Lynda - Foundations of Cybersecurity
- Type:
- Other > Other
- Files:
- 27
- Size:
- 286.92 MiB (300861391 Bytes)
- Uploaded:
- 2015-10-04 11:08:39 GMT
- By:
- 2boweb
- Seeders:
- 2
- Leechers:
- 0
- Comments
- 0
- Info Hash: 035B2BFFD82E49CA2DCCDA11BD9E0241BB0C56D2
(Problems with magnets links are fixed by upgrading your torrent client!)
Lynda - Foundations of Cybersecurity This Course will be good to the Best for DL withing 30 days after has been post, after that it might not be good DL already, please do me favour to continue seeding to keep this torrent alive. 2h 26m Intermediate Sep 23, 2015 | Uploaded in Oct 4, 2015 by 2boweb Subject: IT Author: Malcolm Shore Set a rock solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore shows how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, ISO 27000, and the Payment Card Industry Data Security Standard (PCI DSS). He'll also show how to detect hidden and cloaked files, evaluate and avoid threats such as malware, architect security to align with business needs using SABSA, manage user access, and prepare for and respond to cybersecurity incidents when they do occur. By the end of this course, you'll have a greater understanding of the threats that affect private, corporate, and government networks, and the knowledge to prevent attacks and defeat them. Topics include: • Dissecting cyber risk • Working with NIST, COBIT 5, DSS05, and other frameworks • Exploring cybercrime • Understanding how malware hides • Selecting security controls • Managing user access and identity • Monitoring your network • Managing incident response //////////////////////////////////////////////////////
021 Managing user access and identity.mp4 | 19.71 MiB |
022 Implementing preventative security.mp4 | 17.89 MiB |
023 Monitoring and alerts.mp4 | 14.95 MiB |
018 Describing security requirements.mp4 | 14.21 MiB |
008 Dissecting the payment card industry and PCI DSS.mp4 | 13.94 MiB |
007 Implementing control frameworks.mp4 | 13.64 MiB |
025 Preparing for an incident.mp4 | 13.53 MiB |
019 Architecting security risk.mp4 | 12.86 MiB |
016 Understanding advanced persistent threats (APTs).mp4 | 12.86 MiB |
004 Dissecting cyber risk.mp4 | 12.53 MiB |
003 Understanding the NIST cybersecurity framework.mp4 | 12.04 MiB |
011 Dissecting security threats.mp4 | 11.04 MiB |
026 Responding to an incident.mp4 | 10.95 MiB |
005 Unpacking COBIT 5.mp4 | 9.84 MiB |
012 Exploring cybercrime as an industry.mp4 | 9.46 MiB |
014 Using callbacks to capture keystrokes.mp4 | 9.37 MiB |
015 Hiding malware with rootkits.mp4 | 9.34 MiB |
009 Exploring the Cyber Essentials framework.mp4 | 8.83 MiB |
013 Hiding malware through cloaking and alternate data streams.mp4 | 8.61 MiB |
020 Selecting security controls.mp4 | 8.14 MiB |
024 Managing incident response.mp4 | 8.11 MiB |
017 Exploring ransomware.mp4 | 8.01 MiB |
006 Looking closer at DSS05.mp4 | 7.76 MiB |
010 Breaking down the cybersecurity kill chain.mp4 | 7.71 MiB |
001 Welcome.mp4 | 6.21 MiB |
027 Next steps.mp4 | 3.44 MiB |
002 What you should know.mp4 | 1.95 MiB |