#Security of #Information #Systems - Lecture 1 : Information Security Basic Concepts
SECourses
#IT #IoT #Hacking #Internet #Computer #Cyber #Attack #Injection #Attacks #Course Hello everyone. My name is Furkan Gözükara, and I am a Computer Engineer Ph.D. Assistant Professor at the Software Engineering department.
In this course, we will learn general overview and some in depth information about how to secure online information systems.
Security of online systems and IT is a whole area of profession. You can become expert of this area and find very well paying jobs.
Security of Information Systems Full Course Playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslM_o92NwkaUzD7C6Fekx26
GitHub repository of the course : https://github.com/FurkanGozukara/Security-of-Information-Systems-CSE413-2020
Discord channel link of the course : https://discord.gg/6Mrb8MwteQ How to use Discord : https://youtu.be/AEwPtYiLvsQ
This course does not require you to have any knowledge about programming in any programming language.
However, if you want to start learning programming or develop your other Software Engineering related skills you can watch our below full courses:
[1] Introduction to Programming Full Course with C# playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffskoSXySh0MdiayPJsBZ7m2o
[2] Object Oriented Programming Full Course with C# playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffsnH3XJb66FDIHh1yHwWC26I
[3] Artificial Intelligence (AI) and Machine Learning (ML) Full Course with C# Examples playlist: https://www.youtube.com/playlist?list=PL_pbwdIyffskVschrADCL6KEnL_nqDtgD
[4] Software Engineering Full Course playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslgxMVyXhnHiSn_EWTvx1G-
[5] Security of Information Systems Full Course playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslM_o92NwkaUzD7C6Fekx26
[6] (Turkish) Bilgisayar Becerileri Tam Ders playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffsmyE2e909ea1MXLcMb8MenG
List of all Sub-Titles of Lecture 1 :
- Why study information security ?
- Certifications for IS Professionals
- ISACA Certifications (Information Systems Audit and Control Association)
- CISM: Certified Information Security Manager
- CISM Exam
- (ISC)2 Certifications International Information Systems Security Certification Consortium
- CISSP Exam: Certified Information System Security Professional
- CISSP CBK (Common Body of Knowledge) 8 domains
- Security Surveys
- Security Advisories
- Academic Forum on Security
- Information Security Basic Concepts
- What is security in general
- What is Information Security
- Scope of information security
- The Need for Information Security
- Internet Storm Survival Time Measure
- Malware Trend
- Security control categories
- Security control functional types
- Controls by Information States
- Security Services and Properties
- Security services and controls
- Confidentiality
- Integrity
- Availability
- Data Privacy
- Authenticity (Security Service)
- Taxonomy of Authentication
- User Identification and Authentication
- Organization/System Authentication
- Data Origin Authentication (Message authentication)
- Non-Repudiation (Strong form of Data Authentication)
- Accountability (Can be considered as a part of System integrity)
- Authorization
- Identity and Access Management (IAM) Phases
- Confusion about Authorization
- Identity and Access Management Concepts ... https://www.youtube.com/watch?v=QqntPZqNHms
273362650 Bytes