Section 1 : Cyber Security - Definitions and The Basics

Lecture 1 About Certification
Lecture 2 What is Cyber
Lecture 3 Cyber Threats 00:06:38 Duration
Lecture 4 How Cyber Attacks Spill over into Business 00:06:38 Duration
Lecture 5 Layers of Security (The Onion) 00:12:21 Duration
Lecture 6 Internet Economy
Lecture 7 Hacking & Criminal Hackers 00:14:34 Duration
Lecture 8 Incident Response 00:12:40 Duration
Lecture 9 Risk Management 00:11:48 Duration
Lecture 10 Critical Infrastructure 00:02:38 Duration
Lecture 11 Encryption 00:08:34 Duration
Lecture 12 Awareness 00:05:00 Duration
Lecture 13 The Challenge of who is responsible 00:05:29 Duration
Lecture 14 The Human Factor
Lecture 15 Social Engineering 00:11:15 Duration

Section 2 : Modern Components of Cyber

Lecture 1 Cyber Strategy 00:07:33 Duration
Lecture 2 The Kill Chain 00:11:16 Duration
Lecture 3 Cyber Warfare 00:13:58 Duration
Lecture 4 Cyber Espionage 00:17:47 Duration
Lecture 5 Cyber Crime 00:12:14 Duration
Lecture 6 Cyber Defense 00:11:26 Duration
Lecture 7 Cyber Offense 00:13:31 Duration
Lecture 8 Cyber Units 00:04:03 Duration

Section 3 : Defending in the Cyber World

Lecture 1 Firewalls 00:07:03 Duration
Lecture 2 IDS (Intrusion Detection System) 00:08:21 Duration
Lecture 3 IPS (Intrusion Prevention System) 00:04:10 Duration
Lecture 4 OSINT (Open Source Intelligence)
Lecture 5 Actionable Data (so all those alerts help me how) 00:04:36 Duration
Lecture 6 SIEM (Security Incident and Event Monitoring) 00:06:27 Duration
Lecture 7 Malware Analysis and Reverse Engineering 00:11:52 Duration
Lecture 8 The Proactive Security Team 00:08:20 Duration
Lecture 9 Cyber Security for Home Users 00:09:21 Duration
Lecture 10 Cyber Security for Corporations Businesses 00:05:38 Duration
Lecture 11 SOC (Security Operations Center) 00:03:45 Duration

Section 4 : Summary

Lecture 1 Conclusion 00:07:45 Duration
Lecture 2 Presentation Material
Lecture 3 Handbook
Lecture 4 Cases in Cyber 1 - The Social BotNet 00:05:42 Duration
Lecture 5 Cases in Cyber 2 - Backdoors in UEFI 00:04:44 Duration
Lecture 6 Cases in Cyber 3 - FinFisherHacking Team (The Endp 00:07:23 Duration

Section 5 : Section 5 Proactive Security Tools&LostChapters

Lecture 1 The Lost Chapters1Proactive Security TeamMethodolo 00:17:06 Duration
Lecture 2 The Lost Chapters 2 Layers ofSecurityandtheirprote 00:23:43 Duration
Lecture 3 The Lost Chapters 3a PTES PenetrationTestingExecut 00:17:22 Duration
Lecture 4 The Lost Chapters 3b PTES PenetrationTestingExecut 00:29:12 Duration
Lecture 5 The Lost Chapters 4 Secure Network Design 00:20:23 Duration
Lecture 6 The Lost Chapters5WiresharkandPacketAnalysis 00:10:59 Duration
Lecture 7 The Lost Chapters 6 Kali Linux 00:08:31 Duration
Lecture 8 The Lost Chapters7OpenVasMetasploit 00:09:20 Duration
Lecture 9 The Lost Chapters 8 Web AppScanners 00:07:50 Duration
Lecture 10 The Lost Chapters 9 Blackarch Linux 00:06:51 Duration
Lecture 11 The Lost Chapters10NetworkMonitoringPrimerwithSec 00:16:51 Duration