Companies Home Search Profile

The Cyber Security Series Intermediate Cyber Security

Focused View

2:28:45

105 View
  • 1 Welcome.mp4
    00:44
  • 2 Goals and Learning Objectives.mp4
    01:23
  • 3 What is cyber security and its importance.mp4
    03:29
  • 4 A brief history of cyber security.mp4
    05:32
  • 5 Key principles of cyber security Confidenciality and Integrity Pt1.mp4
    05:41
  • 6 Key principles of cyber security Availability and NonRepudiation Pt2.mp4
    03:51
  • 7 Key principles of cyber security Authorisation and Authentication Pt3.mp4
    04:49
  • 8 Key principles of cyber security Privacy and Incident Responce Pt4.mp4
    04:58
  • 9 Understanding the cyber security landscape.mp4
    03:21
  • 10 Cyber security incident response.mp4
    02:41
  • 11 Phishing.mp4
    03:09
  • 12 Malware.mp4
    04:27
  • 13 Dos and DDos.mp4
    04:07
  • 14 Ransomware.mp4
    04:00
  • 15 Advanced Persistent Threats.mp4
    04:26
  • 16 Social Engineering.mp4
    02:48
  • 17 IOT Attacks.mp4
    02:32
  • 18 Cloud Attacks.mp4
    02:27
  • 19 Man In The Middle Attacks.mp4
    02:52
  • 20 Password Attacks.mp4
    03:17
  • 21 CryptoJacking.mp4
    01:50
  • 22 Watering Hole Attack.mp4
    01:48
  • 23 Supply Chain Attack.mp4
    02:36
  • 24 Zero Day Attack.mp4
    02:36
  • 25 Introduction to Networking.mp4
    02:16
  • 26 Network security technologies and architectures Firewalls Encryption Pt1.mp4
    04:09
  • 27 Network security technologies and architectures IDPS Network Segment Pt2.mp4
    03:13
  • 28 Network security technologies and architectures VPN Access Control Pt3.mp4
    03:44
  • 29 Network security technologies and architectures Patch Management SIEM Pt4.mp4
    03:11
  • 30 How to secure network infrastructure and devices and the best practices.mp4
    03:08
  • 31 Introduction to web technologies.mp4
    03:50
  • 32 Web security threats and vulnerabilities XSS.mp4
    05:07
  • 33 SQL Injection.mp4
    03:57
  • 34 Cross Site Request Forgery.mp4
    01:55
  • 35 Remote Code Execution.mp4
    01:39
  • 36 Buffer Overflow.mp4
    01:29
  • 37 Directory Transversal.mp4
    01:14
  • 38 Session Hijacking.mp4
    01:30
  • 39 Web security best practices and tools.mp4
    02:19
  • 40 Secure web development.mp4
    01:34
  • 41 Introduction to data protection and privacy.mp4
    01:16
  • 42 Data Security threats and vulnerabilities.mp4
    02:30
  • 43 Best practices and tools in data security.mp4
    02:19
  • 44 Password Management.mp4
    02:01
  • 45 Password security threats and vulnerabilities.mp4
    01:31
  • 46 Introduction to cybersecurity compliance and regulation.mp4
    03:19
  • 47 Key cybersecurity frameworks and standards.mp4
    02:07
  • 48 Cybersecurity compliance and regulation best practices.mp4
    01:07
  • 49 Cybersecurity compliance and regulation challenges and solutions.mp4
    01:07
  • 50 Cybersecurity job roles and skills.mp4
    02:58
  • 51 Cybersecurity certification and education.mp4
    02:22
  • 52 Cybersecurity professional development resources.mp4
    02:04
  • 53 Congratulations.mp4
    00:25
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 53
    • duration 2:28:45
    • Release Date 2023/05/04