Companies Home Search Profile

Cybersecurity Fundamentals - Become a Security Expert

Focused View

Emilio Aguero

5:54:18

62 View
  • 1. Introduction to Network Security.mp4
    03:57
  • 2.1 Networking Protocols and Standards.docx
  • 2. Networking Protocols and Standards.mp4
    04:59
  • 3.1 Network Security Devices.docx
  • 3. Network Security Devices (Firewalls, Intrusion Detection Systems, VPNs).mp4
    07:45
  • 1.1 Cybersecurity Threats and Attacks.docx
  • 1. Threat and Attack Types.mp4
    13:24
  • 2.1 Malware.docx
  • 2. Malware.mp4
    07:05
  • 3.1 Phishing.docx
  • 3. Phishing Attacks.mp4
    05:27
  • 4.1 Social engineering.docx
  • 4. Social Engineering.mp4
    09:47
  • 5.1 DDoS.docx
  • 5. DDoS.mp4
    05:23
  • 1.1 Software Updates.docx
  • 1. Software Updates.mp4
    10:05
  • 2.1 Passwords.docx
  • 2. Password Security.mp4
    14:25
  • 3. Dont Use These Passwords.mp4
    04:45
  • 4.1 MFA.docx
  • 4. Multi-Factor Authentication.mp4
    06:59
  • 5.1 Data Encryption.docx
  • 5. Data Encryption.mp4
    06:37
  • 6. Setting up Data Encryption on Windows and Mac.mp4
    06:45
  • 1.1 Firewalls.docx
  • 1.2 Introduction to Network Security.docx
  • 1.3 Securing Networks - White and Blacklisting.docx
  • 1. Network Security Top Tips.mp4
    10:23
  • 2.1 VPN Overview.docx
  • 2. Virtual Private Networks (VPN).mp4
    07:35
  • 3.1 IDS.docx
  • 3. Intrusion Detection Systems (IDS).mp4
    05:55
  • 1.1 How to Protect Your Systems and Data.docx
  • 1.2 Secure a Linux server.docx
  • 1.3 Secure a Windows server.docx
  • 1. Protect Your Device - Server Security.mp4
    11:17
  • 2. Protect Your Device - Desktop + Laptop Security.mp4
    09:51
  • 3. Protect Your Device - macOS Security.mp4
    11:54
  • 4. Protect Your Device - iPhone Security.mp4
    12:18
  • 5. 03 Protect Your Device - iPad Security.mp4
    14:11
  • 1.1 Best ways to stay safe online.docx
  • 1. Best Ways to Stay Safe Online.mp4
    08:06
  • 2.1 Web Security and Secure Web Browsing.docx
  • 2. Web Security and Secure Web Browsing.mp4
    03:20
  • 3.1 The Cloud - Pros and Cons.docx
  • 3.2 The Cloud - Security Top Tips.docx
  • 3. Cloud Security.mp4
    14:03
  • 1.1 Physical Security.docx
  • 1. Physical Security.mp4
    07:30
  • 1.1 Cybersecurity Governance Roles.docx
  • 1.2 Cybersecurity Governance.docx
  • 1. Cybersecurity Governance.mp4
    06:00
  • 2.1 Incident Response.docx
  • 2. Incident Response.mp4
    05:15
  • 3.1 Acceptable Use Policy.pdf
  • 3.2 Cybersecurity policies and compliance.docx
  • 3.3 Data Retention Policy.pdf
  • 3.4 Information Security Policy.pdf
  • 3.5 SOC 101.pdf
  • 3. Cybersecurity Policy and Compliance Requirements.mp4
    02:49
  • 4.1 Risk management and assessment.docx
  • 4. Risk Management and Assessment.mp4
    08:02
  • 5.1 IAM nad SIEM Implementation.docx
  • 5.2 IAM nad SIEM.docx
  • 5. IAM, Security Information and Event Mgmt.mp4
    07:30
  • 6.1 VAM Implementation.docx
  • 6.2 VAM Summary.docx
  • 6. Vulnerability Assessment and Management.mp4
    06:15
  • 1.1 Cybersecurity regulations and standards .docx
  • 1.2 ISO 27001.docx
  • 1. Cybersecurity Regulations and Standards.mp4
    13:42
  • 2.1 DRPs and BCPs.pdf
  • 2. Disaster Recovery and Business Continuity Planning.mp4
    24:18
  • 1.1 Cybersecurity Certs.docx
  • 1. Cybersecurity Certifications.mp4
    10:35
  • 2.1 Cybersecurity awareness and training 101.docx
  • 2. Cybersecurity Awareness and Training.mp4
    11:51
  • 3.1 Cybersecurity training Rollout Plan.docx
  • 3. Cybersecurity Training Implementation and Plan.mp4
    05:50
  • 1.1 Cybersecurity Audit.docx
  • 1. Security Audits.mp4
    06:34
  • 2.1 Penetration testing 101.docx
  • 2. Penetration Testing Fundamentals.mp4
    12:41
  • 3.1 Penetration Tester Engagement.docx
  • 3. Penetration Tester Engagement.mp4
    09:10
  • Description


    Get the skills, and expertise to become a Security Professional

    What You'll Learn?


    • You will gain a broad understanding of the cybersecurity landscape, including common terminology and concepts.
    • Threats and Attacks: You will learn about different types of threats and attacks, including social engineering, malware, phishing, and more.
    • Risk Management: You will learn how to identify, assess, and manage risks to keep your organization secure.
    • Network Security: You will learn how to secure networks, including firewalls, intrusion detection and prevention systems, and more.
    • Mobile Security: You will learn about mobile device security, including how to secure mobile applications and mobile device management.
    • Compliance and Regulations: You will learn about compliance and regulations, including GDPR, HIPAA, and other industry-specific regulations.

    Who is this for?


  • IT Professionals
  • Security People
  • Cybersecurity Engineers
  • System Administrators
  • IT Management
  • More details


    Description

    In today's digital world, cybersecurity is an essential aspect of our personal and professional lives. Cyberattacks have become increasingly frequent, sophisticated, and dangerous, and protecting against them requires a broad range of knowledge and skills.

    This Cybersecurity Fundamentals course is designed to provide you with the foundational knowledge and skills necessary to become a cybersecurity expert. Whether you are just starting in the field or looking to enhance your current skills, this course will give you a solid understanding of cybersecurity principles and best practices.

    Throughout the course, you will learn about the latest threats and attacks, including social engineering, phishing, malware, and more. You will learn about risk management, cryptography, network security, web application security, mobile security, incident response, compliance, and regulations, and ethical and professional standards.

    This course will equip you with the knowledge and skills you need to protect your organization's critical assets and respond to security incidents effectively. Additionally, it will prepare you to take on a role as a cybersecurity professional and help you to advance your career in the cybersecurity field.

    Join us on this journey to become a cybersecurity expert and learn how to keep our digital world safe and secure.


    We will cover the basics of cybersecurity, including the following:


    1. Introduction to Cybersecurity: You will gain a broad understanding of the cybersecurity landscape, including common terminology and concepts.

    2. Threats and Attacks: You will learn about different types of threats and attacks, including social engineering, malware, phishing, and more.

    3. Risk Management: You will learn how to identify, assess, and manage risks to keep your organization secure.

    4. Cryptography: You will learn about encryption, decryption

    5. Network Security: You will learn how to secure networks, including firewalls, intrusion detection and prevention systems, and more.

    6. Web Application Security: You will learn how to secure web applications, including common vulnerabilities and best practices.

    7. Mobile Security: You will learn about mobile device security, including how to secure mobile applications and mobile device management.

    8. Incident Response: You will learn about incident response, including how to detect, respond to, and recover from cybersecurity incidents.

    9. Compliance and Regulations: You will learn about compliance and regulations, including GDPR, HIPAA, and other industry-specific regulations.

    10. Ethics and Professionalism: You will learn about the ethical and professional standards expected of cybersecurity professionals, including codes of conduct and best practices.

    By the end of the course, you will have a solid understanding of cybersecurity fundamentals and be well on your way to becoming a cybersecurity expert. You will also have the knowledge and skills necessary to pursue a career in cybersecurity.

    Who this course is for:

    • IT Professionals
    • Security People
    • Cybersecurity Engineers
    • System Administrators
    • IT Management

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Emilio Aguero
    Emilio Aguero
    Instructor's Courses
    Emilio is an accomplished professional and leader with over 20 years of with experience in IT professional services, digital transformation, infrastructure and operations management. Emilio loves helping people learn and achieve their goals, providing them the skills and expertise to make their professional careers better and more rewarding.Areas of Expertise include -- Win Server, macOS + integration- Storage Architecture- Virtualisation, VMware- Cybersecurity Hardening- IT Governance- DR and Backup Design
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 40
    • duration 5:54:18
    • Release Date 2023/06/08

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness