Lynda - Cybersecurity Foundations
- Type:
- Other > Other
- Files:
- 28
- Size:
- 287.12 MiB (301063245 Bytes)
- Uploaded:
- 2017-07-16 14:50:27 GMT
- By:
- sumi
- Seeders:
- 1
- Leechers:
- 0
- Comments
- 0
- Info Hash: 2698265E4BA9AE63E7ACBE8FCCB6DC4D7466D999
(Problems with magnets links are fixed by upgrading your torrent client!)
Set a rock solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore shows how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, ISO 27000, and the Payment Card Industry Data Security Standard (PCI DSS). He'll also show how to detect hidden and cloaked files, evaluate and avoid threats such as malware, architect security to align with business needs using SABSA, manage user access, and prepare for and respond to cybersecurity incidents when they do occur. By the end of this course, you'll have a greater understanding of the threats that affect private, corporate, and government networks, and the knowledge to prevent attacks and defeat them. Topics include: Dissecting cyber risk Working with NIST, COBIT 5, DSS05, and other frameworks Exploring cybercrime Understanding how malware hides Selecting security controls Managing user access and identity Monitoring your network Managing incident response
00. Introduction/00_01 - Welcome.mp4 | 5.51 MiB |
00. Introduction/00_02 - What you should know.mp4 | 1.91 MiB |
01. Cybersecurity Foundations/01_01 - Understanding the NIST cybersecurity framework.mp4 | 12.2 MiB |
01. Cybersecurity Foundations/01_02 - Dissecting cyber risk.mp4 | 12.7 MiB |
01. Cybersecurity Foundations/01_03 - Unpacking COBIT 5.mp4 | 10.05 MiB |
01. Cybersecurity Foundations/01_04 - Looking closer at DSS05.mp4 | 7.82 MiB |
01. Cybersecurity Foundations/01_05 - Implementing control frameworks.mp4 | 13.95 MiB |
01. Cybersecurity Foundations/01_06 - Dissecting the payment card industry and PCI DSS.mp4 | 14.04 MiB |
01. Cybersecurity Foundations/01_07 - Exploring the Cyber Essentials framework.mp4 | 8.94 MiB |
02. Cybersecurity Threats/02_01 - Breaking down the cybersecurity kill chain.mp4 | 7.8 MiB |
02. Cybersecurity Threats/02_02 - Dissecting security threats.mp4 | 11.17 MiB |
02. Cybersecurity Threats/02_03 - Exploring cybercrime as an industry.mp4 | 9.63 MiB |
02. Cybersecurity Threats/02_04 - Hiding malware through cloaking and alternate data streams.mp4 | 8.56 MiB |
02. Cybersecurity Threats/02_05 - Using callbacks to capture keystrokes.mp4 | 9.26 MiB |
02. Cybersecurity Threats/02_06 - Hiding malware with rootkits.mp4 | 9.37 MiB |
02. Cybersecurity Threats/02_07 - Understanding advanced persistent threats (APTs).mp4 | 12.85 MiB |
02. Cybersecurity Threats/02_08 - Exploring ransomware.mp4 | 8 MiB |
03. Security Architecture/03_01 - Describing security requirements.mp4 | 14.26 MiB |
03. Security Architecture/03_02 - Architecting security risk.mp4 | 12.79 MiB |
03. Security Architecture/03_03 - Selecting security controls.mp4 | 8.12 MiB |
03. Security Architecture/03_04 - Managing user access and identity.mp4 | 19.65 MiB |
03. Security Architecture/03_05 - Implementing preventative security.mp4 | 18.01 MiB |
03. Security Architecture/03_06 - Monitoring and alerts.mp4 | 15 MiB |
04. Incident Management/04_01 - Managing incident response.mp4 | 8.11 MiB |
04. Incident Management/04_02 - Preparing for an incident.mp4 | 12.93 MiB |
04. Incident Management/04_03 - Responding to an incident.mp4 | 11.11 MiB |
04. Incident Management/05_01 - Next steps.mp4 | 3.36 MiB |
Torrent Downloaded From Katcr.co - Kickasstorrents.txt | 52 B |