Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Cyber Security Specialist Workshop

    Posted By: ELK1nG
    Cyber Security Specialist Workshop

    Cyber Security Specialist Workshop
    Published 11/2023
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.94 GB | Duration: 7h 28m

    Learn while working in real cybersecurity projects

    What you'll learn

    Introduction to ISO 27001: Basics of the ISO 27001 standard, an international framework for information security management.

    First Project, ISO27001 - ISP- IAM- KPI: Practical implementation of information security policies, identity and access management.

    Risk Management - Setup technical lab: Fundamentals of risk management in cyber security and setting up a technical lab for practical exercises.

    Network Basics: Understanding the basics of network technology, including architecture and protocols.

    Setup your virtual lab - Business Network - GPO (Technical Session): Creating a virtual lab environment to simulate business network setups.

    Baseline - Security Checklists - Vulnerability Management: Establishing security baselines, developing checklists for routine security audits.

    Nessus VA Tool - DLP Project - SOW: Learning to use Nessus for vulnerability assessments and implementing Data Loss Prevention (DLP) projects.

    Nessus VA Demonstration - Samer: A demonstration of the Nessus Vulnerability Assessment tool.

    Technical DLP implementation - Samer: Practical implementation of Data Loss Prevention systems.

    Network Basics, introduction to Firewall - Operation Security A12: Further network basics with a focus on firewalls and operational security principles.

    Real Firewall implementation: Hands-on experience in implementing and configuring real firewalls.

    Encryption Basics - Enterprise AV Implementation: Understanding the fundamentals of encryption and implementing enterprise antivirus solutions.

    Operation Security - Protection against malware - AV Management: Operational security strategies to protect against malware, including antivirus management.

    Enterprise Kaspersky AV Implementation: Specific training on implementing Kaspersky's enterprise antivirus solutions.

    Real Incident - Threat Intelligence Part 1: Analyzing real cyber security incidents and an introduction to threat intelligence.

    Threat Intelligence - Human Threat: Advanced concepts in threat intelligence with a focus on human-centric threats.

    BCP- DRP: Basics of Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP).

    BCP/DRP - PCI-DSS Standards: Integrating BCP and DRP with Payment Card Industry Data Security Standard (PCI-DSS) compliance.

    High Availability: Ensuring high availability in network and security systems.

    JD review, Real Project, tools and techniques: Reviewing job descriptions, engaging in real projects, and learning various tools and techniques.

    Security Information and Event Management (SIEM): Training on SIEM systems for security monitoring and event management.

    IS Awareness - SOP - IOT - ICS Security - Part 1: Information security awareness, standard operating procedures.

    Mock Interview, Incident Management: Preparing for job interviews in the cyber security field and understanding incident management protocols.

    BCP/DRP - Cloud Security: Business Continuity and Disaster Recovery Planning in the context of cloud security.

    End Point Security: Protecting network endpoints against various cyber threats.

    Access Control - Q & A: Understanding and implementing access control mechanisms with a question-and-answer session for clarification.

    Real project, Data labeling, DLP: Hands-on project experience in data labeling and Data Loss Prevention.

    Ethical Hacking: Basic principles and practices of ethical hacking to identify vulnerabilities.

    Requirements

    PC should have at least i3 processor 8GB RAM & 100GB free disk space

    Description

    5 Real Projects & 35 Real Operational ActivitiesFull recording of the Cybersecurity Specialist live workshopCyber Security Specialist Training is following a top-down approach where candidates will learn important cyber security skills implementation in a real business environment. It's well known that candidates learn much faster while working on real cyber security projects than while taking training or online courses accordingly we are giving our students an opportunity to join real cyber security projects with guidance on how to execute real project tasks and give our students a chance to learn by experiences. This approach is much more effective than the normal learning path that depends on traditional training or online courses that will provide candidates with the knowledge but miss the real implementation experience.Gain cyber security realistic experience through hands-on involvement in cutting-edge security scenarios. This enables learners to apply theoretical knowledge in practical situations, bridging the gap between academic learning and real-world application.Get real-life implementation experience from real cyber security projects, where you'll be immersed in various aspects of cyber security, from threat analysis to mitigation strategies. This direct exposure to live projects accelerates the learning process, making complex concepts easier to grasp.Understand the real business challenge by engaging with actual problems faced by organizations. This exposure to the dynamic nature of cyber threats in a business context enhances problem-solving skills and critical thinking.Get the confidence you need to apply for any job in the cyber security domain. The combination of practical experience and theoretical understanding equips you with a comprehensive skill set, making you a competitive candidate in the rapidly evolving field of cyber security.

    Overview

    Section 1: Introduction to the program

    Lecture 1 Introduction

    Lecture 2 Target Audiences

    Lecture 3 Identify the problem

    Lecture 4 JD.

    Section 2: ISO 27001 Project

    Lecture 5 First Project ISO27001

    Lecture 6 ISO27001_2022

    Lecture 7 CIA Triad

    Lecture 8 First Project_Hospital

    Lecture 9 IS Policy

    Lecture 10 Information Asset Register_Part1

    Lecture 11 Information Asset Register_Part2

    Lecture 12 Assignment 1

    Lecture 13 Risk Management

    Lecture 14 Risk Assessment

    Lecture 15 Risk Standard ISO 27005

    Lecture 16 Real Risk Register

    Lecture 17 Assignment_Risk Assessment

    Lecture 18 Risk Management Strategy

    Lecture 19 Risk Acceptance

    Section 3: Technical Controls

    Lecture 20 Baselines and checklist

    Lecture 21 Technical Security Implementation

    Lecture 22 Validate Baselines

    Lecture 23 Security Checklists

    Lecture 24 Baselines Assignment

    Section 4: Vulnerability Management

    Lecture 25 Nessus AV Tool

    Lecture 26 Vulnerability Management

    Lecture 27 VA Report

    Lecture 28 Emergency VA

    Lecture 29 Assignment-Vulnerability Assessment

    Section 5: DLP Project

    Lecture 30 Information Protection

    Lecture 31 Use Case – Implementing Data Classification and DLP

    Lecture 32 Microsoft Compliance Tool

    Lecture 33 Data Classification and Labeling

    Lecture 34 Create a Label

    Lecture 35 DLP Implementation

    Lecture 36 Creating SOW

    Lecture 37 Success Criteria

    Lecture 38 Assignment_DLP Implementation Plan

    Section 6: New section

    Lecture 39 Protection Against Malware

    Lecture 40 Enterprise AV Management

    Lecture 41 File Hash

    Lecture 42 Virus Total

    Lecture 43 AV Management

    Lecture 44 Assignment-AV Management

    Section 7: Network Security

    Lecture 45 Private IP vs Public IP

    Lecture 46 Network Security

    Lecture 47 Ports

    Lecture 48 Host based Firewall

    Section 8: Threat Intelligence

    Lecture 49 Threat Intelligence

    Lecture 50 IOC Report

    Section 9: Incident Management

    Lecture 51 Incident Management

    Lecture 52 Assignment-Incident Report

    Lecture 53 Assignment-Incident Management Policy

    Lecture 54 Assignment-Incidents

    Section 10: Information Security Awareness

    Lecture 55 Job function awareness

    Lecture 56 Information Security Awareness

    Lecture 57 IS Awareness Samples

    Lecture 58 IS Awareness Effectiveness

    Lecture 59 Social Engineering Campaign

    Lecture 60 Assignment Information Security Awareness Plan

    Section 11: BCP-DRP

    Lecture 61 BCP and DRP

    Lecture 62 Disaster Recovery Plan-DRP

    Lecture 63 BIA

    Lecture 64 MTD-RTO-RPO

    Lecture 65 Restoration Plan and Testing

    Lecture 66 Assignment-Disaster Recovery Plan

    Career shifter,IT Professionals,Recent Graduates in IT or Computer Science