Making Sense of Cybersecurity, Video Edition
Focused View
8:52:41
0 View
001. Chapter 1. Cybersecurity and hackers.mp4
06:25
002. Chapter 1. Why should you care about cybersecurity.mp4
01:23
003. Chapter 1. Who is the ideal reader for this book.mp4
00:51
004. Chapter 1. How does hacking and defending work.mp4
03:37
005. Chapter 1. What will you learn in this book.mp4
02:41
006. Chapter 1. What we won t cover.mp4
03:19
007. Chapter 1. What tools do you need to get started.mp4
00:22
008. Chapter 1. Summary.mp4
00:39
009. Chapter 2. Cybersecurity Everyone s problem.mp4
03:52
010. Chapter 2. Impacts of a security breach.mp4
04:46
011. Chapter 2. Objectives of a cybersecurity strategy.mp4
10:17
012. Chapter 2. Supporting our strategy Building a patching policy.mp4
08:57
013. Chapter 2. A culture of security.mp4
08:05
014. Chapter 2. How ready are you.mp4
03:36
015. Chapter 2. Summary.mp4
01:39
016. Part 1.mp4
01:37
017. Chapter 3. Understanding hackers.mp4
05:23
018. Chapter 3. Where do they come from.mp4
07:51
019. Chapter 3. What are hackers capable of.mp4
07:25
020. Chapter 3. Working through a real-life problem How do hackers think.mp4
08:16
021. Chapter 3. Summary.mp4
01:12
022. Chapter 4. External attacks.mp4
13:13
023. Chapter 4. Data injection attacks.mp4
13:52
024. Chapter 4. Malware Viruses, Trojans, and ransomware.mp4
10:18
025. Chapter 4. Dodgy Wi-Fi.mp4
06:28
026. Chapter 4. Mobile phones, SMS, and 5G.mp4
22:13
027. Chapter 4. Summary.mp4
01:56
028. Chapter 5. Tricking our way in Social engineering.mp4
18:01
029. Chapter 5. Malicious USB.mp4
08:09
030. Chapter 5. Targeted attacks Phishing.mp4
05:21
031. Chapter 5. Credential theft and passwords.mp4
11:32
032. Chapter 5. Building access cards.mp4
13:58
033. Chapter 5. Summary.mp4
02:17
034. Chapter 6. Internal attacks.mp4
06:44
035. Chapter 6. Gaining more control Privilege escalation.mp4
05:14
036. Chapter 6. Data theft.mp4
11:43
037. Chapter 6. Insider threats.mp4
10:07
038. Chapter 6. Blast radius Limiting the damage.mp4
09:33
039. Chapter 6. Building your castle Defense in depth.mp4
15:53
040. Chapter 6. Summary.mp4
02:29
041. Chapter 7. The Dark Web Where is stolen data traded.mp4
14:16
042. Chapter 7. How to access the Dark Web.mp4
07:50
043. Chapter 7. How is the Dark Web used.mp4
10:20
044. Chapter 7. Summary.mp4
01:00
045. Part 2.mp4
01:06
046. Chapter 8. Understanding risk.mp4
07:22
047. Chapter 8. How likely is a hack.mp4
08:20
048. Chapter 8. How bad will it be.mp4
16:49
049. Chapter 8. A simple model to measure risk.mp4
05:00
050. Chapter 8. How do I measure and communicate this.mp4
07:55
051. Chapter 8. Summary.mp4
00:52
052. Chapter 9. Testing your systems.mp4
07:05
053. Chapter 9. Vulnerability management.mp4
07:27
054. Chapter 9. Break your own stuff Penetration testing.mp4
19:23
055. Chapter 9. Getting expert help Bug bounties.mp4
05:46
056. Chapter 9. Breaking in Physical penetration testing.mp4
08:10
057. Chapter 9. Red teams and blue teams.mp4
12:10
058. Chapter 9. Summary.mp4
01:51
059. Chapter 10. Inside the security operations center.mp4
11:50
060. Chapter 10. Dealing with attacks Incident response.mp4
12:00
061. Chapter 10. Keeping track of everything Security and Information Event Management.mp4
11:31
062. Chapter 10. Gaining intelligence Data feeds.mp4
05:00
063. Chapter 10. Summary.mp4
00:52
064. Chapter 11. Protecting the people.mp4
06:57
065. Chapter 11. MFA.mp4
08:40
066. Chapter 11. Protecting from ransomware.mp4
05:15
067. Chapter 11. Education and support.mp4
04:38
068. Chapter 11. Summary.mp4
01:12
069. Chapter 12. After the hack.mp4
13:18
070. Chapter 12. Where to get help.mp4
18:13
071. Chapter 12. What to do next.mp4
02:35
072. Chapter 12. Lessons learned.mp4
05:54
073. Chapter 12. Summary.mp4
00:50
More details
User Reviews
Rating
average 0
Focused display
Category

Udemy
View courses UdemyStudents take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
- language english
- Training sessions 73
- duration 8:52:41
- Release Date 2025/03/06