The Cyber Security Series Intermediate Cyber Security
Focused View
2:28:45
105 View
1 Welcome.mp4
00:44
2 Goals and Learning Objectives.mp4
01:23
3 What is cyber security and its importance.mp4
03:29
4 A brief history of cyber security.mp4
05:32
5 Key principles of cyber security Confidenciality and Integrity Pt1.mp4
05:41
6 Key principles of cyber security Availability and NonRepudiation Pt2.mp4
03:51
7 Key principles of cyber security Authorisation and Authentication Pt3.mp4
04:49
8 Key principles of cyber security Privacy and Incident Responce Pt4.mp4
04:58
9 Understanding the cyber security landscape.mp4
03:21
10 Cyber security incident response.mp4
02:41
11 Phishing.mp4
03:09
12 Malware.mp4
04:27
13 Dos and DDos.mp4
04:07
14 Ransomware.mp4
04:00
15 Advanced Persistent Threats.mp4
04:26
16 Social Engineering.mp4
02:48
17 IOT Attacks.mp4
02:32
18 Cloud Attacks.mp4
02:27
19 Man In The Middle Attacks.mp4
02:52
20 Password Attacks.mp4
03:17
21 CryptoJacking.mp4
01:50
22 Watering Hole Attack.mp4
01:48
23 Supply Chain Attack.mp4
02:36
24 Zero Day Attack.mp4
02:36
25 Introduction to Networking.mp4
02:16
26 Network security technologies and architectures Firewalls Encryption Pt1.mp4
04:09
27 Network security technologies and architectures IDPS Network Segment Pt2.mp4
03:13
28 Network security technologies and architectures VPN Access Control Pt3.mp4
03:44
29 Network security technologies and architectures Patch Management SIEM Pt4.mp4
03:11
30 How to secure network infrastructure and devices and the best practices.mp4
03:08
31 Introduction to web technologies.mp4
03:50
32 Web security threats and vulnerabilities XSS.mp4
05:07
33 SQL Injection.mp4
03:57
34 Cross Site Request Forgery.mp4
01:55
35 Remote Code Execution.mp4
01:39
36 Buffer Overflow.mp4
01:29
37 Directory Transversal.mp4
01:14
38 Session Hijacking.mp4
01:30
39 Web security best practices and tools.mp4
02:19
40 Secure web development.mp4
01:34
41 Introduction to data protection and privacy.mp4
01:16
42 Data Security threats and vulnerabilities.mp4
02:30
43 Best practices and tools in data security.mp4
02:19
44 Password Management.mp4
02:01
45 Password security threats and vulnerabilities.mp4
01:31
46 Introduction to cybersecurity compliance and regulation.mp4
03:19
47 Key cybersecurity frameworks and standards.mp4
02:07
48 Cybersecurity compliance and regulation best practices.mp4
01:07
49 Cybersecurity compliance and regulation challenges and solutions.mp4
01:07
50 Cybersecurity job roles and skills.mp4
02:58
51 Cybersecurity certification and education.mp4
02:22
52 Cybersecurity professional development resources.mp4
02:04
53 Congratulations.mp4
00:25
More details
User Reviews
Rating
average 0
Focused display
Category

Udemy
View courses UdemyStudents take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
- language english
- Training sessions 53
- duration 2:28:45
- Release Date 2023/05/04