Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Cyber Security Fundamentals One

Alexhost
OP
O 0

oaxino

Alpha and Omega
Member
Access
Joined
Nov 24, 2022
Messages
30,617
Reaction score
877
Points
113
Age
35
Location
japanse
grants
₲101,788
2 years of service

bc563032648f9c7d7282cd679de96f81.jpeg

Cyber Security Fundamentals One
Published 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 230.12 MB | Duration: 0h 43m

Cyber Security Course For Beginners​

What you'll learn
Learn Cyber Security In An Easy Way
Understand The Basic Concepts And Terminologies Used In The Information / Cyber Security Field
Apply For Entry Level Roles (like Internships) Of Cybersecurity Positions
Take More Advanced Information Security Courses
Requirements
Cyber Security is easy to learn. You need not to be a software developer or a network administrator to learn the fundamentals of Cyber Security.
Description
Introduction:Building your knowledge base is similar to building a house; without a solid foundation, it will be weak, and will fail when it is actually required. In this course my goal will be to lay solid foundation of Cyber Security for you. This course is designed to provide you with a solid foundation in cyber security, covering topics and terms used by Cyber Security Professionals. What you will be able to do after completion of this course ?You will be able to understand Cyber Security basics terminologies ( which will be very useful, if you have to collaborate with Cyber Security professionals).You can take any advance level courses.Topics Covered:Course Intro.What is data ?What is information ?State of data information.Data is equivalent to asset.Information security definition.Are Information Security & Cyber Security same ?CIA Triad (Objectives of Cyber Security)Summarization Of CIAAAA of Security Introduction.AuthenticationFive Methods Of AuthenticationAuthorizationAccountingNon-RepudiationSummarization Of AAATypes Of Hackers.Scenario To Understand Threat, Vulnerability, Exploit, Risk & Impact.Cyber Security ThreatsThreat Category - MalwareThreat category - Un-authorized Access.Threat category - System Failure.Threat Category - Social EngineeringThreat Category - Natural CalamitiesThreat actors and it's typesThreat actor - ExternalThreat Actor - InternalVulnerabilitiesRiskExposureTypes of controls: Physical, Technical, Administrative, Functionalities Of Security Controls.Summarization of threat actor, threat, vulnerability, risk and impact.
Overview
Section 1: Course Introduction
Lecture 1 Course Intro.
Section 2: Course Intro.
Lecture 2 What is data ?
Lecture 3 What is information ?
Lecture 4 State of data / information.
Lecture 5 Data is equivalent to asset.
Section 3: Are Information & Cyber Security ?
Lecture 6 Information security definition.
Lecture 7 Are Information Security & Cyber Security same ?
Section 4: CIA Triad (Objectives of Cyber Security)
Lecture 8 CIA Triad
Lecture 9 Summarization Of CIA
Section 5: AAA of Security Introduction.
Lecture 10 AAA of Security Introduction
Lecture 11 Authentication
Lecture 12 Five Methods Of Authentication
Lecture 13 Authorization
Lecture 14 Accounting
Lecture 15 Non-Repudiation
Lecture 16 Summarization Of AAA
Section 6: Types Of Hackers
Lecture 17 Types Of Hackers
Section 7: Scenario To Understand Threat, Vulnerability, Exploit, Risk & Impact.
Lecture 18 Threat, Vulnerability, Exploit, Risk & Impact
Lecture 19 Cyber Security Threats
Lecture 20 Threat Category - Malware
Lecture 21 Threat category - Un-authorized Access
Lecture 22 Threat category - System Failure
Lecture 23 Threat Category - Social Engineering
Lecture 24 Threat Category - Natural Calamities
Lecture 25 Threat actors and it's types
Lecture 26 Threat actor - External
Lecture 27 Threat Actor - Internal
Lecture 28 Vulnerabilities
Lecture 29 Risk
Lecture 30 Exposure
Lecture 31 Types of controls
Lecture 32 Types of controls: Physical Controls
Lecture 33 Technical Controls
Lecture 34 Administrative Controls
Lecture 35 Functionalities Of Security Controls.
Lecture 36 Summarization of threat actor, threat, vulnerability, risk and impact.
Any one who want to begin his journey of Cyber Security. Building your knowledge base is similar to building a house: without a solid foundation, it will be weak, unpredictable, and fail in the most critical of moments. In this course you will lay your foundation of Cyber Security Knowledge.

a65f4016b96449bee5a1055d54ca8f69.jpeg

Download link

rapidgator.net:
You must reply in thread to view hidden text.

uploadgig.com:
You must reply in thread to view hidden text.

nitroflare.com:
You must reply in thread to view hidden text.
 
K 0

KatzSec DevOps

Alpha and Omega
Philanthropist
Access
Joined
Jan 17, 2022
Messages
633,934
Reaction score
7,919
Points
83
grants
₲58,487
2 years of service
oaxino salamat sa pag contribute. Next time always upload your files sa
Please, Log in or Register to view URLs content!
para siguradong di ma dedeadlink. Let's keep on sharing to keep our community running for good. This community is built for you and everyone to share freely. Let's invite more contributors para mabalik natin sigla ng Mobilarian at tuloy ang puyatan. :)
 
Top Bottom