Autoplay
Autocomplete
Previous Lesson
Complete and Continue
GIAC Information Security Fundamentals (GISF)
Training Overview
Description of Training
Video Overview (2:16)
Introduction
Introduction (2:16)
IS Certifications (6:27)
GISF Certification (6:47)
Cyber Security Terminology
Before you start (3:03)
How it work (4:34)
CIA Triad (6:47)
Important Definition (4:07)
Information Security Jobs (8:09)
Due Care and Due Diligence (3:53)
Exam Question Sample (3:09)
Important Document (2:36)
Security Documents (15:33)
Security Document Types (5:16)
Risk Management - Part 1 (7:50)
Policy Sample (3:13)
Risk Management - Part 2 (11:08)
Asset Evaluation (18:32)
Exam Sample Question (4:02)
Access Control (2:38)
Authorization (19:22)
Authentication (18:49)
Single Sign on SSO (13:09)
Incident Management
Section 2 Introduction (6:55)
Preparation of People and Policy (7:32)
Team building and Managing (6:26)
Where Does Identification Occur (6:27)
What to Check (7:05)
Deployment and Categorization (4:45)
Short-term and Long-term Actions (5:25)
Restore and Improving Defenses (4:49)
Validation and Monitoring (5:42)
Meet, Fix, and Share (5:29)
Network Security
The OSI Model (16:37)
Network Architecture Components (17:00)
Firewall (10:36)
Network Types and Topolgies (8:34)
Remote Access Technology (18:25)
Wireless Network (7:12)
Network Attacks (8:53)
Authorization
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock