The information security course is good for readers who want to learn information security. This course discusses information security risk management, identification and authentication, access control and authorization, auditing and accountability, cryptography, laws, compliance and regulations, operations security, social engineering and phishing, network security, mobile devices security, security of embedded systems, application security, database security, operating systems security, business continuity and disaster recovery planning, etc.
9.1 How to prevent Social Engineering Attacks?
9.2 How to prevent phishing?
9.3 What is pretexting in cyber security? (video)
9.4 What is spear phishing? (video)
9.5 What is whale phishing or whaling attack? (video)
9.6 What are Business Email Compromise (BEC) scams? (video)
9.7 What is Open Source Intelligence (OSINT)? (video)
9.8 What is Human Intelligence (HUMINT)? (video)
All the courses are fully accessible to premium members.