Companies Home Search Profile

Practical Cybersecurity Fundamentals

Focused View

14:19:23

14 View
  • 001. Practical Cybersecurity Fundamentals Introduction.mp4
    01:58
  • 001. Learning objectives.mp4
    00:48
  • 002. 1.1 Understanding the Security Concepts of Information Assurance.mp4
    09:04
  • 003. 1.2 Understanding the Risk Management Process.mp4
    12:50
  • 004. 1.3 Understanding Security Controls.mp4
    02:37
  • 005. 1.4 Understanding Governance Processes.mp4
    06:36
  • 006. 1.5 Building Your Cybersecurity Lab.mp4
    04:59
  • 001. Learning objectives.mp4
    00:35
  • 002. 2.1 Understanding Business Continuity (BC).mp4
    06:17
  • 003. 2.2 Understanding Disaster Recovery (DR).mp4
    04:23
  • 004. 2.3 Understanding Incident Response.mp4
    15:00
  • 001. Learning objectives.mp4
    00:30
  • 002. 3.1 Understanding Physical Access Controls.mp4
    04:42
  • 003. 3.2 Exploring the Principle of Least Privilege.mp4
    03:06
  • 004. 3.3 Understanding the Concept of Segregation of Duties.mp4
    02:14
  • 005. 3.4 Introducing Discretionary Access Control (DAC).mp4
    05:07
  • 006. 3.5 Understanding Mandatory Access Control (MAC).mp4
    06:09
  • 007. 3.6 Understanding Role-based Access Control (RBAC).mp4
    01:38
  • 001. Learning objectives.mp4
    00:37
  • 002. 4.1 Understanding Computer Networking.mp4
    09:45
  • 003. 4.2 Understanding Network Threats and Attacks.mp4
    11:09
  • 004. 4.3 Understanding Network Security Infrastructure.mp4
    13:04
  • 005. 4.4 Introducing Network Segmentation.mp4
    07:38
  • 006. 4.5 Introducing Cloud Security.mp4
    17:21
  • 001. Learning objectives.mp4
    00:32
  • 002. 5.1 Understanding Data Security.mp4
    13:56
  • 003. 5.2 Understanding Hashing.mp4
    05:55
  • 004. 5.3 Understanding System Hardening.mp4
    03:20
  • 005. 5.4 Understanding Best Practice Security Policies.mp4
    04:59
  • 006. 5.5 Understanding Security Awareness Training.mp4
    06:33
  • 001. Learning objectives.mp4
    00:40
  • 002. 6.1 Software Defined Networking Security.mp4
    04:14
  • 003. 6.2 Understanding the Threats Against SDN Solutions.mp4
    02:21
  • 004. 6.3 Introducing Network Programmability.mp4
    08:25
  • 005. 6.4 Introducing SD-WAN and Modern Architectures.mp4
    03:21
  • 006. 6.5 Surveying the OWASP Top 10.mp4
    03:40
  • 001. Learning objectives.mp4
    00:45
  • 002. 7.1 Introducing Cryptography and Cryptanalysis.mp4
    02:53
  • 003. 7.2 Understanding Encryption Protocols.mp4
    09:55
  • 004. 7.3 Describing Hashing Algorithms.mp4
    02:50
  • 005. 7.4 Introducing Public Key Infrastructure (PKI).mp4
    01:37
  • 006. 7.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment.mp4
    08:11
  • 007. 7.6 Surveying SSL and TLS Implementations.mp4
    05:54
  • 008. 7.7 Surveying IPsec Implementations and Modern VPN Implementations.mp4
    05:42
  • 001. Learning objectives.mp4
    00:35
  • 002. 8.1 Introducing AAA and Identity Management.mp4
    07:11
  • 003. 8.2 Implementing Zero Trust and Multifactor Authentication.mp4
    06:43
  • 004. 8.3 Understanding Identity Management in the Cloud.mp4
    06:26
  • 005. 8.4 Surveying Single-Sign On (SSO) Implementations.mp4
    04:16
  • 001. Learning objectives.mp4
    00:54
  • 002. 9.1 Exploring How to Get Started in Incident Response.mp4
    06:06
  • 003. 9.2 Understanding the Incident Response Process.mp4
    05:46
  • 004. 9.3 Defining Playbooks and Run Book Automation (RBA).mp4
    10:29
  • 005. 9.4 Understanding Cyber Threat Intelligence (CTI).mp4
    10:23
  • 006. 9.5 Understanding Data Normalization.mp4
    03:01
  • 007. 9.6 Deconstructing Universal Data Formats and 5-tuple Correlation.mp4
    01:19
  • 008. 9.7 Understanding Security Monitoring Fundamentals.mp4
    06:32
  • 009. 9.8 Surveying Security Monitoring Tools.mp4
    13:33
  • 001. Learning objectives.mp4
    00:32
  • 002. 10.1 Introducing the Threat Hunting Process.mp4
    06:24
  • 003. 10.2 MITREs Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK).mp4
    09:30
  • 004. 10.3 Understanding Automated Adversarial Emulation.mp4
    12:40
  • 001. Learning objectives.mp4
    00:40
  • 002. 11.1 Introducing Digital Forensics.mp4
    09:10
  • 003. 11.2 Introducing Reverse Engineering.mp4
    06:30
  • 004. 11.3 Understanding Evidence Preservation and Chain of Custody.mp4
    08:09
  • 005. 11.4 Collecting Evidence from Endpoints and Servers.mp4
    06:07
  • 006. 11.5 Collecting Evidence from Mobile and IoT Devices.mp4
    05:02
  • 007. 11.6 Exploring Memory Analysis with Volatility.mp4
    07:56
  • 001. Learning objectives.mp4
    00:47
  • 002. 12.1 How to Start a Career in Ethical Hacking.mp4
    05:07
  • 003. 12.2 Understanding the Difference Between Traditional Pen Testing, Bug Bounties, and Red Team Assessments.mp4
    06:45
  • 004. 12.3 Exploring Bug Bounty Programs.mp4
    09:34
  • 005. 12.4 Understanding the Ethical Hacking and Bug Hunting Methodology.mp4
    11:39
  • 006. 12.5 Planning and Scoping a Penetration Testing Assessment.mp4
    05:09
  • 001. Learning objectives.mp4
    01:14
  • 002. 13.1 Understanding Information Gathering and Vulnerability Identification.mp4
    02:27
  • 003. 13.2 Introducing Open Source Intelligence (OSINT) Techniques.mp4
    14:39
  • 004. 13.3 Performing DNS-based Passive Recon.mp4
    09:02
  • 005. 13.4 Identifying Cloud vs. Self-hosted Assets.mp4
    07:13
  • 006. 13.5 Introducing Shodan, Maltego, AMass, Recon-NG, and other Recon Tools.mp4
    17:34
  • 007. 13.6 Surveying Password Dumps, File Metadata, and Public Source-code Repositories.mp4
    10:53
  • 008. 13.7 Introduction to Google Hacking and Search Engine Reconnaissance.mp4
    05:26
  • 001. Learning objectives.mp4
    00:44
  • 002. 14.1 Introduction to Host and Service Enumeration.mp4
    06:35
  • 003. 14.2 Mastering Nmap.mp4
    24:34
  • 004. 14.3 Performing Website and Web Application Reconnaissance.mp4
    10:22
  • 005. 14.4 Discovering Cloud Assets.mp4
    07:02
  • 006. 14.5 Crafting Packets with Scapy to Perform Reconnaissance.mp4
    05:48
  • 001. Learning objectives.mp4
    00:53
  • 002. 15.1 Performing On-Path Attacks.mp4
    05:43
  • 003. 15.2 Exploring the OWASP Top 10 Risks in Web Applications.mp4
    06:17
  • 004. 15.3 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities.mp4
    16:47
  • 005. 15.4 Understanding Server-side Request Forgery (SSRF) Vulnerabilities.mp4
    10:06
  • 006. 15.5 Hacking Databases.mp4
    23:02
  • 007. 15.6 Exploiting Wireless Vulnerabilities.mp4
    16:54
  • 008. 15.7 Exploiting Buffer Overflows and Creating Payloads.mp4
    24:04
  • 001. Learning objectives.mp4
    01:04
  • 002. 16.1 Avoiding Detection and Evading Security Tools.mp4
    04:26
  • 003. 16.2 Introduction to Lateral Movement and Exfiltration.mp4
    03:32
  • 004. 16.3 Exploring Command and Control (C2) Techniques.mp4
    07:54
  • 005. 16.4 Understanding Living-off-the-land and Fileless Malware.mp4
    04:52
  • 006. 16.5 Best Practices when Creating Pen Testing and Bug Bounty Reports.mp4
    11:24
  • 007. 16.6 Understanding Post-Engagement Cleanup.mp4
    04:22
  • 001. Learning objectives.mp4
    00:34
  • 002. 17.1 Introducing the Different Cloud Deployment and Service Models.mp4
    04:32
  • 003. 17.2 Surveying Patch Management in the Cloud.mp4
    13:54
  • 004. 17.3 Performing Security Assessments in Cloud Environments.mp4
    05:58
  • 005. 17.4 Exploring Cloud Logging and Monitoring Methodologies.mp4
    04:10
  • 001. Learning objectives.mp4
    00:28
  • 002. 18.1 Introducing DevSecOps.mp4
    03:41
  • 003. 18.2 Securing Code, Applications, and Building DevSecOps Pipelines.mp4
    07:30
  • 001. Learning objectives.mp4
    00:35
  • 002. 19.1 Introducing IoT Concepts.mp4
    07:07
  • 003. 19.2 Surveying IoT Hacking Methodologies and IoT Hacking Tools.mp4
    08:30
  • 004. 19.3 Introducing OT, ICS, and SCADA Concepts and Attacks.mp4
    07:13
  • 001. Learning objectives.mp4
    00:47
  • 002. 20.1 Surveying the AI Landscape and Use Cases.mp4
    06:25
  • 003. 20.2 Exploring LLMs, ChatGPT, Co-pilot and More.mp4
    07:16
  • 004. 20.3 Understanding the Importance of AI Security.mp4
    08:53
  • 005. 20.4 Exploring the OWASP Top 10 for LLMs.mp4
    11:20
  • 001. Learning objectives.mp4
    00:49
  • 002. 21.1 Exploring Data Poisoning Attacks.mp4
    02:36
  • 003. 21.2 Understanding Model Inversion Attacks.mp4
    03:08
  • 004. 21.3 Discussing Membership Inference Attacks.mp4
    02:09
  • 005. 21.4 Explaining the Model Theft Attack.mp4
    02:45
  • 006. 21.5 Introducing MITREs ATLAS.mp4
    04:17
  • 001. Learning objectives.mp4
    00:52
  • 002. 22.1 Exploring the Secure AI Development Lifecycle.mp4
    08:11
  • 003. 22.2 Understanding Privacy-preserving AI Techniques.mp4
    05:53
  • 004. 22.3 Understanding Robustness and Resilience in AI Models.mp4
    02:02
  • 005. 22.4 Surveying AI Security Best Practices.mp4
    04:23
  • 006. 22.5 Exploring AI Security Tools and Frameworks.mp4
    04:51
  • 007. 22.6 Understanding the Legal Landscape and Potential New Regulations.mp4
    04:47
  • 008. 22.7 Investigating Ethical Implications of Artificial Intelligence.mp4
    05:06
  • 001. Module Introduction.mp4
    00:56
  • 001. Module Introduction.mp4
    00:39
  • 001. Module Introduction.mp4
    00:42
  • 001. Module Introduction.mp4
    00:40
  • 001. Module Introduction.mp4
    00:33
  • 001. Practical Cybersecurity Fundamentals Summary.mp4
    01:33
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 141
    • duration 14:19:23
    • English subtitles has
    • Release Date 2024/02/27