Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Exclusive - Cyber Security Specialist (Hybrid Workshop)
Introduction to the program
Intro (0:09)
Target Audiences (0:56)
Instructors (1:25)
Indentify the problem (6:42)
Technical Labs Intro (2:51)
.JD (5:16)
ISO 27001 Project
First Project ISO27001 (6:38)
ISO27001_2022 (8:03)
CIA Triad (3:11)
First Project_Hospital (5:58)
IS Policy (15:26)
Information Asset Register_Part1 (14:40)
Information Asset Register_Part2 (11:22)
Assignment1 (10:20)
Risk Management (6:41)
Risk Assessment (15:04)
Risk Standard ISO 27005 (10:45)
Real Risk Register (6:19)
Assignment Risk Assessment (6:17)
Risk Management Strategy (9:14)
Risk Acceptance (5:24)
Technical Controls
Baselines and checklist (10:54)
Technical Security Implementation (7:07)
Validate Baselines (7:36)
Security Checklists (5:23)
Baselines Assignment (4:02)
Network Fundamentals
MAC Address (4:07)
Module Intro (0:39)
IP Address (2:23)
Subnet Mask (3:08)
DNS (2:28)
DHCP (1:39)
NAT (2:25)
Ports (2:32)
Switch (2:11)
Router (1:57)
Firewall (2:15)
VPN (4:35)
Workgroup vs Domain (2:56)
New section
Install Virtual Box (1:36)
Virtual Box Intro (10:04)
Import VMs (1:36)
Discover Lab (8:49)
Module Intro (0:33)
Managing Objects in AD (6:25)
Group Policy Intro (2:02)
Password Policy (7:19)
Apply User Policy (3:40)
Apply Computer Policy (3:30)
Vulnerability Management
Nessus AV Tool (11:41)
Vulnerability Management (10:06)
VA Report (7:18)
Emergency VA (4:02)
Module Intro (0:26)
What are Vulnerabilities Scanner (1:41)
Nessus Vulnerability Scanner (3:05)
Nessus Plugins (4:28)
Ports Scan vs Credential Scan (2:34)
Nessus Scan Templates (1:34)
Host Discovery (2:26)
Basic Network Scan (6:04)
Advanced Scan (8:26)
Advnaced Dynamic Scan (2:07)
Policies and Plugin Rules (3:01)
Assignment-Vulnerability Assessment (2:00)
DLP Project
Information Protection (2:55)
Use Case – Implementing Data Classification and DLP (1:50)
Microsoft Compliance Tool (3:30)
Data Classification and Labeling (6:29)
Create a Label (12:06)
DLP Implementation (13:58)
Creating SOW (8:38)
Success Criteria (4:35)
Assignment_DLP Implementation Plan (4:03)
Module Intro (0:25)
What is DLP (1:31)
What is ManageEngine DLP and how it works (1:21)
Create Data Rule (6:16)
Policy Deployment (5:46)
Cryptography
Module Intro (0:51)
What is Cryptography (2:16)
Cipher and Key in Cryptography (2:45)
Symmetric Key Cryptography (3:34)
Asymmetric Key Cryptography (9:45)
Hash function (9:51)
Digital Signature (4:45)
New section
Protection Against Malware (4:37)
Enterprise AV Management (6:55)
File Hash (9:42)
Virus Total (5:47)
AV Managment (3:01)
Assignment-AV Management (2:54)
New section
Module Intro (0:22)
Kaspersky System Center Overview (6:41)
Deploy Installation Packages on Devices (3:23)
Test Kaspersky Workstation (2:31)
Reports (3:06)
Event Selections (2:36)
Network Security
Private IP vs Public IP (13:06)
Network Security (3:38)
Ports (10:22)
Host based Firewall (8:30)
Firewall
What is the Firewall (1:27)
Module Intro (0:37)
Software Firewalls vs Hardware Firewalls (5:59)
Windows Firewall Demo (2:44)
FortiGate Firewall Demo (5:42)
Apply Application Control Policy (2:49)
Threat Intelligence
Threat Intelligence (11:08)
IOC Report (4:43)
Incident Management
Incident Management (10:31)
Assignment-Incident Report (2:07)
Assignment-Incident Management Policy (2:53)
Assignment-Incidents (5:45)
Information Security Awareness
Job function awareness (8:32)
Information Security Awareness (4:38)
IS Awareness Samples (4:22)
IS Awareness Effectivenes (6:31)
Social Engineering Campaign (5:54)
Assigment Information Security Awareness Plan (3:28)
BCP-DRP
BCP and DRP (3:01)
Disaster Recovery Plan-DRP (3:40)
BIA (4:56)
MTD-RTO-RPO (9:10)
Restoration Plan and Testing (10:53)
Assignment-Disaster Recovery Plan (1:44)
High Availability
What are Data Backup Types (3:01)
Module Intro (0:49)
Symantec Backup Exec Demo (9:20)
What is RAID (4:34)
RAID Demo (4:07)
What is Failover Cluster (1:35)
Failover Cluster Demo (4:54)
Cloud Security
Module Intro (0:46)
What is Cloud Service (1:50)
Cloud service models (3:08)
IaaS - PaaS - SaaS - FaaS - STaaS (9:26)
What is Cloud Security (3:05)
Cloud Security Checklist (2:38)
AWS Cloud Security Architecture Scenario (3:13)
Azure Web Application Security Scenario (2:26)
SIEM
Module Intro (0:43)
What are SIEM Solutions (2:19)
What is Splunk and How it works (1:25)
Getting Data into Splunk (2:12)
Upload Data into Splunk (5:15)
Searching and Navigation (3:13)
Task 1 (5:09)
Task 2 (3:34)
Task 3 (3:48)
Task 4 (6:52)
End Point Security
What is End Point Security (2:04)
Module Intro (0:46)
Common Endpoint Security Threats (2:18)
What is MS Intune - MDM - MAM (3:06)
Demo Enroll End point devices (4:15)
Demo Security Baselines Policy (1:28)
Demo Disk Encryption Policy (1:09)
Demo EDR Policy (0:58)
Demo Compliance Polices (2:09)
Demo Configuration Profiles (2:18)
Demo Enrollment Restrictions (1:50)
Demo Deploy Microsoft 365 Apps to Windows (1:26)
System Hacking
What is Ethical Hacking (1:33)
Module Intro (1:25)
What are Security Threats (2:49)
What are the types and tools of Hacking (2:28)
What is Social Engineering (2:40)
What are the phases of Hacking (2:30)
What is Server Side Attack (2:29)
What is Client Side Attack (2:06)
Reconnaissance Demo Google Dorking (3:14)
Reconnaissance Demo Shodan (1:47)
Reconnaissance Demo Maltego (2:14)
Scanning Demo nmap (3:53)
Attack Demo Server Side Attack (8:36)
Attack Demo ARP Spoofing (5:55)
Attack Demo Client Side Attack (5:14)
Teach online with
IS Awareness Effectivenes
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock