LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL

seeders: 0
leechers: 0
Added on September 24, 2015 by Mackweetin Other > Tutorials
Torrent verified.



LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL (Size: 286.92 MB)
 01_01-Welcome.mp46.21 MB
 01_02-What you should know.mp41.95 MB
 02_06-Dissecting the payment card industry and PCI DSS.mp413.94 MB
 02_05-Implementing control frameworks.mp413.64 MB
 02_02-Dissecting cyber risk.mp412.53 MB
 02_01-Understanding the NIST cybersecurity framework.mp412.04 MB
 02_03-Unpacking COBIT 5.mp49.84 MB
 02_07-Exploring the Cyber Essentials framework.mp48.83 MB
 02_04-Looking closer at DSS05.mp47.76 MB
 03_07-Understanding advanced persistent threats APTs.mp412.86 MB
 03_02-Dissecting security threats.mp411.04 MB
 03_03-Exploring cybercrime as an industry.mp49.46 MB
 03_05-Using callbacks to capture keystrokes.mp49.37 MB
 03_06-Hiding malware with rootkits.mp49.34 MB
 03_04-Hiding malware through cloaking and alternate data streams.mp48.61 MB
 03_08-Exploring ransomware.mp48.01 MB
 03_01-Breaking down the cybersecurity kill chain.mp47.71 MB
 04_04-Managing user access and identity.mp419.71 MB
 04_05-Implementing preventative security.mp417.89 MB
 04_06-Monitoring and alerts.mp414.95 MB
 04_01-Describing security requirements.mp414.21 MB
 04_02-Architecting security risk.mp412.86 MB
 04_03-Selecting security controls.mp48.14 MB
 05_02-Preparing for an incident.mp413.53 MB
 05_03-Responding to an incident.mp410.95 MB
 05_01-Managing incident response.mp48.11 MB
 06_01-Next steps.mp43.44 MB


Description

Set a rock solid foundation for your network, users, and
data by learning about the basics of cybersecurity
Security expert Malcolm Shore shows how to assess and
mitigate risks using various cybersecurity frameworks and
control standards, such as NIST, COBIT 5, ISO 27000, and
the Payment Card Industry Data Security Standard (PCI DSS)
He'll also show how to detect hidden and cloaked files
evaluate and avoid threats such as malware, architect
security to align with business needs using SABSA, manage
user access, and prepare for and respond to cybersecurity
incidents when they do occur
By the end of this course, you'll have a greater
understanding of the threats that affect private
corporate, and government networks, and the knowledge to
prevent attacks and defeat them

Topics include:

* Dissecting cyber risk

* Working with NIST, COBIT 5, DSS05, and other frameworks

* Exploring cybercrime

* Understanding how malware hides

* Selecting security controls

* Managing user access and identity

* Monitoring your network

* Managing incident response

Sharing Widget


Download torrent
286.92 MB
seeders:0
leechers:0
LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL

All Comments

thanks dude :)
Thanks again for another great upload, much appreciated.