The Cyber Security Series – Intermediate Cyber Security



Intermediate Cyber Security
Published 2/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.29 GB | Duration: 2h 29m


Free Download The Cyber Security Series: Intermediate Cyber Security
What you’ll learn
The basics or introduction to cyber security and its importance
How to recognise the different types of cyber attacks and how to stay secure against them
Key princliples of cyber security and the CIA Triad
Best practices for protecting against cyber threats
Network Security Concepts
Web, Data, Password and Endpoint security Threats and Vulnerabilities
How to respond to cyber incidents
Career opportunities in cyber security
Requirements
Basic knowlegde about computers
The motivation and willingness to learn about cyber security and its importance
Familiarity with common IT concepts and terminology
Description
The Intermediate Cyber Security course is designed to give students a thorough understanding of key concepts and best practices in cyber security. Cyber attacks, network security, web security, data security, password security, compliance and regulations, and careers and professional development are among the topics covered in the course.The course begins with an introduction to cyber security, which covers the fundamentals of the field, such as the different types of threats and vulnerabilities that organizations face, as well as the importance of developing a strong security posture. The course then delves into cyber attacks, which examine the various types of attacks used by cyber criminals, such as malware, phishing, and social engineering.Data Security delves into the various methods for securing data, such as encryption, access control, and data loss prevention (DLP) solutions. The Password Security section discusses best practices for password management and security, including password policies, multi-factor authentication, and password managers.The course’s Compliance and Regulations section discusses the various regulatory frameworks and compliance requirements that organizations must follow, including HIPAA, GDPR, and PCI-DSS. Finally, the Careers and Professional Development section discusses the various cyber security career paths available, as well as the skills and certifications required to advance in the field.Overall, the Intermediate Cyber Security course provides learners with a thorough understanding of the key concepts and best practices related to cyber security, making it a must-take for anyone interested in a career in this rapidly growing field.
Overview
Section 1: Introduction
Lecture 1 Welcome
Lecture 2 Goals and Learning Objectives
Section 2: Introduction to Cyber Security
Lecture 3 What is cyber security and its importance
Lecture 4 A brief history of cyber security
Lecture 5 Key principles of cyber security (Confidenciality and Integrity) Pt1
Lecture 6 Key principles of cyber security (Availability and Non-Repudiation) Pt2
Lecture 7 Key principles of cyber security (Authorisation and Authentication) Pt3
Lecture 8 Key principles of cyber security (Privacy and Incident Responce) Pt4
Lecture 9 Understanding the cyber security landscape
Lecture 10 Cyber security incident response
Section 3: Cyber Attacks
Lecture 11 Phishing
Lecture 12 Malware
Lecture 13 Dos and DDos
Lecture 14 Ransomware
Lecture 15 Advanced Persistent Threats
Lecture 16 Social Engineering
Lecture 17 IOT Attacks
Lecture 18 Cloud Attacks
Lecture 19 Man In The Middle Attacks
Lecture 20 Password Attacks
Lecture 21 Crypto-Jacking
Lecture 22 Watering Hole Attack
Lecture 23 Supply Chain Attack
Lecture 24 Zero Day Attack
Section 4: Network Security
Lecture 25 Introduction to Networking
Lecture 26 Network security technologies and architectures (Firewalls & Encryption) Pt1
Lecture 27 Network security technologies and architectures (IDPS & Network Segment) Pt2
Lecture 28 Network security technologies and architectures (VPN & Access Control) Pt3
Lecture 29 Network security technologies and architectures (Patch Management & SIEM) Pt4
Lecture 30 How to secure network infrastructure and devices and the best practices
Section 5: Web Security
Lecture 31 Introduction to web technologies
Lecture 32 Web security threats and vulnerabilities – XSS
Lecture 33 SQL Injection
Lecture 34 Cross Site Request Forgery
Lecture 35 Remote Code Execution
Lecture 36 Buffer Overflow
Lecture 37 Directory Transversal
Lecture 38 Session Hijacking
Lecture 39 Web security best practices and tools
Lecture 40 Secure web development
Section 6: Data Security
Lecture 41 Introduction to data protection and privacy
Lecture 42 Data Security threats and vulnerabilities
Lecture 43 Best practices and tools in data security
Section 7: Password Security
Lecture 44 Password Management
Lecture 45 Password security threats and vulnerabilities
Section 8: Cyber security compliance and regulations
Lecture 46 Introduction to cybersecurity compliance and regulation
Lecture 47 Key cybersecurity frameworks and standards
Lecture 48 Cybersecurity compliance and regulation best practices
Lecture 49 Cybersecurity compliance and regulation challenges and solutions
Section 9: Careers and Professional Developement in Cybersecurity
Lecture 50 Cybersecurity job roles and skills
Lecture 51 Cybersecurity certification and education
Lecture 52 Cybersecurity professional development resources
Section 10: Conclusion
Lecture 53 Congratulations
Practitioners who want to learn more about cyber security,IT professionals looking to specialize in cyber security,Web developers and programmers interested in learning secure web development practices,IT professionals responsible for data protection and privacy,Students interested in pursuing a career in cybersecurity,Mobile app developers interested in learning secure mobile app development practices

Homepage

https://www.udemy.com/course/the-cyber-security-series-intermediate-cyber-security/

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me

Links are Interchangeable – No Password – Single Extraction