Lynda - Cybersecurity Foundations
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size287.1 MB
- Uploaded Bysumi1
- Downloads1166
- Last checkedApr. 21st '18
- Date uploadedJul. 25th '17
- Seeders 6
- Leechers0
Set a rock solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore shows how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, ISO 27000, and the Payment Card Industry Data Security Standard (PCI DSS). He'll also show how to detect hidden and cloaked files, evaluate and avoid threats such as malware, architect security to align with business needs using SABSA, manage user access, and prepare for and respond to cybersecurity incidents when they do occur.
By the end of this course, you'll have a greater understanding of the threats that affect private, corporate, and government networks, and the knowledge to prevent attacks and defeat them.
Topics include:
Dissecting cyber risk
Working with NIST, COBIT 5, DSS05, and other frameworks
Exploring cybercrime
Understanding how malware hides
Selecting security controls
Managing user access and identity
Monitoring your network
Managing incident response
Files:
Lynda - Cybersecurity Foundations 00. Introduction- 00_01 - Welcome.mp4 (5.5 MB)
- 00_02 - What you should know.mp4 (1.9 MB)
- 01_01 - Understanding the NIST cybersecurity framework.mp4 (12.2 MB)
- 01_02 - Dissecting cyber risk.mp4 (12.7 MB)
- 01_03 - Unpacking COBIT 5.mp4 (10.1 MB)
- 01_04 - Looking closer at DSS05.mp4 (7.8 MB)
- 01_05 - Implementing control frameworks.mp4 (14.0 MB)
- 01_06 - Dissecting the payment card industry and PCI DSS.mp4 (14.0 MB)
- 01_07 - Exploring the Cyber Essentials framework.mp4 (8.9 MB)
- 02_01 - Breaking down the cybersecurity kill chain.mp4 (7.8 MB)
- 02_02 - Dissecting security threats.mp4 (11.2 MB)
- 02_03 - Exploring cybercrime as an industry.mp4 (9.6 MB)
- 02_04 - Hiding malware through cloaking and alternate data streams.mp4 (8.6 MB)
- 02_05 - Using callbacks to capture keystrokes.mp4 (9.3 MB)
- 02_06 - Hiding malware with rootkits.mp4 (9.4 MB)
- 02_07 - Understanding advanced persistent threats (APTs).mp4 (12.9 MB)
- 02_08 - Exploring ransomware.mp4 (8.0 MB)
- 03_01 - Describing security requirements.mp4 (14.3 MB)
- 03_02 - Architecting security risk.mp4 (12.8 MB)
- 03_03 - Selecting security controls.mp4 (8.1 MB)
- 03_04 - Managing user access and identity.mp4 (19.7 MB)
- 03_05 - Implementing preventative security.mp4 (18.0 MB)
- 03_06 - Monitoring and alerts.mp4 (15.0 MB)
- 04_01 - Managing incident response.mp4 (8.1 MB)
- 04_02 - Preparing for an incident.mp4 (12.9 MB)
- 04_03 - Responding to an incident.mp4 (11.1 MB)
- 05_01 - Next steps.mp4 (3.4 MB)
- Torrent Downloaded From Katcr.co - Kickasstorrents.txt (0.1 KB)
Code:
- udp://tracker.opentrackr.org:1337/announce
- udp://p4p.arenabg.com:1337/announce
- udp://tracker.zer0day.to:1337/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://eddie4.nl:6969/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://tracker.leechers-paradise.org:6969/announce
- udp://tracker.coppersurfer.tk:6969
- udp://tracker.grepler.com:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://shadowshq.yi.org:6969/announce