GeneralSecurity NewsTraining SeriesVideo

Introduction To Cyber Security

ISAC Cambodia (InfoSec)

This Cyber Security training for beginners video covers all the basics that a beginner needs to know to get started with Cyber Security. It includes – what is Cyber Security, history of Cyber Security, why do we need Cyber Security, how Cyber Security works, who is a Cyber Security expert, courses, and certifications required.

You will get to know the types of hackers and the motives behind their attacks and understand how an organization works to secure their data from hackers. Finally, you will learn how to keep your system or device safe. Now, let’s get started with Cyber Security in detail.

Below are the topics we’ll be discussing in this video on Cyber Security training:
1. What is Cyber Security? – 1:48
2. Why Cyber Security? – 3:21
3. How does Cyber Security work? – 21:16
4. Who is a Cyber Security expert? – 26:49
5. Courses and certification required – 33:12

សម្រាប់អ្នកដែលចង់តាមដានព័ត៌មាននៅក្នុងស្មាតហ្វូន អាចធ្វើការទាញយក App នៅក្នុង  ​AppStore & PlayStore

ចូលរួមក្នុង Telegram channel: https://t.me/infosecisac សម្រាប់ទទួលបានព័ត៌មានចុងក្រោយស្តីពីសន្តិសុខអុិនធឺណិតទាំងក្នុង និងក្រៅប្រទេស ។ ចង់ផ្សព្វផ្សាយពាណិជ្ជកម្ម សូមទំនាក់ទំនង info@secudemy.com

Subscribe to our Telegram channel for the latest updates on the Cybersecurity Breaking News in both locally and internationally: https://t.me/infosecisac.

For advertising: info@secudemy.com or Phone: +855 69 690 280

Show More

Phannarith

Mr. OU Phannarith is one of the well-known cybersecurity experts in Cambodia and the region. He is the founder of the first leading information security website (www.secudemy.com) in Cambodia. He has been invited to present in global conferences, forums, and seminars and he was awarded in Information Security Leadership Achievements (ISLA) in 2016 by (ISC)2 and in December 2012 as one of the top 10 Chief Information Security Officers (CISO) in ASEAN by the International Data Group (IDG). Mr. OU has been the Professor specializing in Cybersecurity.

Related Articles

Back to top button