1 00:00:03,880 --> 00:00:07,290 Let us continue exploring the fundamentals of cyber security. 2 00:00:07,630 --> 00:00:13,150 In this video, we are going to discuss various security organizations around the world. 3 00:00:14,110 --> 00:00:23,740 The first is woman in cybersecurity, it is WIC versus woman in cyber security, the community of engagement, 4 00:00:24,010 --> 00:00:27,160 encouragement and support for women in cybersecurity. 5 00:00:28,370 --> 00:00:34,670 Woman in Cyber Security is the premier organization with national reach dedicated to bringing together 6 00:00:34,670 --> 00:00:41,750 women in cybersecurity for academic research and industry purpose to share knowledge, experience, 7 00:00:41,870 --> 00:00:49,820 networking and mentoring established in 2012 by Dr. Amber Savage of Themis University. 8 00:00:51,200 --> 00:00:58,510 WIC Vice is a nonprofit organization offering many membership, sponsorship and collaboration benefits. 9 00:01:00,030 --> 00:01:06,090 Regular webinars are hosted by WIC vouchers to encourage women join the field of cybersecurity. 10 00:01:08,290 --> 00:01:14,590 Companies need to have access to pipeline of qualified candidates for cybersecurity jobs, both senior 11 00:01:14,590 --> 00:01:19,450 level and psytrance in the field who can go into internships and apprenticeships. 12 00:01:20,170 --> 00:01:25,900 It also makes perfect sense to hire women into these jobs because it has been proven that the workforce 13 00:01:25,900 --> 00:01:30,700 diversity improves her activity and also enhances external perceptions. 14 00:01:31,930 --> 00:01:38,560 Promoting women into senior leadership positions also adds tremendous value to companies positioning 15 00:01:38,710 --> 00:01:40,810 the stakeholders and customers. 16 00:01:40,960 --> 00:01:45,580 Sense stands for a sysadmin audit network and security. 17 00:01:46,570 --> 00:01:54,460 The Sans Institute, officially, the Institute of Advanced Technologies, is a private US based private 18 00:01:54,460 --> 00:02:01,420 company founded in 1989 that specializes in information security, cybersecurity training and selling 19 00:02:01,420 --> 00:02:02,200 certificates. 20 00:02:03,220 --> 00:02:09,360 Sands is the most trusted and by far the largest source for information security training in the world. 21 00:02:11,010 --> 00:02:16,440 Science courses are developed in such an organized way that the user will learn the letters and have 22 00:02:16,440 --> 00:02:20,580 all the basics, which are very much tough and strong for learning truly. 23 00:02:21,790 --> 00:02:27,370 So the learner will be able to pass the exam and having sensor difficulty will help you to crack the 24 00:02:27,370 --> 00:02:32,110 60 person interviews and it is 40 percent would be based on the job profile. 25 00:02:33,340 --> 00:02:39,640 Though it's pretty costly and the money can be invested in self-learning and there are few online videos 26 00:02:39,640 --> 00:02:42,270 and websites which will give you much information. 27 00:02:43,960 --> 00:02:46,960 SANZEL, difficult have a great value in the current market. 28 00:02:47,350 --> 00:02:54,940 Next is the OS, the Open Web Application Security Project is a nonprofit foundation that works to improve 29 00:02:54,940 --> 00:02:56,380 the security of software. 30 00:02:57,640 --> 00:03:04,990 Boabs Foundation is the source for developers and technologists to secure the Web, one of the obscure 31 00:03:04,990 --> 00:03:11,350 principles that all of their material be freely available and easily accessible on their website, making 32 00:03:11,350 --> 00:03:17,680 it possible for anyone to improve their own Web application security or stop them when their abilities 33 00:03:17,680 --> 00:03:20,530 are in broken authentication. 34 00:03:20,860 --> 00:03:29,170 Since Julita Exposure XML external entities, broken access control, security, misconfiguration, 35 00:03:29,620 --> 00:03:37,870 cross site scripting, insecure digitalisation, using components with non-malignant abilities, insufficient 36 00:03:37,870 --> 00:03:39,280 logging and monitoring. 37 00:03:39,550 --> 00:03:46,030 ISIS is the community of choice for international cybersecurity professionals dedicated to advancing 38 00:03:46,030 --> 00:03:52,090 individual growth, managing technology risk and protecting critical information and infrastructure. 39 00:03:52,990 --> 00:03:58,930 The Information Systems Security Association is a not for profit international organization. 40 00:04:00,480 --> 00:04:06,390 It provides education forums, publications and peer interaction opportunities that enhance the knowledge, 41 00:04:06,600 --> 00:04:09,240 skill and professional growth of its members. 42 00:04:10,130 --> 00:04:15,830 The core purpose of the firm is to provide a secure digital world for every individual should think 43 00:04:15,870 --> 00:04:18,810 not twice initiating an online transaction. 44 00:04:20,370 --> 00:04:27,730 Various international meetings and conferences organized by a forum of incident response and security 45 00:04:27,740 --> 00:04:32,580 teams and is first is the global forum established in 1990. 46 00:04:34,210 --> 00:04:40,320 When first was founded, its members have resulted to almost continuous stream of security related attacks, 47 00:04:40,450 --> 00:04:46,540 incidents including handling thousands of security vulnerabilities, affecting nearly all of the millions 48 00:04:46,540 --> 00:04:52,210 of computer systems and networks throughout the world connected by the ever growing Internet. 49 00:04:53,490 --> 00:04:59,340 First brings together a wide variety of security and incident response teams, including especially 50 00:04:59,340 --> 00:05:03,850 product security teams from government, commercial and academic sectors. 51 00:05:04,200 --> 00:05:07,280 Let us have a quick recap of what we learned in this video. 52 00:05:08,360 --> 00:05:14,090 We learned about different security organizations in the world, like women in cyber security sense 53 00:05:14,480 --> 00:05:22,400 or weps see, and first in the next lecture, we will dive deep into cyber security with security architects 54 00:05:22,400 --> 00:05:23,900 view on cyber security.