Danni-Tech

Making the Complicated Simple

Section 1: General Security Concepts

Section 1.1 – Security Controls 

Security Controls (24:34) 

Security Controls are essential for protecting systems by detecting, preventing and responding to threats. In this video, you’ll explore different types of security controls and how they help safeguard your organization’s assets.

Section 1.2 – Security Concepts 

The CIA Triad (11:12) 

The CIA Triad represents the core principles of cybersecurity, focusing on protecting information through confidentiality, integrity, and availability. In this video you’ll learn how these principles work together to secure data and systems.

Non Repudiation (10:29) 

Non Repudiation is a key aspect of cybersecurity that ensures proof of authenticity and integrity. In this video you’ll learn how hashing and digital signatures work together to prevent disputes over data authenticity.

AAA (17:25)
 
Authentication, Authorization and Accounting play a crucial role in securing networks by verifying identities, granting appropriate access, and tracking user activities. In this video you’ll discover how AAA helps enforce security policies and maintain accountability.

Gap Analysis (16:25) 

Enhancing security requires identifying areas for improvement. In this video, you’ll explore how gap analysis helps assess your current security measures and uncover opportunities to better protect your network.

Zero Trust (18:00) 

Zero Trust is a modern day security approach that minimizes risk by requiring strict verification for every access request. In this video, you’ll learn key principles and best practices to help implement a Zero Trust model effectively.