![]() |
Cybersecurity Fundamentals With Certificate Of Completion
![]() Cybersecurity Fundamentals With Certificate Of Completion Published 7/2025 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 3.07 GB | Duration: 1h 32m Build a Strong Cybersecurity Foundation: Master Threat Detection, Malware Analysis, Risk Mitigation & Compliance What you'll learn Identify, assess, and address cyber risks. Strategies for risk mitigation and treatment Creating and implementing an Incident Response Plan Data classification, retention, and secure destruction methods Understand the CIA Triad Physical, technical, and administrative security controls Access Control Mechanisms Building a culture of cybersecurity awareness within teams Requirements Access to a computer or laptop with internet connectivity No prior cybersecurity experience needed A willingness to learn Description Understand the core principles of cybersecurity in this essential course designed to help you protect your digital life and business from today's evolving threats. Created by cybersecurity expert Atika, this course breaks down complex topics into clear, actionable insights that anyone-from beginners to professionals-can apply in real-world situations.You'll start by mastering foundational concepts such as the CIA Triad (Confidentiality, Integrity, and Availability), risk management, and incident response. From there, you'll dive deeper into access controls, including Role-Based Access Control (RBAC) and the Principle of Least Privilege, to ensure secure system design. Learn how to develop robust business continuity plans, defend against common attack vectors, and secure networks with firewalls, intrusion detection systems, and endpoint protection tools.The course also explores the importance of cloud security, security operations, and data protection in the age of remote work. You'll build awareness around social engineering attacks like phishing and pretexting and learn how to foster a security-first culture through training and awareness.Whether you're an aspiring IT professional or a business owner looking to strengthen your cyber defenses, this course equips you with the knowledge and confidence to proactively manage and reduce digital risks. Earn a certificate of completion and take your first step into the world of cybersecurity. Overview Section 1: Welcome to Cybersecurity Fundamentals Lecture 1 Training Overview Lecture 2 Introduction Section 2: Chapter 1 Lecture 3 Security Principles Overview Lecture 4 What is CIA Triad Lecture 5 What is Risk Management Lecture 6 What are Security Controls? Section 3: Chapter 2 Lecture 7 Incident Response, Business Continuity & Disaster Lecture 8 What is Incident Response Lecture 9 Understanding Business Continuity Lecture 10 What Are The Components Of A Disaster Recovery Plan Section 4: Chapter 3 Lecture 11 Access Control Concepts Overview Lecture 12 Defining Security Control, Subject, Object, and Rule Lecture 13 Identifying Controls Assessments and Defense in Depth 1 Lecture 14 Principle of Least Privilege and Privileged Accounts Lecture 15 Segregation Of Duties Lecture 16 Two-Person Integrity Lecture 17 What is Physical Security and Types of Physical Access Control Lecture 18 What are Logical and Role-Based Access Controls Section 5: Chapter 4 Lecture 19 Network Security Overview Lecture 20 What is Networking Lecture 21 What are the Different Types Of Threats Lecture 22 Understanding the On-Premises Data Centers Lecture 23 What is Cloud Computing Section 6: Chapter 5 Lecture 24 Security Operations Overview Lecture 25 What is Data Handling Lecture 26 Logging and Monitoring Security Events Lecture 27 What is Security Awareness Training Section 7: Cybersecurity Self-Assessment Anyone who uses the internet and wants to stay safe in today's digital world,Business owners and entrepreneurs who want to protect their company from cyber threats,Professionals and job seekers looking to build a strong foundation in cybersecurity,Team leaders and managers responsible for overseeing IT, compliance, or risk management Цитата:
|
Часовой пояс GMT +3, время: 08:32. |
vBulletin® Version 3.6.8.
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Перевод: zCarot