1.1 Introduction
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:01
welcome to the I T Security curse. My name is Alejandro Pena, and I'll have the pleasure to be your instructor for all these training sessions.
00:11
Uh, simple record sized must have before this. This curse is to have some tea background
00:19
and, you know, stop some basic information security or cyber security knowledge. However, that doesn't mean that it didn't fulfill those poor exercise. You will not understand the contact. As matter of fact, we start with some actually some basic information security topics,
00:36
and we build the goods up that so stay tuned.
00:41
The curse objectives is to understand the main concepts off information, security or citing security. And of course, I see security. After that, you will be able to assess the security and develop a risk man management life cycle
00:58
are around your I T infrastructure
01:00
To be able to cheat that this car's will contain some white board and screen sharing sessions. We will also see some hands on exercises
01:11
so you can see have to actually assess a my CI devices security.
01:17
The learned our relatives of this choruses thio
01:22
well, basically be able to identify what's the resolution for your team for structure to do that, you will need to understand some men for mentioned security concepts like, you know, business impact analysis
01:34
a risk overall, countermeasures. Best praxis, disaster recovery and business continue to plans.
01:42
Way have gun will cover all these concepts in the curse, and you can apply them to the i A. T infrastructure. You may have,
01:52
uh, who should be watching these walls. In my opinion, everybody everybody's welcome aboard in this current, you know, from season it in for a sec. Professionals to pen testing aficionados are cyber sec aficionados. Percent. Everybody is welcome to join this. As I said before, we will,
02:10
uh, see, son,
02:12
basic or main information. Security topics taking. Understand the type that tire content off the course.
02:22
Uh, well, a little bit about mean, um,
02:24
I have more than 50 years of off experience. Um, in the information security, feel mainly focus in and freshen testing model, Earth engineering, intern response and forensics. I have a couple of fortifications, which is the CSP.
02:42
Uh oh. Mississippi, for example. She's been testing,
02:45
um, some a risk on our 10 certification. The decision Priske
02:51
and certify that the hiker and ideal, you know, just to mention a couple of them.
02:57
Uh, well, if you're looking to learn on the basics of from off duty security, then modules two and three are for you. If you're looking to learn in Maine, most bands points off. I'll see security than module 56456 And then are for you.
03:16
If you're looking to learn cloud based problems Solutions of the i o. T. Then Module seven is for you
03:23
and for investor looking to gains and knowledge have cracked the ideology modules five and six are for you
03:32
and looking forward. Well, this is basically how the cars will be a construct, uh, seven models. Well, as I said in the beginning, we will start with the basic concepts and we will build the curse off of that. And we can, you know, token, most bands information like a photography
03:53
and cloud and, you know, intestine
03:54
etcetera. So stay tuned, everybody
Up Next
Instructed By
Similar Content