Companies Home Search Profile

A Guide to Cybersecurity for Absolute Beginners

Focused View

5:49:58

5 View
  • 1. Course Introduction and Objectives.mp4
    02:52
  • 2. Understand the Objective of Security.mp4
    05:23
  • 3. Information Security and Cybersecurity.mp4
    06:43
  • 4. Security and Privacy.mp4
    03:43
  • 5. Security Program as a corner stone.mp4
    13:36
  • 6. Security Standards and Frameworks.mp4
    15:32
  • 7. Privacy Regulations.mp4
    10:30
  • 8. Why Security Management is important for the Business.mp4
    09:28
  • 9. What is the Role of Governance, Risk and Compliance.mp4
    04:03
  • 1. The Threat Landscape.mp4
    03:09
  • 2. Threat Actors.mp4
    09:10
  • 3. Security Threats - Malware.mp4
    13:40
  • 4. Fileless Malware and how it is severe.mp4
    05:40
  • 5. Endpoint Protection Platforms - EPP as a Security Measure.mp4
    13:12
  • 6. An overview about key Cyber Attacks.mp4
    13:50
  • 7. Web Application Attacks.mp4
    12:15
  • 8. Social Engineering and attacking the Human factor.mp4
    16:06
  • 9. How Organizations counter the social engineering.mp4
    07:31
  • 10. What is the Security Controls.mp4
    22:38
  • 11. Examples for Security Controls.mp4
    05:37
  • 12. How to select the proper Security Control.mp4
    07:30
  • 13. What is Risk Management in Cyber Security.mp4
    14:12
  • 14. Risk Response Strategies.mp4
    18:03
  • 1. Network Attacks - Layer 2 Attacks.mp4
    03:04
  • 2. Explain Man in the Middle Attack.mp4
    03:35
  • 3. Understand ARP Protocol and How it work.mp4
    09:15
  • 4. VLAN and Segmentation.mp4
    05:31
  • 5. Network Security Controls.mp4
    17:45
  • 6. What is Application development.mp4
    08:57
  • 7. Application Attacks.mp4
    19:06
  • 8. Software development Security Best Practices.mp4
    13:20
  • 1. Data Life Cycle.mp4
    08:05
  • 2. Data Destruction and Secure Disposal.mp4
    07:22
  • 3. Data Security Controls.mp4
    11:04
  • 4. Roles in Data and Assets management.mp4
    08:31
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 35
    • duration 5:49:58
    • English subtitles has
    • Release Date 2024/02/10

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness