Published 2/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 1.29 GB | Duration: 2h 29m
Intermediate Cyber Security What you'll learn The basics or introduction to cyber security and its importance How to recognise the different types of cyber attacks and how to stay secure against them Key princliples of cyber security and the CIA Triad Best practices for protecting against cyber threats Network Security Concepts Web, Data, Password and Endpoint security Threats and Vulnerabilities How to respond to cyber incidents Career opportunities in cyber security Requirements Basic knowlegde about computers The motivation and willingness to learn about cyber security and its importance Familiarity with common IT concepts and teology Description The Intermediate Cyber Security course is designed to give students a thorough understanding of key concepts and best practices in cyber security. Cyber attacks, network security, web security, data security, password security, compliance and regulations, and careers and professional development are among the topics covered in the course.The course bs with an introduction to cyber security, which covers the fundamentals of the field, such as the different types of threats and vulnerabilities that organizations face, as well as the importance of developing a strong security posture. The course then delves into cyber attacks, which examine the various types of attacks used by cyber criminals, such as malware, phishing, and social eeering.Data Security delves into the various methods for securing data, such as encryption, access control, and data loss prevention (DLP) solutions. The Password Security section discusses best practices for password management and security, including password policies, multi-factor authentication, and password managers.The course's Compliance and Regulations section discusses the various regulatory frameworks and compliance requirements that organizations must follow, including HIPAA, GDPR, and PCI-DSS. Finally, the Careers and Professional Development section discusses the various cyber security career paths available, as well as the skills and certifications required to advance in the field.Overall, the Intermediate Cyber Security course provides learners with a thorough understanding of the key concepts and best practices related to cyber security, making it a must-take for anyone interested in a career in this rapidly growing field. Overview Section 1: Introduction Lecture 1 Welcome Lecture 2 Goals and Learning Objectives Section 2: Introduction to Cyber Security Lecture 3 What is cyber security and its importance Lecture 4 A brief history of cyber security Lecture 5 Key principles of cyber security (Confidenciality and Integrity) Pt1 Lecture 6 Key principles of cyber security (Availability and Non-Repudiation) Pt2 Lecture 7 Key principles of cyber security (Authorisation and Authentication) Pt3 Lecture 8 Key principles of cyber security (Privacy and Incident Responce) Pt4 Lecture 9 Understanding the cyber security landscape Lecture 10 Cyber security incident response Section 3: Cyber Attacks Lecture 11 Phishing Lecture 12 Malware Lecture 13 Dos and DDos Lecture 14 Ransomware Lecture 15 Advanced Persistent Threats Lecture 16 Social Eeering Lecture 17 IOT Attacks Lecture 18 Cloud Attacks Lecture 19 Man In The Middle Attacks Lecture 20 Password Attacks Lecture 21 Crypto-Jacking Lecture 22 Watering Hole Attack Lecture 23 Supply Chain Attack Lecture 24 Zero Day Attack Section 4: Network Security Lecture 25 Introduction to Networking Lecture 26 Network security technologies and architectures (Firewalls & Encryption) Pt1 Lecture 27 Network security technologies and architectures (IDPS & Network Snt) Pt2 Lecture 28 Network security technologies and architectures (VPN & Access Control) Pt3 Lecture 29 Network security technologies and architectures (Patch Management & SIEM) Pt4 Lecture 30 How to secure network infrastructure and devices and the best practices Section 5: Web Security Lecture 31 Introduction to web technologies Lecture 32 Web security threats and vulnerabilities - XSS Lecture 33 SQL Injection Lecture 34 Cross Site Request Forgery Lecture 35 Remote Code Execution Lecture 36 Buffer Overflow Lecture 37 Directory Transversal Lecture 38 Session Hijacking Lecture 39 Web security best practices and tools Lecture 40 Secure web development Section 6: Data Security Lecture 41 Introduction to data protection and privacy Lecture 42 Data Security threats and vulnerabilities Lecture 43 Best practices and tools in data security Section 7: Password Security Lecture 44 Password Management Lecture 45 Password security threats and vulnerabilities Section 8: Cyber security compliance and regulations Lecture 46 Introduction to cybersecurity compliance and regulation Lecture 47 Key cybersecurity frameworks and standards Lecture 48 Cybersecurity compliance and regulation best practices Lecture 49 Cybersecurity compliance and regulation challenges and solutions Section 9: Careers and Professional Developement in Cybersecurity Lecture 50 Cybersecurity job roles and skills Lecture 51 Cybersecurity certification and education Lecture 52 Cybersecurity professional development resources Section 10: Conclusion Lecture 53 Congratulations Practitioners who want to learn more about cyber security,IT professionals looking to specialize in cyber security,Web developers and programmers interested in learning secure web development practices,IT professionals responsible for data protection and privacy,Students interested in pursuing a career in cybersecurity,Mobile app developers interested in learning secure mobile app development practices HomePage:
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.