Section 1 : Cyber Security - Definitions and The Basics

lecture 1 About Certification Pdf
lecture 2 What is Cyber
lecture 3 Cyber Threats 6:38
lecture 4 How Cyber Attacks Spill over into Business 6:38
lecture 5 Layers of Security (The Onion) 12:21
lecture 6 Internet Economy
lecture 7 Hacking & Criminal Hackers 14:34
lecture 8 Incident Response 12:40
lecture 9 Risk Management 11:48
lecture 10 Critical Infrastructure 2:38
lecture 11 Encryption 8:34
lecture 12 Awareness 5:0
lecture 13 The Challenge of who is responsible 5:29
lecture 14 The Human Factor
lecture 15 Social Engineering 11:15

Section 2 : Modern Components of Cyber

lecture 16 Cyber Strategy 7:33
lecture 17 The Kill Chain 11:16
lecture 18 Cyber Warfare 13:58
lecture 19 Cyber Espionage 17:47
lecture 20 Cyber Crime 12:14
lecture 21 Cyber Defense 11:26
lecture 22 Cyber Offense 13:31
lecture 23 Cyber Units 4:3

Section 3 : Defending in the Cyber World

lecture 24 Firewalls 7:3
lecture 25 IDS (Intrusion Detection System) 8:21
lecture 26 IPS (Intrusion Prevention System) 4:10
lecture 27 OSINT (Open Source Intelligence)
lecture 28 Actionable Data (so all those alerts help me how) 4:36
lecture 29 SIEM (Security Incident and Event Monitoring) 6:27
lecture 30 Malware Analysis and Reverse Engineering 11:52
lecture 31 The Proactive Security Team 8:20
lecture 32 Cyber Security for Home Users 9:21
lecture 33 Cyber Security for Corporations Businesses 5:38
lecture 34 SOC (Security Operations Center) 3:45

Section 4 : Summary

lecture 35 Conclusion 7:45
lecture 36 Presentation Material Pdf
lecture 37 Handbook Pdf
lecture 38 Cases in Cyber 1 - The Social BotNet 5:42
lecture 39 Cases in Cyber 2 - Backdoors in UEFI 4:44
lecture 40 Cases in Cyber 3 - FinFisherHacking Team (The Endp 7:23

Section 5 : Section 5 Proactive Security Tools&LostChapters

lecture 41 The Lost Chapters1Proactive Security TeamMethodolo 17:6
lecture 42 The Lost Chapters 2 Layers ofSecurityandtheirprote 23:43
lecture 43 The Lost Chapters 3a PTES PenetrationTestingExecut 17:22
lecture 44 The Lost Chapters 3b PTES PenetrationTestingExecut 29:12
lecture 45 The Lost Chapters 4 Secure Network Design 20:23
lecture 46 The Lost Chapters5WiresharkandPacketAnalysis 10:59
lecture 47 The Lost Chapters 6 Kali Linux 8:31
lecture 48 The Lost Chapters7OpenVasMetasploit 9:20
lecture 49 The Lost Chapters 8 Web AppScanners 7:50
lecture 50 The Lost Chapters 9 Blackarch Linux 6:51
lecture 51 The Lost Chapters10NetworkMonitoringPrimerwithSec 16:51