Section 1 : Cyber Security - Definitions and The Basics
|
Lecture 1 | About Certification | |
|
Lecture 2 | What is Cyber | |
|
Lecture 3 | Cyber Threats | 00:06:38 Duration |
|
Lecture 4 | How Cyber Attacks Spill over into Business | 00:06:38 Duration |
|
Lecture 5 | Layers of Security (The Onion) | 00:12:21 Duration |
|
Lecture 6 | Internet Economy | |
|
Lecture 7 | Hacking & Criminal Hackers | 00:14:34 Duration |
|
Lecture 8 | Incident Response | 00:12:40 Duration |
|
Lecture 9 | Risk Management | 00:11:48 Duration |
|
Lecture 10 | Critical Infrastructure | 00:02:38 Duration |
|
Lecture 11 | Encryption | 00:08:34 Duration |
|
Lecture 12 | Awareness | 00:05:00 Duration |
|
Lecture 13 | The Challenge of who is responsible | 00:05:29 Duration |
|
Lecture 14 | The Human Factor | |
|
Lecture 15 | Social Engineering | 00:11:15 Duration |
Section 2 : Modern Components of Cyber
|
Lecture 1 | Cyber Strategy | 00:07:33 Duration |
|
Lecture 2 | The Kill Chain | 00:11:16 Duration |
|
Lecture 3 | Cyber Warfare | 00:13:58 Duration |
|
Lecture 4 | Cyber Espionage | 00:17:47 Duration |
|
Lecture 5 | Cyber Crime | 00:12:14 Duration |
|
Lecture 6 | Cyber Defense | 00:11:26 Duration |
|
Lecture 7 | Cyber Offense | 00:13:31 Duration |
|
Lecture 8 | Cyber Units | 00:04:03 Duration |
Section 3 : Defending in the Cyber World
|
Lecture 1 | Firewalls | 00:07:03 Duration |
|
Lecture 2 | IDS (Intrusion Detection System) | 00:08:21 Duration |
|
Lecture 3 | IPS (Intrusion Prevention System) | 00:04:10 Duration |
|
Lecture 4 | OSINT (Open Source Intelligence) | |
|
Lecture 5 | Actionable Data (so all those alerts help me how) | 00:04:36 Duration |
|
Lecture 6 | SIEM (Security Incident and Event Monitoring) | 00:06:27 Duration |
|
Lecture 7 | Malware Analysis and Reverse Engineering | 00:11:52 Duration |
|
Lecture 8 | The Proactive Security Team | 00:08:20 Duration |
|
Lecture 9 | Cyber Security for Home Users | 00:09:21 Duration |
|
Lecture 10 | Cyber Security for Corporations Businesses | 00:05:38 Duration |
|
Lecture 11 | SOC (Security Operations Center) | 00:03:45 Duration |
Section 4 : Summary
|
Lecture 1 | Conclusion | 00:07:45 Duration |
|
Lecture 2 | Presentation Material | |
|
Lecture 3 | Handbook | |
|
Lecture 4 | Cases in Cyber 1 - The Social BotNet | 00:05:42 Duration |
|
Lecture 5 | Cases in Cyber 2 - Backdoors in UEFI | 00:04:44 Duration |
|
Lecture 6 | Cases in Cyber 3 - FinFisherHacking Team (The Endp | 00:07:23 Duration |
Section 5 : Section 5 Proactive Security Tools&LostChapters
|
Lecture 1 | The Lost Chapters1Proactive Security TeamMethodolo | 00:17:06 Duration |
|
Lecture 2 | The Lost Chapters 2 Layers ofSecurityandtheirprote | 00:23:43 Duration |
|
Lecture 3 | The Lost Chapters 3a PTES PenetrationTestingExecut | 00:17:22 Duration |
|
Lecture 4 | The Lost Chapters 3b PTES PenetrationTestingExecut | 00:29:12 Duration |
|
Lecture 5 | The Lost Chapters 4 Secure Network Design | 00:20:23 Duration |
|
Lecture 6 | The Lost Chapters5WiresharkandPacketAnalysis | 00:10:59 Duration |
|
Lecture 7 | The Lost Chapters 6 Kali Linux | 00:08:31 Duration |
|
Lecture 8 | The Lost Chapters7OpenVasMetasploit | 00:09:20 Duration |
|
Lecture 9 | The Lost Chapters 8 Web AppScanners | 00:07:50 Duration |
|
Lecture 10 | The Lost Chapters 9 Blackarch Linux | 00:06:51 Duration |
|
Lecture 11 | The Lost Chapters10NetworkMonitoringPrimerwithSec | 00:16:51 Duration |