1 00:00:01,790 --> 00:00:06,830 All right, you're doing a great job by learning and coming to this point of the course. 2 00:00:07,160 --> 00:00:14,270 So now let us have a look at the different organizations which are in the security industry and providing 3 00:00:14,480 --> 00:00:19,140 services to the world by mitigating against the different cyber attacks. 4 00:00:19,520 --> 00:00:24,290 So the first thing that we're going to talk about is women in cybersecurity. 5 00:00:24,290 --> 00:00:33,590 So Women in Cybersecurity is an organization which which was established by Dr. Amerine Saraj of Tennessee 6 00:00:33,590 --> 00:00:41,480 Tech University through a National Foundation grant with the collaboration of all the women, male allies 7 00:00:41,480 --> 00:00:49,100 and advocates with a strong mission to introduce the women of the world in the field of cybersecurity. 8 00:00:50,300 --> 00:00:58,640 So w I see why this is an organization specially designed for women, where recruitment, retention 9 00:00:58,640 --> 00:01:02,720 and advancement of women in cybersecurity happens. 10 00:01:04,880 --> 00:01:12,110 The next is the SANS Institute, which stands for SysAdmin Audit Network Security, which was launched 11 00:01:12,110 --> 00:01:17,870 in 1989 as a cooperative for information security thought leadership. 12 00:01:18,200 --> 00:01:25,340 So it is Sande's ongoing mission to empower cybersecurity professionals with the practical skills and 13 00:01:25,340 --> 00:01:29,110 the knowledge they need to make our world a safer place. 14 00:01:29,600 --> 00:01:33,260 So we you know, Sande's has their own certifications. 15 00:01:33,260 --> 00:01:39,620 They have their own scholarship's they have their own degree programs and even various certifications 16 00:01:39,890 --> 00:01:44,390 and resources to meet the needs of every cyber professionals. 17 00:01:46,220 --> 00:01:52,700 So the instructors will you will find on signs that highly qualified professionals, it's not like anyone 18 00:01:52,700 --> 00:01:58,610 can become an instructor it when it comes to science, but they are really qualified professionals. 19 00:01:59,020 --> 00:02:00,440 Next is UPS. 20 00:02:02,080 --> 00:02:09,550 The open Web Application Security Project, All Apps is a nonprofit foundation that works to improve 21 00:02:09,550 --> 00:02:16,090 the security of software, not through community led open source software projects, hundreds of local 22 00:02:16,090 --> 00:02:17,310 chapters worldwide. 23 00:02:17,440 --> 00:02:23,440 There are tens of thousands of members leading the educational and training conferences from all apps 24 00:02:24,100 --> 00:02:31,690 or apps is mainly into the Web domain, which provides the tools and resources community and networking 25 00:02:31,690 --> 00:02:37,180 and education and training of all the things which come on daddy web platform. 26 00:02:38,250 --> 00:02:47,040 Next is Issa, that is Information Systems Security Association, which is also an institute which deals 27 00:02:47,640 --> 00:02:49,530 with information security. 28 00:02:49,560 --> 00:02:55,950 And, you know, there is a college of information security and it also provides information security 29 00:02:56,190 --> 00:03:00,150 resources and then is forced, that is. 30 00:03:01,590 --> 00:03:09,120 First stands for the Forum of Incident Response and Security Teams, which is a premier organization 31 00:03:09,120 --> 00:03:16,680 and recognize global leader in information security incident response, the membership enforced enables 32 00:03:16,680 --> 00:03:23,490 incidents response teams to perform more effectively and respond to security incidents following their 33 00:03:23,490 --> 00:03:24,300 own framework. 34 00:03:25,710 --> 00:03:31,230 Now, these were the organizations that work for security, and now these are the organizations that 35 00:03:31,230 --> 00:03:34,720 are very renowned for security education. 36 00:03:35,040 --> 00:03:42,230 The first is I.C.C., which stands for Information Systems Audit and Control Association. 37 00:03:42,750 --> 00:03:51,150 I see his organization, which provides quality educational trainings to cybersecurity and information 38 00:03:51,150 --> 00:03:57,060 security professionals who want to excel in the field of audits and controls. 39 00:03:58,200 --> 00:04:07,650 So if you if you navigate into many job profiles, certifications from I as a senior at a great value 40 00:04:07,650 --> 00:04:13,540 and to be really honest with you, these certifications have more value than your actual degrees. 41 00:04:13,840 --> 00:04:18,870 Again, these certifications are very costly and very hard to crack. 42 00:04:19,260 --> 00:04:25,710 So, for example, if you want to crack the SISA certification that is certified information systems 43 00:04:25,710 --> 00:04:34,120 Orito, you must study for at least five to six months properly before you can crack and pass this exam. 44 00:04:35,430 --> 00:04:44,460 The next is ISC Square, which stands for International Information Systems Security Certification Consortium, 45 00:04:45,060 --> 00:04:52,020 which is again a non-profit organization, which specialization is training and certifications for cybersecurity 46 00:04:52,020 --> 00:04:59,790 professionals that rely on the certification is S.I SSP, that is Certified Information Systems Security 47 00:04:59,790 --> 00:05:09,660 Professional, which is very renowned, it's extremely renowned and ISC Square has almost more than 48 00:05:09,960 --> 00:05:15,000 one hundred and fifty thousand members globally. 49 00:05:16,110 --> 00:05:18,580 Next is the council, again is the council. 50 00:05:18,580 --> 00:05:24,000 It is an organization which provides training related to the hacking area. 51 00:05:24,000 --> 00:05:32,580 It provides in Hands-On on hacking practicals like C certification, then e c as a that is easy council 52 00:05:32,580 --> 00:05:37,410 certified security analyst certification, hacking, forensic investigation. 53 00:05:37,410 --> 00:05:46,320 So it's it's all related to the hacking part of it as the ISC and I as C Square are more of a management 54 00:05:46,320 --> 00:05:46,650 site. 55 00:05:47,910 --> 00:05:54,450 Again, Comedia Comedia is a very good training organization which provides certifications right. 56 00:05:54,450 --> 00:06:02,180 From basics of computers to the networks to the security, then the core security and bank testing. 57 00:06:02,190 --> 00:06:06,840 So it's a great certification provider when it comes to information security. 58 00:06:07,110 --> 00:06:13,740 And I recommend many students to check out their network plus and security plus certifications. 59 00:06:14,520 --> 00:06:16,650 And the last one is IAP. 60 00:06:16,650 --> 00:06:20,490 That is International Association of Privacy Professionals. 61 00:06:21,120 --> 00:06:28,890 Again, I ehp comes under the management side domain, that is governance and compliance or data privacy. 62 00:06:29,790 --> 00:06:38,330 And these two you see council and committee are more into the hands on practical things of security. 63 00:06:38,610 --> 00:06:41,430 So this one, this one and this one. 64 00:06:41,970 --> 00:06:49,560 If you go and check any profile on LinkedIn of a security professional having a minimum of five years 65 00:06:49,560 --> 00:06:56,000 of experience, you will find certification from each of these certification bodies. 66 00:06:56,520 --> 00:07:02,220 So what I would suggest is after taking this course, you should definitely prepare for the council's 67 00:07:02,220 --> 00:07:07,350 CEO certification and then you should go for Kompas security. 68 00:07:07,350 --> 00:07:10,170 Plus, I'm not endorsing anyone. 69 00:07:10,200 --> 00:07:13,410 This is not a paid partnership or kind of video thing. 70 00:07:13,410 --> 00:07:16,730 I'm just telling you, for the sake of your career. 71 00:07:16,740 --> 00:07:22,080 OK, so this was all for this lecture that we talked about. 72 00:07:22,080 --> 00:07:29,490 The different organizations when it came to information security in the next lecture will have a brand 73 00:07:29,490 --> 00:07:30,450 new section. 74 00:07:30,450 --> 00:07:31,980 Well, can you guess? 75 00:07:32,710 --> 00:07:38,100 OK, hacking, malware, cyberattacks. 76 00:07:38,100 --> 00:07:38,610 Yes. 77 00:07:39,040 --> 00:07:42,120 We are going to see the different actors in cybersecurity. 78 00:07:42,510 --> 00:07:47,820 These are not the actors of Hollywood or Bollywood, but these are the actors of cybersecurity. 79 00:07:48,630 --> 00:07:54,420 Well, forgive me for lame jokes, but on a serious note, next section is going to be really very important. 80 00:07:54,420 --> 00:07:57,990 I want your eyes and ears open and your mind as well. 81 00:07:58,710 --> 00:07:59,250 Great. 82 00:07:59,670 --> 00:08:01,230 Keep the momentum going. 83 00:08:01,260 --> 00:08:03,060 I will see you in the next.