CIS-2513 - Introduction to Information Security

(OKU-CIS-2513.AW1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction to Cybersecurity

  • Data and Information
  • Data Communication
  • Computer Network
  • World Wide Web
  • Internet
  • W3 Consortium (W3C)
  • Networking, W3 and Internet Relationship
  • Information Security
  • World Wide Web Security
  • Network Security
  • Cybersecurity
  • Information Security to Cybersecurity
  • Role of Risk Analysis in Cybersecurity
  • Conclusion
  • Points to Remember
  • Questions
2

Cybersecurity Landscape and Its Challenges

  • History of Computers and Cybercrime
  • Cybercrime – As a Profession
  • Cost of Cybercrime
  • Framework for Analysing the Cybercosts
  • Various Forms of Cybercrimes
  • Challenges in Cybersecurity
  • Cybercrime: As a Service
  • Cybercrime Underground Black Market
  • Conclusion
  • Points to Remember
  • Questions
3

Information Security and Intrusion Detection System

  • Critical National Infrastructure
  • Confidentiality-Integrity-Availability Triad
  • Defensive Lifecycle
  • Intrusion and Its Types
  • Intrusion Detection System
  • Characteristics of IDS
  • Major Types of Intrusion Detection Systems
  • Host-Based IDS versus Network-Based IDS
  • Intrusion Detection and Prevention Principles
  • Conclusion
  • Points to Remember
  • Questions
4

Cybercrime Source Identification Techniques

  • Cyber Forensic
  • Intrusion Activities
  • Attribution and Traceback
  • Why Attribution Is Difficult?
  • Assumptions in Traceback
  • IP Address and Traceback Mechanism
  • Classification of Traceback Schemes
  • Evaluation of IP Traceback Schemes
  • Active Response Characteristics
  • Sleepy Watermark Tracing (SWT)
  • Conclusion
  • Points to Remember
  • Questions
5

Stepping Stone Detection and Tracing System

  • The Problem of Accountability
  • Stepping Stones
  • Timing-Based Stepping Stone Detection Approach
  • Brute Force Content-Based Algorithm
  • Simple Content-Based Algorithm
  • Anomaly Detection Techniques
  • Conclusion
  • Points to Remember
  • Questions
6

Infrastructural Vulnerabilities and DDoS Flooding Attacks

  • COTS Software and Internet Security
  • Shortfalls in Internet Structure
  • Cooperative Intrusion Traceback and Response Architecture (CITRA)
  • DDoS Flooding Attacks
  • DDoS Attacks on OSI Layers
  • Cyberwar
  • Conclusion
  • Points to Remember
  • Questions
7

Introduction to Information Security

  • Introduction to information security
  • What is information security?
  • Future of information security
  • Conclusion
  • Questions
8

Domains in Information Security

  • Overview
  • Information security
  • Privacy
  • Fraud and investigation
  • Conclusion
  • Questions
9

Information Security for Non-Technical Professionals

  • Compliance
  • Why is cyber compliance a good profession?
  • Privacy
  • Physical security
  • Cyberlaw
  • Audits (semi-technical)
  • Governance risk
  • Conclusion
  • Questions
10

Information Security for Technical Professionals

  • IT infrastructure security
  • IDAM (semi-technical)
  • Security operations center (SOC)
  • Fraud risk and investigation 
  • Ethical hacking
  • Conclusion
  • Questions
11

Skills Required for a Cybersecurity Professional

  • Soft skills
  • Conclusion
  • Questions
12

How to Find a Job?

  • Before applying for jobs
  • Mentality of recruiters and HRs
  • Resume
  • How to find a job?
  • Conclusion
  • Questions
13

Personal Branding

  • Personal branding
  • Importance of personal branding
  • How to build a personal brand?
  • Conclusion
  • Questions

1

Introduction to Cybersecurity

  • Understanding Data, Information, and Data Communication
  • Understanding Cybersecurity Concepts
2

Cybersecurity Landscape and Its Challenges

  • Analyzing the WannaCry Ransomware Attack
  • Simulating a DDoS Attack
  • Performing a Phishing Attack
  • Confirming the Spoofing Attack in Wireshark
  • Scanning and Classifying the Types of Viruses
  • Defending Against a Buffer Overflow Attack
3

Information Security and Intrusion Detection System

  • Implementing an Intrusion Detection System
  • Understanding Intrusion Detection and Prevention
4

Cybercrime Source Identification Techniques

  • Understanding IP Addresses and Traceback Mechanisms
  • Understanding SWT
5

Stepping Stone Detection and Tracing System

  • Capturing and Analyzing Network Traffic Using Wireshark
6

Infrastructural Vulnerabilities and DDoS Flooding Attacks

  • Conducting a DoS Attack Using a Smurf Attack
  • Generating and Analyzing a SYN Flood Attack Using a Packet Sniffer
7

Introduction to Information Security

  • Detecting Rootkits
  • Analyzing the WannaCry Ransomware Attack
  • Analyzing Malware Using VirusTotal
  • Creating a RAT
  • Performing a Phishing Attack Using a SET Tool
  • Implementing MFA on Mobile Devices
8

Domains in Information Security

  • Creating a New IAM User
  • Discussion on Cybercrime Investigation and Organizational Security
9

Information Security for Non-Technical Professionals

  • Discovering Non-Technical Career Paths in Cybersecurity
  • Implementing Physical Security
10

Information Security for Technical Professionals

  • Managing Windows Defender Firewall Using the Control Panel
  • Exploring Careers in IT Infrastructure Security & Beyond
  • Viewing and Exporting Event Logs
  • Conducting Vulnerability Scanning Using Nessus
11

Skills Required for a Cybersecurity Professional

  • Mastering Soft Skills in Cybersecurity
12

How to Find a Job?

  • Getting Started in InfoSec Careers
13

Personal Branding

  • Building Your Personal Brand

Related Courses

All Courses
scroll to top