Lynda - Foundations of Cybersecurity/01. Introduction/01_01-Welcome.mp4 |
6.2 MB |
Lynda - Foundations of Cybersecurity/01. Introduction/01_02-What you should know.mp4 |
1.9 MB |
Lynda - Foundations of Cybersecurity/02. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 |
12 MB |
Lynda - Foundations of Cybersecurity/02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 |
12.5 MB |
Lynda - Foundations of Cybersecurity/02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 |
9.8 MB |
Lynda - Foundations of Cybersecurity/02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 |
7.8 MB |
Lynda - Foundations of Cybersecurity/02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 |
13.6 MB |
Lynda - Foundations of Cybersecurity/02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 |
13.9 MB |
Lynda - Foundations of Cybersecurity/02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 |
8.8 MB |
Lynda - Foundations of Cybersecurity/03. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 |
7.7 MB |
Lynda - Foundations of Cybersecurity/03. Cybersecurity Threats/03_02-Dissecting security threats.mp4 |
11 MB |
Lynda - Foundations of Cybersecurity/03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 |
9.5 MB |
Lynda - Foundations of Cybersecurity/03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 |
8.6 MB |
Lynda - Foundations of Cybersecurity/03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 |
9.4 MB |
Lynda - Foundations of Cybersecurity/03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 |
9.3 MB |
Lynda - Foundations of Cybersecurity/03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 |
12.9 MB |
Lynda - Foundations of Cybersecurity/03. Cybersecurity Threats/03_08-Exploring ransomware.mp4 |
8 MB |
Lynda - Foundations of Cybersecurity/04. Security Architecture/04_01-Describing security requirements.mp4 |
14.2 MB |
Lynda - Foundations of Cybersecurity/04. Security Architecture/04_02-Architecting security risk.mp4 |
12.9 MB |
Lynda - Foundations of Cybersecurity/04. Security Architecture/04_03-Selecting security controls.mp4 |
8.1 MB |
Lynda - Foundations of Cybersecurity/04. Security Architecture/04_04-Managing user access and identity.mp4 |
19.7 MB |
Lynda - Foundations of Cybersecurity/04. Security Architecture/04_05-Implementing preventative security.mp4 |
17.9 MB |
Lynda - Foundations of Cybersecurity/04. Security Architecture/04_06-Monitoring and alerts.mp4 |
15 MB |
Lynda - Foundations of Cybersecurity/05. Incident Management/05_01-Managing incident response.mp4 |
8.1 MB |
Lynda - Foundations of Cybersecurity/05. Incident Management/05_02-Preparing for an incident.mp4 |
13.5 MB |
Lynda - Foundations of Cybersecurity/05. Incident Management/05_03-Responding to an incident.mp4 |
10.9 MB |
Lynda - Foundations of Cybersecurity/06. Conclusion/06_01-Next steps.mp4 |
3.4 MB |