->

The Cyber Security Series Intermediate Cyber Security

Published 2/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 1.29 GB | Duration: 2h 29m


 

Intermediate Cyber Security

What you'll learn

The basics or introduction to cyber security and its importance

How to recognise the different types of cyber attacks and how to stay secure against them

Key princliples of cyber security and the CIA Triad

Best practices for protecting against cyber threats

Network Security Concepts

Web, Data, Password and Endpoint security Threats and Vulnerabilities

How to respond to cyber incidents

Career opportunities in cyber security

Requirements

Basic knowlegde about computers

The motivation and willingness to learn about cyber security and its importance

Familiarity with common IT concepts and teology

Description

The Intermediate Cyber Security course is designed to give students a thorough understanding of key concepts and best practices in cyber security. Cyber attacks, network security, web security, data security, password security, compliance and regulations, and careers and professional development are among the topics covered in the course.The course bs with an introduction to cyber security, which covers the fundamentals of the field, such as the different types of threats and vulnerabilities that organizations face, as well as the importance of developing a strong security posture. The course then delves into cyber attacks, which examine the various types of attacks used by cyber criminals, such as malware, phishing, and social eeering.Data Security delves into the various methods for securing data, such as encryption, access control, and data loss prevention (DLP) solutions. The Password Security section discusses best practices for password management and security, including password policies, multi-factor authentication, and password managers.The course's Compliance and Regulations section discusses the various regulatory frameworks and compliance requirements that organizations must follow, including HIPAA, GDPR, and PCI-DSS. Finally, the Careers and Professional Development section discusses the various cyber security career paths available, as well as the skills and certifications required to advance in the field.Overall, the Intermediate Cyber Security course provides learners with a thorough understanding of the key concepts and best practices related to cyber security, making it a must-take for anyone interested in a career in this rapidly growing field.

Overview

Section 1: Introduction

Lecture 1 Welcome

Lecture 2 Goals and Learning Objectives

Section 2: Introduction to Cyber Security

Lecture 3 What is cyber security and its importance

Lecture 4 A brief history of cyber security

Lecture 5 Key principles of cyber security (Confidenciality and Integrity) Pt1

Lecture 6 Key principles of cyber security (Availability and Non-Repudiation) Pt2

Lecture 7 Key principles of cyber security (Authorisation and Authentication) Pt3

Lecture 8 Key principles of cyber security (Privacy and Incident Responce) Pt4

Lecture 9 Understanding the cyber security landscape

Lecture 10 Cyber security incident response

Section 3: Cyber Attacks

Lecture 11 Phishing

Lecture 12 Malware

Lecture 13 Dos and DDos

Lecture 14 Ransomware

Lecture 15 Advanced Persistent Threats

Lecture 16 Social Eeering

Lecture 17 IOT Attacks

Lecture 18 Cloud Attacks

Lecture 19 Man In The Middle Attacks

Lecture 20 Password Attacks

Lecture 21 Crypto-Jacking

Lecture 22 Watering Hole Attack

Lecture 23 Supply Chain Attack

Lecture 24 Zero Day Attack

Section 4: Network Security

Lecture 25 Introduction to Networking

Lecture 26 Network security technologies and architectures (Firewalls & Encryption) Pt1

Lecture 27 Network security technologies and architectures (IDPS & Network Snt) Pt2

Lecture 28 Network security technologies and architectures (VPN & Access Control) Pt3

Lecture 29 Network security technologies and architectures (Patch Management & SIEM) Pt4

Lecture 30 How to secure network infrastructure and devices and the best practices

Section 5: Web Security

Lecture 31 Introduction to web technologies

Lecture 32 Web security threats and vulnerabilities - XSS

Lecture 33 SQL Injection

Lecture 34 Cross Site Request Forgery

Lecture 35 Remote Code Execution

Lecture 36 Buffer Overflow

Lecture 37 Directory Transversal

Lecture 38 Session Hijacking

Lecture 39 Web security best practices and tools

Lecture 40 Secure web development

Section 6: Data Security

Lecture 41 Introduction to data protection and privacy

Lecture 42 Data Security threats and vulnerabilities

Lecture 43 Best practices and tools in data security

Section 7: Password Security

Lecture 44 Password Management

Lecture 45 Password security threats and vulnerabilities

Section 8: Cyber security compliance and regulations

Lecture 46 Introduction to cybersecurity compliance and regulation

Lecture 47 Key cybersecurity frameworks and standards

Lecture 48 Cybersecurity compliance and regulation best practices

Lecture 49 Cybersecurity compliance and regulation challenges and solutions

Section 9: Careers and Professional Developement in Cybersecurity

Lecture 50 Cybersecurity job roles and skills

Lecture 51 Cybersecurity certification and education

Lecture 52 Cybersecurity professional development resources

Section 10: Conclusion

Lecture 53 Congratulations

Practitioners who want to learn more about cyber security,IT professionals looking to specialize in cyber security,Web developers and programmers interested in learning secure web development practices,IT professionals responsible for data protection and privacy,Students interested in pursuing a career in cybersecurity,Mobile app developers interested in learning secure mobile app development practices

HomePage:

https://www.udemy.com/course/the-cyber-security-series-intermediate-cyber-security/

 

 

 


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Themelli   |  

Information
Members of Guests cannot leave comments.




rss