This course introduces the fundamentals of information security, focusing on how attackers exploit systems and the strategies used to defend against them. Students will learn about current security trends, hacking concepts, ethical hacking practices, and attack vectors. The course covers information security controls, the penetration testing process, and relevant laws and regulations. By the end, participants will gain a comprehensive understanding of how to protect systems from malicious threats.
Has discount |
![]() |
||
---|---|---|---|
Expiry period | Lifetime | ||
Made in | English | ||
Last updated at | Tue Nov 2024 | ||
Level |
|
||
Total lectures | 38 | ||
Total quizzes | 0 | ||
Total duration | 0 Hours | ||
Total enrolment |
![]() |
||
Number of reviews | 0 | ||
Avg rating |
|
||
Short description | This course introduces the fundamentals of information security, focusing on how attackers exploit systems and the strategies used to defend against them. Students will learn about current security trends, hacking concepts, ethical hacking practices, and attack vectors. The course covers information security controls, the penetration testing process, and relevant laws and regulations. By the end, participants will gain a comprehensive understanding of how to protect systems from malicious threats. | ||
Outcomes |
|
||
Requirements |
|