Practical Cybersecurity Fundamentals
Focused View
14:19:23
14 View
001. Practical Cybersecurity Fundamentals Introduction.mp4
01:58
001. Learning objectives.mp4
00:48
002. 1.1 Understanding the Security Concepts of Information Assurance.mp4
09:04
003. 1.2 Understanding the Risk Management Process.mp4
12:50
004. 1.3 Understanding Security Controls.mp4
02:37
005. 1.4 Understanding Governance Processes.mp4
06:36
006. 1.5 Building Your Cybersecurity Lab.mp4
04:59
001. Learning objectives.mp4
00:35
002. 2.1 Understanding Business Continuity (BC).mp4
06:17
003. 2.2 Understanding Disaster Recovery (DR).mp4
04:23
004. 2.3 Understanding Incident Response.mp4
15:00
001. Learning objectives.mp4
00:30
002. 3.1 Understanding Physical Access Controls.mp4
04:42
003. 3.2 Exploring the Principle of Least Privilege.mp4
03:06
004. 3.3 Understanding the Concept of Segregation of Duties.mp4
02:14
005. 3.4 Introducing Discretionary Access Control (DAC).mp4
05:07
006. 3.5 Understanding Mandatory Access Control (MAC).mp4
06:09
007. 3.6 Understanding Role-based Access Control (RBAC).mp4
01:38
001. Learning objectives.mp4
00:37
002. 4.1 Understanding Computer Networking.mp4
09:45
003. 4.2 Understanding Network Threats and Attacks.mp4
11:09
004. 4.3 Understanding Network Security Infrastructure.mp4
13:04
005. 4.4 Introducing Network Segmentation.mp4
07:38
006. 4.5 Introducing Cloud Security.mp4
17:21
001. Learning objectives.mp4
00:32
002. 5.1 Understanding Data Security.mp4
13:56
003. 5.2 Understanding Hashing.mp4
05:55
004. 5.3 Understanding System Hardening.mp4
03:20
005. 5.4 Understanding Best Practice Security Policies.mp4
04:59
006. 5.5 Understanding Security Awareness Training.mp4
06:33
001. Learning objectives.mp4
00:40
002. 6.1 Software Defined Networking Security.mp4
04:14
003. 6.2 Understanding the Threats Against SDN Solutions.mp4
02:21
004. 6.3 Introducing Network Programmability.mp4
08:25
005. 6.4 Introducing SD-WAN and Modern Architectures.mp4
03:21
006. 6.5 Surveying the OWASP Top 10.mp4
03:40
001. Learning objectives.mp4
00:45
002. 7.1 Introducing Cryptography and Cryptanalysis.mp4
02:53
003. 7.2 Understanding Encryption Protocols.mp4
09:55
004. 7.3 Describing Hashing Algorithms.mp4
02:50
005. 7.4 Introducing Public Key Infrastructure (PKI).mp4
01:37
006. 7.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment.mp4
08:11
007. 7.6 Surveying SSL and TLS Implementations.mp4
05:54
008. 7.7 Surveying IPsec Implementations and Modern VPN Implementations.mp4
05:42
001. Learning objectives.mp4
00:35
002. 8.1 Introducing AAA and Identity Management.mp4
07:11
003. 8.2 Implementing Zero Trust and Multifactor Authentication.mp4
06:43
004. 8.3 Understanding Identity Management in the Cloud.mp4
06:26
005. 8.4 Surveying Single-Sign On (SSO) Implementations.mp4
04:16
001. Learning objectives.mp4
00:54
002. 9.1 Exploring How to Get Started in Incident Response.mp4
06:06
003. 9.2 Understanding the Incident Response Process.mp4
05:46
004. 9.3 Defining Playbooks and Run Book Automation (RBA).mp4
10:29
005. 9.4 Understanding Cyber Threat Intelligence (CTI).mp4
10:23
006. 9.5 Understanding Data Normalization.mp4
03:01
007. 9.6 Deconstructing Universal Data Formats and 5-tuple Correlation.mp4
01:19
008. 9.7 Understanding Security Monitoring Fundamentals.mp4
06:32
009. 9.8 Surveying Security Monitoring Tools.mp4
13:33
001. Learning objectives.mp4
00:32
002. 10.1 Introducing the Threat Hunting Process.mp4
06:24
003. 10.2 MITREs Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK).mp4
09:30
004. 10.3 Understanding Automated Adversarial Emulation.mp4
12:40
001. Learning objectives.mp4
00:40
002. 11.1 Introducing Digital Forensics.mp4
09:10
003. 11.2 Introducing Reverse Engineering.mp4
06:30
004. 11.3 Understanding Evidence Preservation and Chain of Custody.mp4
08:09
005. 11.4 Collecting Evidence from Endpoints and Servers.mp4
06:07
006. 11.5 Collecting Evidence from Mobile and IoT Devices.mp4
05:02
007. 11.6 Exploring Memory Analysis with Volatility.mp4
07:56
001. Learning objectives.mp4
00:47
002. 12.1 How to Start a Career in Ethical Hacking.mp4
05:07
003. 12.2 Understanding the Difference Between Traditional Pen Testing, Bug Bounties, and Red Team Assessments.mp4
06:45
004. 12.3 Exploring Bug Bounty Programs.mp4
09:34
005. 12.4 Understanding the Ethical Hacking and Bug Hunting Methodology.mp4
11:39
006. 12.5 Planning and Scoping a Penetration Testing Assessment.mp4
05:09
001. Learning objectives.mp4
01:14
002. 13.1 Understanding Information Gathering and Vulnerability Identification.mp4
02:27
003. 13.2 Introducing Open Source Intelligence (OSINT) Techniques.mp4
14:39
004. 13.3 Performing DNS-based Passive Recon.mp4
09:02
005. 13.4 Identifying Cloud vs. Self-hosted Assets.mp4
07:13
006. 13.5 Introducing Shodan, Maltego, AMass, Recon-NG, and other Recon Tools.mp4
17:34
007. 13.6 Surveying Password Dumps, File Metadata, and Public Source-code Repositories.mp4
10:53
008. 13.7 Introduction to Google Hacking and Search Engine Reconnaissance.mp4
05:26
001. Learning objectives.mp4
00:44
002. 14.1 Introduction to Host and Service Enumeration.mp4
06:35
003. 14.2 Mastering Nmap.mp4
24:34
004. 14.3 Performing Website and Web Application Reconnaissance.mp4
10:22
005. 14.4 Discovering Cloud Assets.mp4
07:02
006. 14.5 Crafting Packets with Scapy to Perform Reconnaissance.mp4
05:48
001. Learning objectives.mp4
00:53
002. 15.1 Performing On-Path Attacks.mp4
05:43
003. 15.2 Exploring the OWASP Top 10 Risks in Web Applications.mp4
06:17
004. 15.3 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities.mp4
16:47
005. 15.4 Understanding Server-side Request Forgery (SSRF) Vulnerabilities.mp4
10:06
006. 15.5 Hacking Databases.mp4
23:02
007. 15.6 Exploiting Wireless Vulnerabilities.mp4
16:54
008. 15.7 Exploiting Buffer Overflows and Creating Payloads.mp4
24:04
001. Learning objectives.mp4
01:04
002. 16.1 Avoiding Detection and Evading Security Tools.mp4
04:26
003. 16.2 Introduction to Lateral Movement and Exfiltration.mp4
03:32
004. 16.3 Exploring Command and Control (C2) Techniques.mp4
07:54
005. 16.4 Understanding Living-off-the-land and Fileless Malware.mp4
04:52
006. 16.5 Best Practices when Creating Pen Testing and Bug Bounty Reports.mp4
11:24
007. 16.6 Understanding Post-Engagement Cleanup.mp4
04:22
001. Learning objectives.mp4
00:34
002. 17.1 Introducing the Different Cloud Deployment and Service Models.mp4
04:32
003. 17.2 Surveying Patch Management in the Cloud.mp4
13:54
004. 17.3 Performing Security Assessments in Cloud Environments.mp4
05:58
005. 17.4 Exploring Cloud Logging and Monitoring Methodologies.mp4
04:10
001. Learning objectives.mp4
00:28
002. 18.1 Introducing DevSecOps.mp4
03:41
003. 18.2 Securing Code, Applications, and Building DevSecOps Pipelines.mp4
07:30
001. Learning objectives.mp4
00:35
002. 19.1 Introducing IoT Concepts.mp4
07:07
003. 19.2 Surveying IoT Hacking Methodologies and IoT Hacking Tools.mp4
08:30
004. 19.3 Introducing OT, ICS, and SCADA Concepts and Attacks.mp4
07:13
001. Learning objectives.mp4
00:47
002. 20.1 Surveying the AI Landscape and Use Cases.mp4
06:25
003. 20.2 Exploring LLMs, ChatGPT, Co-pilot and More.mp4
07:16
004. 20.3 Understanding the Importance of AI Security.mp4
08:53
005. 20.4 Exploring the OWASP Top 10 for LLMs.mp4
11:20
001. Learning objectives.mp4
00:49
002. 21.1 Exploring Data Poisoning Attacks.mp4
02:36
003. 21.2 Understanding Model Inversion Attacks.mp4
03:08
004. 21.3 Discussing Membership Inference Attacks.mp4
02:09
005. 21.4 Explaining the Model Theft Attack.mp4
02:45
006. 21.5 Introducing MITREs ATLAS.mp4
04:17
001. Learning objectives.mp4
00:52
002. 22.1 Exploring the Secure AI Development Lifecycle.mp4
08:11
003. 22.2 Understanding Privacy-preserving AI Techniques.mp4
05:53
004. 22.3 Understanding Robustness and Resilience in AI Models.mp4
02:02
005. 22.4 Surveying AI Security Best Practices.mp4
04:23
006. 22.5 Exploring AI Security Tools and Frameworks.mp4
04:51
007. 22.6 Understanding the Legal Landscape and Potential New Regulations.mp4
04:47
008. 22.7 Investigating Ethical Implications of Artificial Intelligence.mp4
05:06
001. Module Introduction.mp4
00:56
001. Module Introduction.mp4
00:39
001. Module Introduction.mp4
00:42
001. Module Introduction.mp4
00:40
001. Module Introduction.mp4
00:33
001. Practical Cybersecurity Fundamentals Summary.mp4
01:33
More details
User Reviews
Rating
average 0
Focused display
Category

LiveLessons
View courses LiveLessonsPearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
- language english
- Training sessions 141
- duration 14:19:23
- English subtitles has
- Release Date 2024/02/27