Course content
11. Introduction to Information Security
22. Basic Concepts of Information Security
33. History of Information Security
44. Importance of Information Security
55. Principles of Information Security
66. Types of Threats to Information Security
76.1. Types of Information Security Threats: Malware
86.2. Types of Threats to Information Security: Phishing
96.3. Types of Threats to Information Security: Brute Force Attack
106.4. Types of Information Security Threats: DDoS Attacks
116.5. Types of Information Security Threats: SQL Injection Attacks
126.6. Types of Information Security Threats: Man-in-the-Middle Attacks
136.7. Types of Threats to Information Security: Ransomware
146.8. Types of Threats to Information Security: Social Engineering Attacks
156.9. Types of Threats to Information Security: Denial of Service Attacks
166.10. Types of Threats to Information Security: Zero Day Attacks
176.11. Types of Threats to Information Security: Cyber espionage
186.12. Types of Threats to Information Security: Brute Force Attacks
196.13. Types of Threats to Information Security: Spoofing Attacks
206.14. Types of Information Security Threats: Eavesdropping Attacks
216.15. Types of Information Security Threats: Cross-site scripting attacks
226.16. Types of Threats to Information Security: Session Hijacking Attacks
237. Vulnerabilities in Information Systems
248. Attacks on Information Security
259. Cybersecurity
2610. Information Security Policies
2711. Cryptography and Information Security
2812. Authentication and Access Control
2913. Information Security Risk Management
3014. Information Security Laws and Regulations
3115. Computer Network Security
3216. Security in Operating Systems
3317. Security in Web Applications
3418. Database Security
3519. Mobile Device Security
3620. Security in Cloud Computing
3721. Information Security Audit
3822. Digital Forensics
3923. Response to Security Incidents
4024. Physical and Environmental Security
4125. Data Backup and Recovery
4226. Business Continuity and Disaster Recovery
4327. Information Security Awareness and Training
4428. Information Security Certifications
4529. Career in Information Security
4630. Trends and Future of Information Security
4731. Ethical Hacking
4832. Pen Testing Tests
4933. Mobile Application Security
5034. Wireless Network Security
5135. Malware Protection
5236. Social Engineering
5337. Email Security
5438. E-commerce Security
5539. Internet of Things and Security
5640. Privacy and Data Protection
5741. Blockchain Security
5842. Artificial Intelligence and Information Security
5943. Big Data Security
6044. Identity and Access Management
6145. Endpoint Security
6246. Critical Infrastructure Security
6347. Business Application Security
6448. Virtualization and Container Security
6549. Vulnerability Management
6650. Source Code Security
6751. Web 2.0 Application Security
6852. Software-Defined Network Security
6953. Infrastructure Security as a Service
7054. Platform as a Service Security
7155. Software as a Service Security
7256. Security of Content Delivery Networks
7357. Application Delivery Network Security
7458. Storage Network Security
7559. Wide Area Network Security
7660. Security of Local Area Networks
7761. Metropolitan Area Network Security
7862. Storage Area Network Security
7963. Campus Area Network Security
8064. Personal Area Network Security
8165. Security of Virtual Private Networks
8266. Ad Hoc Network Security
8367. Mesh Network Security
8468. Peer-to-Peer Network Security
8569. Wireless Sensor Network Security
8670. Radio Access Network Security
And much more...