Information Security 101
Are you just starting out with IT Security, trying to become familiar with some of the core terms? Well if the concepts and terminology surrounding security are “alien” to you this video may help provide some of the information you need.
This material is not a replacement for a full Information Security course and is provided as a value add to students that have an IT background but may not be familiar with IT Security.
This material is a recommended pre-requisite for our Security Analysis courses for both AlienVault® USM Anywhere™, USM Central and AlienVault® USM Appliance™. If you are interested in attending these or any of our other training courses please visit https://www.alienvault.com/training to find out more. If you have any questions please open a chat session with Customer Care at https://success.alienvault.com
In this video, we will:
- Look at the reasons attackers attempt to exploit networks and systems.
- Review some of the most common system vulnerabilities.
- Examine the methods by which attacks are delivered.
- Consider attack types and how they are implemented at a high level.
A companion Student Guide (PDF) is also available to download here.