Mastering Cybersecurity: The Cyber Educational Audio Course

Ukupno trajanje: 9 h 33 min
Threat-Informed Defense: Using ATT&CK and Models to Plan Improvements
Mastering Cybersecurity: The Cyber Educational Audio Course
11:08
Triage 101: What Happens When an Alert Fires.
Mastering Cybersecurity: The Cyber Educational Audio Course
14:07
Logs, Events, and Alerts: Turning Raw Data Into a Story
Mastering Cybersecurity: The Cyber Educational Audio Course
11:10
Types of Security Controls: Preventive, Detective, Corrective, and More
Mastering Cybersecurity: The Cyber Educational Audio Course
10:28
Defense in Depth: Layers That Work Together
Mastering Cybersecurity: The Cyber Educational Audio Course
11:12
Network Segmentation Made Simple
Mastering Cybersecurity: The Cyber Educational Audio Course
11:20
You Can’t Secure What You Can’t See: Asset Inventory Basics
Mastering Cybersecurity: The Cyber Educational Audio Course
09:01
Patch and Update Management Foundations
Mastering Cybersecurity: The Cyber Educational Audio Course
12:04
Vulnerabilities, CVEs, and CVSS Scores Explained.
Mastering Cybersecurity: The Cyber Educational Audio Course
12:54
Threat Modeling 101: Thinking Like an Attacker
Mastering Cybersecurity: The Cyber Educational Audio Course
13:12
Cyber Kill Chain and Attack Lifecycles
Mastering Cybersecurity: The Cyber Educational Audio Course
10:37
Navigating the MITRE ATTACK Matrix
Mastering Cybersecurity: The Cyber Educational Audio Course
12:38
NIST CSF 2.0 in Plain English
Mastering Cybersecurity: The Cyber Educational Audio Course
17:36
Welcome to Mastering Cybersecurity!
Mastering Cybersecurity: The Cyber Educational Audio Course
01:21
Designing & Defending Secure Systems
Mastering Cybersecurity: The Cyber Educational Audio Course
20:39
Emerging Threats & Defensive Strategies
Mastering Cybersecurity: The Cyber Educational Audio Course
21:52
Application and API Security
Mastering Cybersecurity: The Cyber Educational Audio Course
22:30
Infrastructure, Cloud, and Supply Chain Security
Mastering Cybersecurity: The Cyber Educational Audio Course
21:58
Secure Systems & Network Architecture
Mastering Cybersecurity: The Cyber Educational Audio Course
22:32
Identity, Authentication, and Access Control
Mastering Cybersecurity: The Cyber Educational Audio Course
23:59
Cryptography in Context
Mastering Cybersecurity: The Cyber Educational Audio Course
31:51
Security Foundations & Risk in the Modern Enterprise
Mastering Cybersecurity: The Cyber Educational Audio Course
25:48
Mobile Application Security
Mastering Cybersecurity: The Cyber Educational Audio Course
13:52
The Cybersecurity Maturity Model
Mastering Cybersecurity: The Cyber Educational Audio Course
14:33
Security Hardening
Mastering Cybersecurity: The Cyber Educational Audio Course
08:53
Data Privacy
Mastering Cybersecurity: The Cyber Educational Audio Course
11:31
Cybersecurity Insurance
Mastering Cybersecurity: The Cyber Educational Audio Course
11:51
Bug Bounty Programs
Mastering Cybersecurity: The Cyber Educational Audio Course
13:04
Application Whitelisting
Mastering Cybersecurity: The Cyber Educational Audio Course
11:41
Multi-Cloud Security
Mastering Cybersecurity: The Cyber Educational Audio Course
15:35
Active Directory Security
Mastering Cybersecurity: The Cyber Educational Audio Course
17:49
Basics of Digital Footprints
Mastering Cybersecurity: The Cyber Educational Audio Course
09:48
Open Source Intelligence
Mastering Cybersecurity: The Cyber Educational Audio Course
11:28
Building a Security Champion Program in Your Organization
Mastering Cybersecurity: The Cyber Educational Audio Course
11:25
Phishing Simulations: Training to Recognize Deceptive Attacks
Mastering Cybersecurity: The Cyber Educational Audio Course
10:23
DNS Security
Mastering Cybersecurity: The Cyber Educational Audio Course
13:19
Blockchain Security
Mastering Cybersecurity: The Cyber Educational Audio Course
09:25
What Are Brute Force Attacks
Mastering Cybersecurity: The Cyber Educational Audio Course
13:14
The Enemy Within: Tackling Insider Threats
Mastering Cybersecurity: The Cyber Educational Audio Course
10:35
Keeping Data Home: Data Loss Prevention
Mastering Cybersecurity: The Cyber Educational Audio Course
15:13