What you'll learn Understanding of Cybersecurity Fundamentals: Students would gain a solid foundation in cybersecurity principles, concepts, and terminology. Students would learn how to assess and manage cybersecurity risks within an organizational context. Students would become familiar with a range of security controls, technologies, and best practices. Students would develop an understanding of the ethical and legal dimensions of cybersecurity.
~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4
9 MB
~Get Your Files Here !/1 - Introduction/2 - Frameworks.mp4
22.1 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/3 - Is hardware software maintained internally.mp4
54.3 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/4 - Hardware or software older than 5 years old.mp4
46.9 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/5 - Is there an inventory of all equipment.mp4
63.1 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/6 - Does the company know who report an incident to and the procedure to do so.mp4
47.8 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/6 - Udemy-worksheets.pdf
5.6 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/7 - A possible solution.mp4
10.5 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/7 - Digital-business-card-1.pdf
43.6 KB
~Get Your Files Here !/3 - Mobile Devices BYOD/10 - Is a VPN being used for remote access.mp4
22.7 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/11 - Digital-business-card-1.pdf
43.6 KB
~Get Your Files Here !/3 - Mobile Devices BYOD/11 - VPN solution.mp4
35.4 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/8 - Who owns the mobile devices used within the company.mp4
48 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/9 - Are devices set to auto connect to Bluetooth and WiFi networks.mp4
24 MB
~Get Your Files Here !/4 - Login Password/12 - Can employees reset passwords lock out owners.mp4
61.2 MB
~Get Your Files Here !/4 - Login Password/13 - Does someone monitor login activity.mp4
31.7 MB
~Get Your Files Here !/4 - Login Password/14 - Digital-business-card-1.pdf
43.6 KB
~Get Your Files Here !/4 - Login Password/14 - SEIM solution for SMB.mp4
29.3 MB
~Get Your Files Here !/4 - Login Password/15 - Is there a strict password creation and update policy in place.mp4
34.3 MB
~Get Your Files Here !/5 - Website Social Media/16 - Who has access and authorization to distribute websocial media content.mp4
32.2 MB
~Get Your Files Here !/5 - Website Social Media/17 - Do all employees have web access and is it monitored.mp4
61.2 MB
~Get Your Files Here !/6 - Data Storage Backup/18 - Does the company use cloud based backup services.mp4
32.2 MB
~Get Your Files Here !/6 - Data Storage Backup/19 - Are regulatory guidelines being followed HIPPA DoD PCI.mp4
26.8 MB
~Get Your Files Here !/7 - Analyze the risk/20 - What are the threats you face.mp4
38.4 MB
~Get Your Files Here !/8 - Conclusion whats next/21 - Conclusion.mp4
49.4 MB
~Get Your Files Here !/8 - Conclusion whats next/21 - Digital-business-card-1.pdf
43.6 KB
~Get Your Files Here !/8 - Conclusion whats next/21 - risk-assessment.png
375.5 KB
~Get Your Files Here !/Bonus Resources.txt
386 B
Alternative Torrents for 'Udemy Cybersecurity Assessment For Small And Mid Size Business'.