Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    The Cyber Security Series: Intermediate Cyber Security

    Posted By: ELK1nG
    The Cyber Security Series: Intermediate Cyber Security

    The Cyber Security Series: Intermediate Cyber Security
    Published 2/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.29 GB | Duration: 2h 29m

    Intermediate Cyber Security

    What you'll learn

    The basics or introduction to cyber security and its importance

    How to recognise the different types of cyber attacks and how to stay secure against them

    Key princliples of cyber security and the CIA Triad

    Best practices for protecting against cyber threats

    Network Security Concepts

    Web, Data, Password and Endpoint security Threats and Vulnerabilities

    How to respond to cyber incidents

    Career opportunities in cyber security

    Requirements

    Basic knowlegde about computers

    The motivation and willingness to learn about cyber security and its importance

    Familiarity with common IT concepts and terminology

    Description

    The Intermediate Cyber Security course is designed to give students a thorough understanding of key concepts and best practices in cyber security. Cyber attacks, network security, web security, data security, password security, compliance and regulations, and careers and professional development are among the topics covered in the course.The course begins with an introduction to cyber security, which covers the fundamentals of the field, such as the different types of threats and vulnerabilities that organizations face, as well as the importance of developing a strong security posture. The course then delves into cyber attacks, which examine the various types of attacks used by cyber criminals, such as malware, phishing, and social engineering.Data Security delves into the various methods for securing data, such as encryption, access control, and data loss prevention (DLP) solutions. The Password Security section discusses best practices for password management and security, including password policies, multi-factor authentication, and password managers.The course's Compliance and Regulations section discusses the various regulatory frameworks and compliance requirements that organizations must follow, including HIPAA, GDPR, and PCI-DSS. Finally, the Careers and Professional Development section discusses the various cyber security career paths available, as well as the skills and certifications required to advance in the field.Overall, the Intermediate Cyber Security course provides learners with a thorough understanding of the key concepts and best practices related to cyber security, making it a must-take for anyone interested in a career in this rapidly growing field.

    Overview

    Section 1: Introduction

    Lecture 1 Welcome

    Lecture 2 Goals and Learning Objectives

    Section 2: Introduction to Cyber Security

    Lecture 3 What is cyber security and its importance

    Lecture 4 A brief history of cyber security

    Lecture 5 Key principles of cyber security (Confidenciality and Integrity) Pt1

    Lecture 6 Key principles of cyber security (Availability and Non-Repudiation) Pt2

    Lecture 7 Key principles of cyber security (Authorisation and Authentication) Pt3

    Lecture 8 Key principles of cyber security (Privacy and Incident Responce) Pt4

    Lecture 9 Understanding the cyber security landscape

    Lecture 10 Cyber security incident response

    Section 3: Cyber Attacks

    Lecture 11 Phishing

    Lecture 12 Malware

    Lecture 13 Dos and DDos

    Lecture 14 Ransomware

    Lecture 15 Advanced Persistent Threats

    Lecture 16 Social Engineering

    Lecture 17 IOT Attacks

    Lecture 18 Cloud Attacks

    Lecture 19 Man In The Middle Attacks

    Lecture 20 Password Attacks

    Lecture 21 Crypto-Jacking

    Lecture 22 Watering Hole Attack

    Lecture 23 Supply Chain Attack

    Lecture 24 Zero Day Attack

    Section 4: Network Security

    Lecture 25 Introduction to Networking

    Lecture 26 Network security technologies and architectures (Firewalls & Encryption) Pt1

    Lecture 27 Network security technologies and architectures (IDPS & Network Segment) Pt2

    Lecture 28 Network security technologies and architectures (VPN & Access Control) Pt3

    Lecture 29 Network security technologies and architectures (Patch Management & SIEM) Pt4

    Lecture 30 How to secure network infrastructure and devices and the best practices

    Section 5: Web Security

    Lecture 31 Introduction to web technologies

    Lecture 32 Web security threats and vulnerabilities - XSS

    Lecture 33 SQL Injection

    Lecture 34 Cross Site Request Forgery

    Lecture 35 Remote Code Execution

    Lecture 36 Buffer Overflow

    Lecture 37 Directory Transversal

    Lecture 38 Session Hijacking

    Lecture 39 Web security best practices and tools

    Lecture 40 Secure web development

    Section 6: Data Security

    Lecture 41 Introduction to data protection and privacy

    Lecture 42 Data Security threats and vulnerabilities

    Lecture 43 Best practices and tools in data security

    Section 7: Password Security

    Lecture 44 Password Management

    Lecture 45 Password security threats and vulnerabilities

    Section 8: Cyber security compliance and regulations

    Lecture 46 Introduction to cybersecurity compliance and regulation

    Lecture 47 Key cybersecurity frameworks and standards

    Lecture 48 Cybersecurity compliance and regulation best practices

    Lecture 49 Cybersecurity compliance and regulation challenges and solutions

    Section 9: Careers and Professional Developement in Cybersecurity

    Lecture 50 Cybersecurity job roles and skills

    Lecture 51 Cybersecurity certification and education

    Lecture 52 Cybersecurity professional development resources

    Section 10: Conclusion

    Lecture 53 Congratulations

    Practitioners who want to learn more about cyber security,IT professionals looking to specialize in cyber security,Web developers and programmers interested in learning secure web development practices,IT professionals responsible for data protection and privacy,Students interested in pursuing a career in cybersecurity,Mobile app developers interested in learning secure mobile app development practices