The Absolute Beginners Guide to Information Security - Part 1 | Alexander Oni | Skillshare

Playback Speed

  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x

The Absolute Beginners Guide to Information Security - Part 1

teacher avatar Alexander Oni, Web Developer & Cyber Security Expert

Watch this class and thousands more

Get unlimited access to every class
Taught by industry leaders & working professionals
Topics include illustration, design, photography, and more

Watch this class and thousands more

Get unlimited access to every class
Taught by industry leaders & working professionals
Topics include illustration, design, photography, and more

Lessons in This Class

1 Lessons (5m)
    • 1. Factor Authentication Methods

  • --
  • Beginner level
  • Intermediate level
  • Advanced level
  • All levels

Community Generated

The level is determined by a majority opinion of students who have reviewed this class. The teacher's recommendation is shown until at least 5 student responses are collected.





About This Class

Have you ever wondered exactly how hackers 'hack'? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of information security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.

This is a course that is perfect as an introductory one for individuals and students who are interested in information security professionals. It is also ideal for students who just want to have a well rounded knowledge about the basic concepts used in the world of information security.

'An expert with great teaching style: provided clear explanations and concise definitions. Topics were reinforced and made tangible using graphics and real life (or movie) examples. The quizzes helped me retain and feel confident about the material.'  - E. Wolfe

"Great intro to information Security. I currently work in IT and I'm considering transitioning to InfoSec. I am even going to recommend this to my wife who works in IT management as it would be very useful in helping her understand the different concepts. The instructor is good. Speaks clearly and provides good examples." - Chris Loyola


This course is intended primarily for students who have little to no prior background or knowledge about the field of information security. 

By the end of this course, you would have gained a lot of knowledge and insights that can help to jump start your career as an information security professional. 

Meet Your Teacher

Teacher Profile Image

Alexander Oni

Web Developer & Cyber Security Expert


My passion is teaching people through online courses in a fun and entertaining manner.  I have been teaching online for about 3 years now and during this period, I have created over 25 different courses on different platforms including my own personal platform - The Web Monkey Academy.

What would you like to learn?

Would you like to learn how to build and manage your WordPress website? Would you like to learn advanced skills that will make you a true WordPress developer? Would you like to learn how you can establish a successful career as a web developer? Would you like to learn the basics of information and cyber security?

 If you want to do any of these things, just enroll in the course. I'm always improving my courses so that they stay up to dat... See full profile

Class Ratings

Expectations Met?
  • 0%
  • Yes
  • 0%
  • Somewhat
  • 0%
  • Not really
  • 0%
Reviews Archive

In October 2018, we updated our review system to improve the way we collect feedback. Below are the reviews written before that update.

Why Join Skillshare?

Take award-winning Skillshare Original Classes

Each class has short lessons, hands-on projects

Your membership supports Skillshare teachers

Learn From Anywhere

Take classes on the go with the Skillshare app. Stream or download to watch on the plane, the subway, or wherever you learn best.


1. Factor Authentication Methods: the black vote locked down. The only person allowed in the room has to pass through a series of security checks. William Down Low. The first is a voiceprint identification and a six digit access. This only gets him into the out of room. Next, he has to pass a retinal scan. And finally, the intrusion Countermeasures are only deactivated by a double electronic key card, which we won't have. So the clip you just watched us from the movie Mission Impossible, starring Tom Cruise and always saw there was an individual trying to gain access into a particular room and another to do so. He had to, first of all, go through multiple checkpoints. First of all, he had to do a voice scan, and then he had to provide a six digit access code. He then had to do a nice canon and finally had to use a key card in order to gain access into that particular room. Now we already know the voices scared, and the wetness can to be part of biometrics. But when you combine biometrics with all the things like a pass code and a key cut like we saw in deaths and then you have multi factor authentication methods on display. Now, the most popular form off the factor authentication methods is the two factor authentication. So basically, here a user provides to authentication factors to verify who they are Now. This off course obviously provides an additional layer off security. All forms off factor authentications, provide additional layers of security. Bet exactly what all these authentication factors well, just like we saw in that clip, we do have the knowledge factor, which is something the user nose like a password. And in that clip we saw the user tapping in a six digit code. So the knowledge factor could include things like passwords, user names, key phrases and so on and so forth. We also have the possession factor, something the user has, like a token or maybe even a mobile device. Now, in the clip, we saw that the user had a key card. And of course, we have the inheritance factor, something the user is biometrics. And of course, in the clip we did see the user providing or that individual provided his voice prints. And of course, his eyes can as well now from the clip, even though the individual went through four security checkpoints. In reality, he actually went through three authentication factors. Now, when I mean here is let's take, for example, with the two factor authentication years into factors from the same category would not constitute a two factor authentication. In this case right now, if you combine a using them and a password, even though those are sort off two different security points, you have to provide a user name yet provided password. They both still fall on that, the same category, which is the knowledge factor, and as a result, such would be the single process. Authentication are factor method now in the clip, even though the man did four things, two of them belonged to the same category, which was the inherits factor. Talking about the wetness can end the voice prints, so that was one factor. Then we had the knowledge factor where he had to use the provided the six digit code. And then finally we had the position factor because he had a key cut. So once again, using two factors from the same category would not constitute two separate factor authentication method. And, as I've said, Alia Factor authentication methods provide an additional layer off security. Authentication products, which are related to the position factor, would include things like tokens, smartcard smartphones and so on and so forth. Now over wall, specifically with the two factor authentication. It does improve security, but it's not foolproof because cards could be stolen. Fingerprints could even be lifted as well. And that is why three factor and multi factor authentication methods are for the improvements. That's why these are used just like we saw in that clip. Now we do have something called the multi factor authentication. In this case, this can include two more factors, like eight time and location factors. So in addition to the inheritance factor, the knowledge fractal and the position facto an individual could be required to be at a specific place at a specific time in a lot, again access to certain information. So that's it for the factor. Authentication methods. Thank you so much for watching. We'll see you in the next class