100%
Dark site-logo
  • Registration
    • Class Registration
    • Account Registration
    • My account
  • Members
    • Our Members
    • Testimonial
  • Courses
    • All Courses
    • Resource Material
    • Live Class Access
    • Learner Dashboard
    • Quiz Reports
    • Groups Dashboard
    • Paid Membership Levels
  • Support 24/7
  • Store
  • Blogs
  • Events
Login
  • Registration
  • Members
  • Courses
  • Support 24/7
  • Store
  • Blogs
  • Events
  • Class Registration
  • Account Registration
  • My account
  • Our Members
  • Testimonial
  • All Courses
  • Resource Material
  • Live Class Access
  • Learner Dashboard
  • Quiz Reports
  • Groups Dashboard
  • Paid Membership Levels

Data Security Concepts

4.74
(109)
Instructor Image Dr Ricardo R. Neil
29 Lessons
5 months
27 Student
Free
Enroll In This Course
IITAE Course UpdateTertiary Institution Courses

Data Security Concepts

Instructor Image Dr Ricardo R. Neil
29 Lessons
1 Quiz
4.74
(109)
5 months
27 Student
Free Enroll In This Course
Course Materials Introduction

Rationale

Data security concepts is an advanced course that focuses on one of the most important and critically needed skill areas in information assurance and networking: network security. It builds upon an introductory course on the fundamentals of networking, TCP/IP, and the internet, to investigate the concepts and practices for securing networks and network communications. The Data Security course also leverages key information assurance concepts and practices such as encryption, authentication, risk analysis, security policy design, and implementation, etc.

Course Description

This course provides students with the knowledge and skills to begin supporting network security within an organization. Students who complete this course will be able to identify security threats and vulnerabilities and help respond to and recover from security incidents.

Learning Outcomes

On completion of this course students should be able to:

  1. Explain how to secure information.
  2. Identify and counteract social engineering exploits.
  3. Identify and solve security issues with the network of an organization.
  4. Create a process to maintain file security.
  5. Design policies to guard against security breaches.
  6. Create measures to prevent attacks on an organization’s network.

 ASSESSMENT SUMMARY

Task / Assignment No. & NameDue DateTimeWeightTypeLearning Outcomes
1.       Oral Presentation / Video15th Feb.12:30 pm20%Class Work (Group)1, 2
2.       Practical / Video15th Mar.12:30 pm30%Project (Group) 3, 4
3.       Mid Term / Video 12th April.3:30 pm20%Project / Presentation (Group) 5, 6
4.       Final ExamMay30%Individual1 – 6

Nb: Dates are subjected to be changed.

Textbooks and References

  1. Weaver. R., (2007). Guide to network defense and countermeasures (2nded.). Boston, MA: Thomson Course Technology.
  2. Reading List
  3. Simpson, M. (2006). Hands-on ethical hacking and network Defense. Boston, MA: Thomson Course Technology.
  4. Howlett, T. (2004). Open-source security tools: A practical guide to security applications. Upper Saddle River, New Jersey: Prentice Hall.
  5. Harris, S., Harper, A., Eagle, C., & Ness, J. (2005). Gray hat hacking: The ethical hacker’s handbook. McGraw Hill Osborne Media.

Course Outline

Revised-Data-Security-Concepts-IFTH2006 2021
 

Click Here For Assessment Materials 

 

Lessons

1. SECURING INFORMATION

Lesson 1 – Understand Information Security
5 Topics
  • Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecurity Course | Edureka
  • Understanding Information Security
  • What is information security?
  • Why is information security important?
  • What are the risks?
Lesson 2 – Implement Physical Security Measures
20 Topics
  • Physical Security Controls - CompTIA Network+ N10-006 - 3.4
  • Best Practices in Physical Security Management: Safeguard your Organization against Threats
  • What is physical security and why does it matter?
  • Where and how much physical security is needed?
  • Why physical security is important in organizations?
  • How can effective physical security be achieved in organizations?
  • Full-fledged approach
  • Identify your security risks
  • High priority risks
  • Identifying assets
  • Preparing risk matrix
  • Identifying possible loss events
  • Determine likelihood of event
  • Determine consequences of events
  • Entering data in risk matrix
  • Determine level of security risk
  • List ranking on risk matrix
  • Multi-layer implementation of physical security
  • Common security mistakes
  • Conclusion
Lesson 3 – Identify the Need for Cyber Security
6 Topics
  • Top Cybersecurity Threats | Cybersecurity Insights #14
  • What is Cyber Security?
  • The scale of the cyber threat
  • Types of cyber threats
  • End-user protection
  • Cyber safety tips – protect yourself against cyberattacks

2. COUNTERACTING SOCIAL ENGINEERING EXPLOITS

Lesson 1 – Identify Social Engineering Exploits
8 Topics
  • How to avoid social engineering attacks
  • Social engineering explained: How criminals exploit human behavior
  • Social engineering techniques
  • Social engineering examples
  • Famous social engineering attacks
  • Social engineering prevention
  • 5 tips for defending against social engineering
  • Social engineering toolkit
Lesson 2 – Counteract Social Engineering Exploits
4 Topics
  • How to avoid social engineering attacks
  • How to Prevent Social Engineering Attacks
  • A Breakdown of Social Engineering
  • Why Social Engineering Attacks Are Dangerous
Lesson 3 – Evolve Social Engineering Organization Policies
4 Topics
  • Social Engineering Policy: Organizational Security Policies
  • Contents:
  • Characteristics of a Good Security Policy:
  • Physical security

3. IDENTIFYING SECURITY MEASURES

Lesson 1 – Strengthen Desktop Security
8 Topics
  • Computer Security | What Is Computer Security | Cyber Security Tutorial | Simplilearn
  • Why Is Desktop Security Important?
  • Evaluating Your Desktop Security
  • User Classification
  • Process and Implementation
  • Technologies That Protect Your Data
  • What Are the Most Vulnerable Components of Desktop Security?
  • Social Engineering & Desktop Security Awareness Programs
Lesson 2 – Strengthen Software Security
9 Topics
  • Measures and Measurement for Secure Software Development
  • Measurement and the Software Development Life Cycle
  • Software Engineering Measurement Process
  • Process Measures for Secure Development
  • Product Measures for Secure Development
  • Community of Interest
  • Tools & Maturity of Practice
  • Maturity of Practice
  • Appendix: Indicator Template
Lesson 3 – Strengthen Network Security
11 Topics
  • How To Secure Your Corporate IT Network | Cyber Security Recommendations
  • Network security: Common security measures
  • Firewalls
  • Antivirus systems
  • Intrusion-detection systems
  • Patching and updating
  • General network tools
  • Port scanners
  • Network sniffers
  • Vulnerability scanners
  • Password crackers
Lesson 4 – Secure Wireless Networks
3 Topics
  • Securing a Wired and Wireless Network - CompTIA A+ 220-802: 2.5
  • AN INTRODUCTION TO WIRELESS NETWORKING
  • II. SECURITY THREATS AND RISKS

4. MAINTAINING FILE SECURITY

Lesson 1 – Implement Security in Windows Vista
7 Topics
  • Windows 10 - Security
  • Window Security Enhancements
  • Windows & Linux Security Comparison Instructions:
  • Introduction Windows Vista Security
  • PolicyKit for Window 7
  • Online security & Basic Security Considerations
  • Installing and Hardening Windows 7
Lesson 2 – Back up Data
1 Topic
  • SDC 2018 - Using CDMI to Create/Backup, Restore and Replicate Storage Objects and Data
Lesson 3 – Restore Data
1 Topic
  • SDC 2018 - Using CDMI to Create/Backup, Restore and Replicate Storage Objects and Data
Lesson 4 – Dispose of Computer Information
2 Topics
  • Recycling Your Electronics – What you Need to Know
  • Dispose of Computer Information

5. GUARDING AGAINST ATTACKS

Lesson 1 – Protect Computer from Security Threats
3 Topics
  • 8 Most Common Cybersecurity Threats | Types of Cyber Attacks | Cybersecurity for Beginners | Edureka
  • Introduction
  • Examples of Online Cybersecurity Threats
Lesson 2 – Protect Computers from Virus Attacks
2 Topics
  • 8 Most Common Cybersecurity Threats | Types of Cyber Attacks | Cybersecurity for Beginners | Edureka
  • Computer Viruses, Worms and Vaccines
Lesson 3 – Block Spyware
1 Topic
  • What is Spyware?

6. HANDLING SECURITY BREACHES

Lesson 1 – Identify Incidents
8 Topics
  • Incident Response | Cyber Security Crash Course
  • Introduction
  • What is a Security Breach?
  • Types of Security Breaches
  • Examples of Security Breaches
  • Behavior Analytics: Detecting Attack Patterns to Avoid Security Breaches
  • Incident Response: Preventing and Responding to Security Breaches
  • Conclusion
Lesson 2 – Respond to Incidents
2 Topics
  • Incident Response | Cyber Security Crash Course
  • Incident Response: How To Respond To A Security Breach During First 24 Hours (Checklist)

7. NETWORK DEFENSE

Lesson 1 – Network Defense Fundamentals
2 Topics
  • Network Security Tutorial | Introduction to Network Security | Network Security Tools | Edureka
  • Click on the following for notes
Lesson 2 – Security policy Design & implementation
3 Topics
  • Security Policy Training and Procedures - CompTIA Security+ SY0-401: 2.6
  • Security Policy: Development and Implementation
  • CLICK HERE FOR NOTES
Lesson 3 – Network Traffic signatures
2 Topics
  • Network Signatures
  • CLICK HERE FOR NOTES
Lesson 4 – Firewalls-Designing and choosing
6 Topics
  • Introduction to Firewall: Types and their working, Design Principles and Limitations
  • Choosing a Firewall: the Most Important Features and Types You Need to Know
  • Important Features to Consider When Choosing a Firewall
  • Size and Scope Considerations When Choosing a Firewall
  • The 3 Types of Firewall to Choose From
  • Choosing a Firewall that Delivers Everything You Need
Lesson 5 – Firewalls-Deploying and operating
2 Topics
  • Deploying Cisco ASA and Other Firewalls for Network Engineers (Preview)
  • CLICK HERE FOR NOTES
Lesson 6 – Intrusion Detection systems (IDS)
2 Topics
  • Intrusion Detection and Prevention Systems (IDS/ IPS) | Security Basics
  • Intrusion Detection System (IDS)
Lesson 7 – Intrusion Detection and Incident Response
10 Topics
  • Incident Response Process - CompTIA Security+ SY0-501 - 5.4
  • Overview
  • Response Types
  • The Incident Response Process
  • Responding to an IDS or IPS Incident
  • IDS and IPS Incident Response Phases
  • Forensics
  • Standard of Due Care & Public Relations
  • Rules of Evidence
  • Summary
Lesson 8 – Virtual Private Network (VPN) Concepts
5 Topics
  • What is a VPN? - Gary explains
  • Virtual Private Network (VPN) | An Introduction
  • Lets understand VPN by an example:
  • VPN is well exploited all across the globe
  • VPN and its legality
Lesson 9 – VPN Implementation
1 Topic
  • Lesson content is empty.

Data Security Concepts ASSESSMENT

Data Security Concepts Finals Assessment
1 Quiz
  • Data Security Concepts Finals Assessment

Ratings and Reviews

4.7
Avg. Rating
23 Ratings
5
17
4
6
3
0
2
0
1
0
What's your experience? We'd love to know!
Login to Review
Zafiel Francis
Posted 1 month ago
Easy Course

informative Course

×
Preview Image
Helpful?
Kalique Bennett
Posted 3 months ago
Great course

This course is very informative and it teaches the importance of data security

×
Preview Image
Helpful?
Zahara James
Posted 3 months ago
Excellent Course

This course has peaked my interest in the field of data security with it’s informative lessons and quality videos. It helps me a lot with reviewing cause not only does it has the information laid out right in front of me, it provides other aid of teaching for example informative videos. Overall this is a great course!

×
Preview Image
Helpful?
Asaskia Hendrickson
Posted 3 months ago
Learning made easy

This course has greatly increased my interest in this field of study. I was impressed with how much information was provided and it made learning quite enjoyable.

×
Preview Image
Helpful?
J'Quanne Bussue
Posted 3 months ago
Easy to understand

I found that the videos were really informative and really made us grasp a deep understanding of what we are learning

×
Preview Image
Helpful?
Khalique Martin
Posted 3 months ago
Great course

very information in terms of keeping data safe in age of advanced technology

×
Preview Image
Helpful?
Carlyon Jones-Armour
Posted 3 months ago
Informative and Easy to understand

What I liked, compressible videos, the information is displayed in point format allowing precise data and a lack of filler words, simple topic structure, right to the point, and good examples. What I disliked, some subtopics were too simplified and required more depth.

×
Preview Image
Helpful?
Drucianna Francis
Posted 3 months ago
Quite Informative

This course is very easy to maneuver and allows students to review and understand the information available on the course

×
Preview Image
Helpful?
Yohance Willett
Posted 3 months ago
Wonderful

This informative course provided all the factual information needed and was used daily. This course has numerous video presentations which are very engaging while providing useful information.

×
Preview Image
Helpful?
Aeja Clarke
Posted 3 months ago
Content Display

The way the content is displayed can be attractive yet still unattractive. Sometimes media can be animated in an interesting way and other times it can be very long videos. The content, however, is very informative.

×
Preview Image
Helpful?
Show more reviews
What's your experience? We'd love to know!
Login to Review

We at Skills are pleased to provide a place to learn at your own pace with updated and current content. 

  • About Us
  • Contact us
  • FAQ
  • Help Desk
  • LMS
  • Blog
  • Privacy Policy
  • Our Team
Copyright 2021 - All Rights Reserved | Designed by IITAE Ltd