Home Search Profile
00:00
00:00

Ultimate Cybersecurity Masterclass 2024 (Video Edition)

Focused View

8:52:41

  • 001. Chapter 1. Cybersecurity and hackers.mp4
    06:25
  • 002. Chapter 1. Why should you care about cybersecurity.mp4
    01:23
  • 003. Chapter 1. Who is the ideal reader for this book.mp4
    00:51
  • 004. Chapter 1. How does hacking and defending work.mp4
    03:37
  • 005. Chapter 1. What will you learn in this book.mp4
    02:41
  • 006. Chapter 1. What we won t cover.mp4
    03:19
  • 007. Chapter 1. What tools do you need to get started.mp4
    00:22
  • 008. Chapter 1. Summary.mp4
    00:39
  • 009. Chapter 2. Cybersecurity Everyone s problem.mp4
    03:52
  • 010. Chapter 2. Impacts of a security breach.mp4
    04:46
  • 011. Chapter 2. Objectives of a cybersecurity strategy.mp4
    10:17
  • 012. Chapter 2. Supporting our strategy Building a patching policy.mp4
    08:57
  • 013. Chapter 2. A culture of security.mp4
    08:05
  • 014. Chapter 2. How ready are you.mp4
    03:36
  • 015. Chapter 2. Summary.mp4
    01:39
  • 016. Part 1.mp4
    01:37
  • 017. Chapter 3. Understanding hackers.mp4
    05:23
  • 018. Chapter 3. Where do they come from.mp4
    07:51
  • 019. Chapter 3. What are hackers capable of.mp4
    07:25
  • 020. Chapter 3. Working through a real-life problem How do hackers think.mp4
    08:16
  • 021. Chapter 3. Summary.mp4
    01:12
  • 022. Chapter 4. External attacks.mp4
    13:13
  • 023. Chapter 4. Data injection attacks.mp4
    13:52
  • 024. Chapter 4. Malware Viruses, Trojans, and ransomware.mp4
    10:18
  • 025. Chapter 4. Dodgy Wi-Fi.mp4
    06:28
  • 026. Chapter 4. Mobile phones, SMS, and 5G.mp4
    22:13
  • 027. Chapter 4. Summary.mp4
    01:56
  • 028. Chapter 5. Tricking our way in Social engineering.mp4
    18:01
  • 029. Chapter 5. Malicious USB.mp4
    08:09
  • 030. Chapter 5. Targeted attacks Phishing.mp4
    05:21
  • 031. Chapter 5. Credential theft and passwords.mp4
    11:32
  • 032. Chapter 5. Building access cards.mp4
    13:58
  • 033. Chapter 5. Summary.mp4
    02:17
  • 034. Chapter 6. Internal attacks.mp4
    06:44
  • 035. Chapter 6. Gaining more control Privilege escalation.mp4
    05:14
  • 036. Chapter 6. Data theft.mp4
    11:43
  • 037. Chapter 6. Insider threats.mp4
    10:07
  • 038. Chapter 6. Blast radius Limiting the damage.mp4
    09:33
  • 039. Chapter 6. Building your castle Defense in depth.mp4
    15:53
  • 040. Chapter 6. Summary.mp4
    02:29
  • 041. Chapter 7. The Dark Web Where is stolen data traded.mp4
    14:16
  • 042. Chapter 7. How to access the Dark Web.mp4
    07:50
  • 043. Chapter 7. How is the Dark Web used.mp4
    10:20
  • 044. Chapter 7. Summary.mp4
    01:00
  • 045. Part 2.mp4
    01:06
  • 046. Chapter 8. Understanding risk.mp4
    07:22
  • 047. Chapter 8. How likely is a hack.mp4
    08:20
  • 048. Chapter 8. How bad will it be.mp4
    16:49
  • 049. Chapter 8. A simple model to measure risk.mp4
    05:00
  • 050. Chapter 8. How do I measure and communicate this.mp4
    07:55
  • 051. Chapter 8. Summary.mp4
    00:52
  • 052. Chapter 9. Testing your systems.mp4
    07:05
  • 053. Chapter 9. Vulnerability management.mp4
    07:27
  • 054. Chapter 9. Break your own stuff Penetration testing.mp4
    19:23
  • 055. Chapter 9. Getting expert help Bug bounties.mp4
    05:46
  • 056. Chapter 9. Breaking in Physical penetration testing.mp4
    08:10
  • 057. Chapter 9. Red teams and blue teams.mp4
    12:10
  • 058. Chapter 9. Summary.mp4
    01:51
  • 059. Chapter 10. Inside the security operations center.mp4
    11:50
  • 060. Chapter 10. Dealing with attacks Incident response.mp4
    12:00
  • 061. Chapter 10. Keeping track of everything Security and Information Event Management.mp4
    11:31
  • 062. Chapter 10. Gaining intelligence Data feeds.mp4
    05:00
  • 063. Chapter 10. Summary.mp4
    00:52
  • 064. Chapter 11. Protecting the people.mp4
    06:57
  • 065. Chapter 11. MFA.mp4
    08:40
  • 066. Chapter 11. Protecting from ransomware.mp4
    05:15
  • 067. Chapter 11. Education and support.mp4
    04:38
  • 068. Chapter 11. Summary.mp4
    01:12
  • 069. Chapter 12. After the hack.mp4
    13:18
  • 070. Chapter 12. Where to get help.mp4
    18:13
  • 071. Chapter 12. What to do next.mp4
    02:35
  • 072. Chapter 12. Lessons learned.mp4
    05:54
  • 073. Chapter 12. Summary.mp4
    00:50
  • More details


    Course Overview

    This comprehensive video course gives you complete cybersecurity knowledge in 31961 seconds. Learn to protect systems, understand threats, and implement security measures through engaging video lessons.

    What You'll Learn

    • Fundamentals of modern cybersecurity threats
    • Best practices for system protection
    • How to respond to security incidents

    Who This Is For

    • IT professionals expanding security skills
    • Business owners protecting their data
    • Aspiring cybersecurity specialists

    Key Benefits

    • Practical security skills from industry experts
    • Visual learning through video demonstrations
    • Comprehensive coverage of cybersecurity essentials

    Curriculum Highlights

    1. Cybersecurity foundations & threat landscape
    2. Protection strategies & tools
    3. Incident response & best practices
    Focused display
    • language english
    • Training sessions 73
    • duration 8:52:41
    • Release Date 2025/04/19

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness

    Subtitles
    CISSP Pro: 125 Complex Practice Questions 2025
    CISSP Pro: 125 Complex Practice Questions 2025
    33:10
    English subtitles
    01/27/2025
    Subtitles
    CISSP Mastery: 125 Expert-Level Questions 2025
    CISSP Mastery: 125 Expert-Level Questions 2025
    33:10
    English subtitles
    01/27/2025
    Subtitles
    CISSP Pro: 125 Complex Practice Questions 2025
    CISSP Pro: 125 Complex Practice Questions 2025
    33:10
    English subtitles
    01/27/2025