-date, intact, complete, and uncorrupted. Integrity ensures that no unauthorized person access the information because the system will always know who has access to information.
- Availability: Information, services, and systems must be available to authorized personnel whenever they want.
If these prime objectives are met efficiently, then an organization can integrate a strong information security system.