Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security Specialist Live Workshop
Introduction
Cyber Security Workshop (17:39)
Program Syllabus
Introduction (2:40)
Student Portal (1:47)
Important Information for the Program
1. Before we start the program (3:24)
2.Organizational Chart (3:38)
3.Job Description (8:54)
4. SkillSet Matrix (1:56)
Team Meeting and Assignments
First Meeting - Project 1 Kick off (111:59)
Assignment 1
Security Incident - Shared Folder Deleted (12:56)
Second Meeting - IS Policy & IAM (98:51)
Third Meeting - IS Audit Sample / Access Control / Technical Setting (87:57)
Fourth Meeting - Setup Your Virtual Lab (93:50)
Fifth Meeting - Access Control (105:49)
Security Incident 2 (2:53)
6th meeting: Milestone 1- Risk Assessment (126:39)
Risk Assessment - Part 2 (25:47)
New Incident _ Due Diligence / Due Care (12:23)
Operation Security AV-Backup (101:07)
Use Case - Technical Control - Baselines (117:36)
Cryptography (106:35)
Nessus Installation (6:49)
Vulnerability Assessments - DLP Project (102:55)
DLP Project, PCI-DSS, Network Support (128:57)
Network Security-Firewall-IS Awareness (112:51)
Technical Controls - Linux OS - Kali Linux (96:22)
Threat Intelligence - BCP_DRP -BIA (98:33)
BIA, BCP, DRP, Linux, Log Management (104:05)
GRC- Ethical Hacking - Log Management (127:46)
EH Phase2 - SET- SOP - CM- Log Management-20211120_200131-Meeting Recording (123:17)
Splunk - Part 1 (21:54)
Basic Cyber Security Foundation
Introduction to Cyber Security Foundation (1:57)
Important Defination (4:03)
CIA (11:23)
Security Governance (8:09)
NIST 800-100 (7:26)
Due Care – Due Diligences (7:23)
Identify Compliance Requirements (8:38)
Understand legal and regulatory - (2:52)
Introduction
Resources to complete your work
Security Policy Framework (24:49)
Build a Testing Lab
The importance of your Virtual Lab (3:13)
Setup your Lab (13:18)
Client Installation (18:53)
Server Installation (12:37)
Server Configuration (3:44)
Active Directory 1 (19:35)
Active Directory 2 (4:11)
Join the domain (7:05)
What is Group Policy ? (2:31)
GPO Implementation (13:07)
Information Asset Management
Introduction
What need to be done
How you can do it
Resources Needed to complete your work
Risk Managment
Introduction
What need to be done
How you can do it
Resources Needed to complete your work
Incident & Problem Managemen
Introduction
What need to be done
How you can do it
Resources Needed to complete your work
Access Control
Introduction
What need to be done
How to do it
Resources Needed to complete your work
Netwok Mangment
Introduction
What need to be done
How to do it
Resources Needed to complete your work
Business Continuity Planning
Introduction
What need to be done
How to do it
Resources Needed to complete your work
IS Aquisition, Development
Introduction
What need to be done
How you can do it
Resources Needed to complete your work
Environmental & Physical Sec
Introduction
What need to be done
How to do it
Resources needed to complete your work
Compliance
Introduction
What need to be done
How you can do it
Resources Needed to complete your work
IS Assurance & Performance
Introduction
What need to be done
How you can do it
Resources Needed to complete your work
Cyber Security Real Projects
AV Enterprose Solution
Data Classification Tool
DLP
Brand Protection Service
GRC
Security Operation Center - SOC
IS Management & Governance
What need to be done
How you can do it
Teach online with
2.Organizational Chart
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock