Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Want A Job In Cybersecurity - Foundation Concepts To Know

    Posted By: ELK1nG
    Want A Job In Cybersecurity - Foundation Concepts To Know

    Want A Job In Cybersecurity - Foundation Concepts To Know
    Published 10/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.11 GB | Duration: 4h 45m

    Master The Foundation Concepts For A Career In Cybersecurity

    What you'll learn
    Foundational Security Concepts
    Introduction to Network Security
    Foundations of Security Architecture
    Access Control
    Cloud Risks and Controls
    Business Continuity, Disaster Recovery, and Incident Response
    Operations in the Cybersecurity World
    Requirements
    Basic IT Skills
    Description
    Want a Job in Cybersecurity - Foundation Concepts To KnowGet ready to make a career move into the world of Cybersecurity!Research shows that there's a global shortage of qualified cybersecurity professionals. Move fast to take advantage of this shortage!  Quickly finding a job in cybersecurity is a very smart career move.  It's the hot thing in the job market right now - but to get in, you need to show that you have a solid understanding of cybersecurity concepts.This course covers the basics:Foundational Security ConceptsNetwork SecurityAccess ControlCloud Risks and ControlsBusiness Continuity, Disaster Recovery, and Incident ResponseOperations in the Cybersecurity WorldDuring the course we'll cover the key subject areas that form a foundational knowledge of cybersecurity.  The goal is to prepare you with a basic understanding of core concepts and then anticipate the types of interview questions that may be asked.  If you are prepared and can anticipate the questions….Then you're ready to increase your odds of doing well during the interview process!Topics covered and skills learned:Understand the security concepts of Information AssuranceLearn Risk Management processes and techniquesTypes of security controls - Technical, Physical, and AdministrativeBecome familiar with best practices for security governanceLearn about Business Continuity, Disaster Recovery, and Incident ResponseUnderstand various access control models - DAC, NDAC, MAC, RBACLearn how encryption can be used to secure data and communicationsBecome comfortable with network models (OSI and TCP) and secure network designUnderstand how the TCP protocol functions and how it can be securedGet detailed information on firewalls, intrusion detection, and anti-virusBe able to identify threats and malware then be able to recommend safeguardsUnderstand how the Cloud impacts security and ways to mitigate cloud-based risksWho this course is for:Students wanting to show they have a solid cybersecurity foundationProfessionals changing careers and wanting to move into cybersecurityAnyone wanting to get a deeper understanding of cybersecurity practicesIT professionals wanting to grow their knowledge and move into a cybersecurity role

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Lecture 2 Understanding the Fundamentals

    Section 2: Foundations of Cybersecurity

    Lecture 3 Information Assurance

    Lecture 4 Security Controls

    Lecture 5 Safeguarding CIA

    Section 3: Identifying and Handling Risk

    Lecture 6 Risk Management - Terminology

    Lecture 7 Risk Management - Assessment and Treatment

    Section 4: Business Continuity, Disaster Recovery, and Incident Response

    Lecture 8 Business Continuity and Disaster Recovery

    Lecture 9 Incident Lifecycle

    Lecture 10 Forensics

    Section 5: Access Controls

    Lecture 11 Application of Logical Access Control

    Lecture 12 Physical Access Controls

    Section 6: Cryptography

    Lecture 13 Encryption Terminology

    Lecture 14 Encryption, Hashing, and Digital Signatures

    Section 7: Network and Communications Security

    Lecture 15 Fundamentals of Networking

    Lecture 16 The OSI Model

    Lecture 17 The TCP Model

    Lecture 18 TCP/IP Networking Basics

    Lecture 19 Security and Network Devices

    Lecture 20 Secure Network Design

    Section 8: Security in the Cloud

    Lecture 21 Cloud Offerings

    Section 9: System and Application Security

    Lecture 22 Threats and Attacks

    Lecture 23 Common Malware Types

    Section 10: Governance, Risk, and Compliance

    Lecture 24 Governance Process

    Lecture 25 Acceptable Use Policy

    Lecture 26 Data Handling Policy

    Lecture 27 Change Management Policy

    Lecture 28 System Hardening Policy

    Lecture 29 Patch Management Policy

    Lecture 30 Password Policy

    Lecture 31 Bring Your Own Device Policy

    Lecture 32 Security Awareness

    Section 11: Conclusion

    Lecture 33 Summary and Thank You

    Students wanting to show they have a solid cybersecurity foundation,Anyone preparing for entry or foundation level cybersecurity certification exams,Professionals changing careers and wanting to move into cybersecurity,Anyone wanting to get a deeper understanding of cybersecurity practices,IT professionals wanting to grow their knowledge and move into a cybersecurity role