Introduction To Cybersecurity Basics, Risks And Controls
Focused View
5:36:08
11 View
1 - Understand the Objective of Security.mp4
07:23
2 - Information Security and Cybersecurity.mp4
04:51
3 - Security and Privacy.mp4
04:07
4 - What is Risk Management.mp4
14:12
5 - Risk Response Strategies.mp4
18:03
6 - Security Controls.mp4
22:38
7 - Examples for Security Controls.mp4
05:37
8 - Security Threats overview.mp4
16:20
9 - Malware.mp4
08:12
10 - Fileless Malware.mp4
06:03
11 - Endpoint Protection Platforms EPP.mp4
13:12
12 - Cyber Attacks.mp4
13:50
13 - What is AAA.mp4
06:57
14 - Network Attacks Layer 2 Attacks.mp4
03:04
15 - Explain Man in the Middle Attack.mp4
03:35
16 - Understand ARP Protocol and How it work.mp4
09:16
17 - VLAN and Segmentation.mp4
05:31
18 - Network Security Controls.mp4
17:45
19 - What is Application development.mp4
08:57
20 - Application Attacks.mp4
19:06
21 - Software development Security Best Practices.mp4
13:20
22 - Social Engineering.mp4
16:06
23 - Security Awareness Training.mp4
07:31
24 - Data Life Cycle.mp4
08:05
25 - Data Destruction and Secure Disposal.mp4
07:23
26 - What is Security Governance.mp4
06:36
27 - Data Roles.mp4
08:31
28 - RACI Matrix.mp4
06:48
29 - Metrics.mp4
16:01
30 - Security Frameworks and Standards.mp4
16:37
31 - Incident Management.mp4
07:53
32 - Patch Management.mp4
03:10
33 - Change Management.mp4
09:28
More details
User Reviews
Rating
average 0
Focused display
Category

Udemy
View courses UdemyStudents take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
- language english
- Training sessions 33
- duration 5:36:08
- Release Date 2024/02/02