Udemy - Cybersecurity Fundamentals With Certificate Of Completion
- Category Other
- Type Tutorials
- Language English
- Total size 3.1 GB
- Uploaded By freecoursewb
- Downloads 396
- Last checked 5 days ago
- Date uploaded 5 months ago
- Seeders 15
- Leechers 6
Infohash : BF4F83CDD7BE67A9B4B7CB42F995DD3EEE574DEE
Cybersecurity Fundamentals With Certificate Of Completion
https://WebToolTip.com
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.07 GB | Duration: 1h 32m
Build a Strong Cybersecurity Foundation: Master Threat Detection, Malware Analysis, Risk Mitigation & Compliance
What you'll learn
Identify, assess, and address cyber risks.
Strategies for risk mitigation and treatment
Creating and implementing an Incident Response Plan
Data classification, retention, and secure destruction methods
Understand the CIA Triad
Physical, technical, and administrative security controls
Access Control Mechanisms
Building a culture of cybersecurity awareness within teams
Requirements
Access to a computer or laptop with internet connectivity
No prior cybersecurity experience needed
A willingness to learn
Files:
[ WebToolTip.com ] Udemy - Cybersecurity Fundamentals With Certificate Of Completion- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 1 - Welcome to Cybersecurity Fundamentals
- 1 - Training Overview.mkv (41.3 MB)
- 2 - Introduction.mkv (7.8 MB)
- 3 - Security Principles Overview.mkv (40.1 MB)
- 4 - What is CIA Triad.mkv (118.4 MB)
- 5 - What is Risk Management.mkv (250.0 MB)
- 6 - What are Security Controls.mkv (134.8 MB)
- 10 - What Are The Components Of A Disaster Recovery Plan.mkv (60.9 MB)
- 7 - Incident Response Business Continuity Disaster.mkv (31.3 MB)
- 8 - What is Incident Response.mkv (164.1 MB)
- 9 - Understanding Business Continuity.mkv (77.7 MB)
- 11 - Access Control Concepts Overview.mkv (44.1 MB)
- 12 - Defining Security Control Subject Object and Rule.mkv (181.6 MB)
- 13 - Identifying Controls Assessments and Defense in Depth 1.mkv (103.2 MB)
- 14 - Principle of Least Privilege and Privileged Accounts.mkv (78.9 MB)
- 15 - Segregation Of Duties.mkv (8.8 MB)
- 16 - TwoPerson Integrity.mkv (40.8 MB)
- 17 - What is Physical Security and Types of Physical Access Control.mkv (134.7 MB)
- 18 - What are Logical and RoleBased Access Controls.mkv (64.9 MB)
- 19 - Network Security Overview.mkv (14.4 MB)
- 20 - What is Networking.mkv (256.5 MB)
- 21 - What are the Different Types Of Threats.mkv (294.9 MB)
- 22 - Understanding the OnPremises Data Centers.mkv (165.7 MB)
- 23 - What is Cloud Computing.mkv (279.8 MB)
- 24 - Security Operations Overview.mkv (38.2 MB)
- 25 - What is Data Handling.mkv (229.6 MB)
- 26 - Logging and Monitoring Security Events.mkv (229.2 MB)
- 27 - What is Security Awareness Training.mkv (52.7 MB)
- 1 - PASSWORD SECURITY.html (0.3 KB)
- 2 - DEVICE SECURITY.html (0.6 KB)
- 3 - EMAIL SECURITY.html (0.4 KB)
- 4 - DATA PROTECTION.html (0.5 KB)
- 5 - NETWORK SECURITY.html (0.4 KB)
- 6 - SOCIAL ENGINEERING.html (0.2 KB)
- 7 - INCIDENT RESPONSE.html (0.2 KB)
- 8 - REGULAR TRAINING AND AWARENESS.html (0.4 KB)
- Bonus Resources.txt (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce