Companies Home Search Profile

Making Sense of Cybersecurity, Video Edition

Focused View

8:52:41

0 View
  • 001. Chapter 1. Cybersecurity and hackers.mp4
    06:25
  • 002. Chapter 1. Why should you care about cybersecurity.mp4
    01:23
  • 003. Chapter 1. Who is the ideal reader for this book.mp4
    00:51
  • 004. Chapter 1. How does hacking and defending work.mp4
    03:37
  • 005. Chapter 1. What will you learn in this book.mp4
    02:41
  • 006. Chapter 1. What we won t cover.mp4
    03:19
  • 007. Chapter 1. What tools do you need to get started.mp4
    00:22
  • 008. Chapter 1. Summary.mp4
    00:39
  • 009. Chapter 2. Cybersecurity Everyone s problem.mp4
    03:52
  • 010. Chapter 2. Impacts of a security breach.mp4
    04:46
  • 011. Chapter 2. Objectives of a cybersecurity strategy.mp4
    10:17
  • 012. Chapter 2. Supporting our strategy Building a patching policy.mp4
    08:57
  • 013. Chapter 2. A culture of security.mp4
    08:05
  • 014. Chapter 2. How ready are you.mp4
    03:36
  • 015. Chapter 2. Summary.mp4
    01:39
  • 016. Part 1.mp4
    01:37
  • 017. Chapter 3. Understanding hackers.mp4
    05:23
  • 018. Chapter 3. Where do they come from.mp4
    07:51
  • 019. Chapter 3. What are hackers capable of.mp4
    07:25
  • 020. Chapter 3. Working through a real-life problem How do hackers think.mp4
    08:16
  • 021. Chapter 3. Summary.mp4
    01:12
  • 022. Chapter 4. External attacks.mp4
    13:13
  • 023. Chapter 4. Data injection attacks.mp4
    13:52
  • 024. Chapter 4. Malware Viruses, Trojans, and ransomware.mp4
    10:18
  • 025. Chapter 4. Dodgy Wi-Fi.mp4
    06:28
  • 026. Chapter 4. Mobile phones, SMS, and 5G.mp4
    22:13
  • 027. Chapter 4. Summary.mp4
    01:56
  • 028. Chapter 5. Tricking our way in Social engineering.mp4
    18:01
  • 029. Chapter 5. Malicious USB.mp4
    08:09
  • 030. Chapter 5. Targeted attacks Phishing.mp4
    05:21
  • 031. Chapter 5. Credential theft and passwords.mp4
    11:32
  • 032. Chapter 5. Building access cards.mp4
    13:58
  • 033. Chapter 5. Summary.mp4
    02:17
  • 034. Chapter 6. Internal attacks.mp4
    06:44
  • 035. Chapter 6. Gaining more control Privilege escalation.mp4
    05:14
  • 036. Chapter 6. Data theft.mp4
    11:43
  • 037. Chapter 6. Insider threats.mp4
    10:07
  • 038. Chapter 6. Blast radius Limiting the damage.mp4
    09:33
  • 039. Chapter 6. Building your castle Defense in depth.mp4
    15:53
  • 040. Chapter 6. Summary.mp4
    02:29
  • 041. Chapter 7. The Dark Web Where is stolen data traded.mp4
    14:16
  • 042. Chapter 7. How to access the Dark Web.mp4
    07:50
  • 043. Chapter 7. How is the Dark Web used.mp4
    10:20
  • 044. Chapter 7. Summary.mp4
    01:00
  • 045. Part 2.mp4
    01:06
  • 046. Chapter 8. Understanding risk.mp4
    07:22
  • 047. Chapter 8. How likely is a hack.mp4
    08:20
  • 048. Chapter 8. How bad will it be.mp4
    16:49
  • 049. Chapter 8. A simple model to measure risk.mp4
    05:00
  • 050. Chapter 8. How do I measure and communicate this.mp4
    07:55
  • 051. Chapter 8. Summary.mp4
    00:52
  • 052. Chapter 9. Testing your systems.mp4
    07:05
  • 053. Chapter 9. Vulnerability management.mp4
    07:27
  • 054. Chapter 9. Break your own stuff Penetration testing.mp4
    19:23
  • 055. Chapter 9. Getting expert help Bug bounties.mp4
    05:46
  • 056. Chapter 9. Breaking in Physical penetration testing.mp4
    08:10
  • 057. Chapter 9. Red teams and blue teams.mp4
    12:10
  • 058. Chapter 9. Summary.mp4
    01:51
  • 059. Chapter 10. Inside the security operations center.mp4
    11:50
  • 060. Chapter 10. Dealing with attacks Incident response.mp4
    12:00
  • 061. Chapter 10. Keeping track of everything Security and Information Event Management.mp4
    11:31
  • 062. Chapter 10. Gaining intelligence Data feeds.mp4
    05:00
  • 063. Chapter 10. Summary.mp4
    00:52
  • 064. Chapter 11. Protecting the people.mp4
    06:57
  • 065. Chapter 11. MFA.mp4
    08:40
  • 066. Chapter 11. Protecting from ransomware.mp4
    05:15
  • 067. Chapter 11. Education and support.mp4
    04:38
  • 068. Chapter 11. Summary.mp4
    01:12
  • 069. Chapter 12. After the hack.mp4
    13:18
  • 070. Chapter 12. Where to get help.mp4
    18:13
  • 071. Chapter 12. What to do next.mp4
    02:35
  • 072. Chapter 12. Lessons learned.mp4
    05:54
  • 073. Chapter 12. Summary.mp4
    00:50
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 73
    • duration 8:52:41
    • Release Date 2025/03/06