00:00
00:00
Ultimate Cybersecurity Masterclass 2024 (Video Edition)
Focused View
8:52:41
001. Chapter 1. Cybersecurity and hackers.mp4
06:25
002. Chapter 1. Why should you care about cybersecurity.mp4
01:23
003. Chapter 1. Who is the ideal reader for this book.mp4
00:51
004. Chapter 1. How does hacking and defending work.mp4
03:37
005. Chapter 1. What will you learn in this book.mp4
02:41
006. Chapter 1. What we won t cover.mp4
03:19
007. Chapter 1. What tools do you need to get started.mp4
00:22
008. Chapter 1. Summary.mp4
00:39
009. Chapter 2. Cybersecurity Everyone s problem.mp4
03:52
010. Chapter 2. Impacts of a security breach.mp4
04:46
011. Chapter 2. Objectives of a cybersecurity strategy.mp4
10:17
012. Chapter 2. Supporting our strategy Building a patching policy.mp4
08:57
013. Chapter 2. A culture of security.mp4
08:05
014. Chapter 2. How ready are you.mp4
03:36
015. Chapter 2. Summary.mp4
01:39
016. Part 1.mp4
01:37
017. Chapter 3. Understanding hackers.mp4
05:23
018. Chapter 3. Where do they come from.mp4
07:51
019. Chapter 3. What are hackers capable of.mp4
07:25
020. Chapter 3. Working through a real-life problem How do hackers think.mp4
08:16
021. Chapter 3. Summary.mp4
01:12
022. Chapter 4. External attacks.mp4
13:13
023. Chapter 4. Data injection attacks.mp4
13:52
024. Chapter 4. Malware Viruses, Trojans, and ransomware.mp4
10:18
025. Chapter 4. Dodgy Wi-Fi.mp4
06:28
026. Chapter 4. Mobile phones, SMS, and 5G.mp4
22:13
027. Chapter 4. Summary.mp4
01:56
028. Chapter 5. Tricking our way in Social engineering.mp4
18:01
029. Chapter 5. Malicious USB.mp4
08:09
030. Chapter 5. Targeted attacks Phishing.mp4
05:21
031. Chapter 5. Credential theft and passwords.mp4
11:32
032. Chapter 5. Building access cards.mp4
13:58
033. Chapter 5. Summary.mp4
02:17
034. Chapter 6. Internal attacks.mp4
06:44
035. Chapter 6. Gaining more control Privilege escalation.mp4
05:14
036. Chapter 6. Data theft.mp4
11:43
037. Chapter 6. Insider threats.mp4
10:07
038. Chapter 6. Blast radius Limiting the damage.mp4
09:33
039. Chapter 6. Building your castle Defense in depth.mp4
15:53
040. Chapter 6. Summary.mp4
02:29
041. Chapter 7. The Dark Web Where is stolen data traded.mp4
14:16
042. Chapter 7. How to access the Dark Web.mp4
07:50
043. Chapter 7. How is the Dark Web used.mp4
10:20
044. Chapter 7. Summary.mp4
01:00
045. Part 2.mp4
01:06
046. Chapter 8. Understanding risk.mp4
07:22
047. Chapter 8. How likely is a hack.mp4
08:20
048. Chapter 8. How bad will it be.mp4
16:49
049. Chapter 8. A simple model to measure risk.mp4
05:00
050. Chapter 8. How do I measure and communicate this.mp4
07:55
051. Chapter 8. Summary.mp4
00:52
052. Chapter 9. Testing your systems.mp4
07:05
053. Chapter 9. Vulnerability management.mp4
07:27
054. Chapter 9. Break your own stuff Penetration testing.mp4
19:23
055. Chapter 9. Getting expert help Bug bounties.mp4
05:46
056. Chapter 9. Breaking in Physical penetration testing.mp4
08:10
057. Chapter 9. Red teams and blue teams.mp4
12:10
058. Chapter 9. Summary.mp4
01:51
059. Chapter 10. Inside the security operations center.mp4
11:50
060. Chapter 10. Dealing with attacks Incident response.mp4
12:00
061. Chapter 10. Keeping track of everything Security and Information Event Management.mp4
11:31
062. Chapter 10. Gaining intelligence Data feeds.mp4
05:00
063. Chapter 10. Summary.mp4
00:52
064. Chapter 11. Protecting the people.mp4
06:57
065. Chapter 11. MFA.mp4
08:40
066. Chapter 11. Protecting from ransomware.mp4
05:15
067. Chapter 11. Education and support.mp4
04:38
068. Chapter 11. Summary.mp4
01:12
069. Chapter 12. After the hack.mp4
13:18
070. Chapter 12. Where to get help.mp4
18:13
071. Chapter 12. What to do next.mp4
02:35
072. Chapter 12. Lessons learned.mp4
05:54
073. Chapter 12. Summary.mp4
00:50
More details
Course Overview
This comprehensive video course gives you complete cybersecurity knowledge in 31961 seconds. Learn to protect systems, understand threats, and implement security measures through engaging video lessons.
What You'll Learn
- Fundamentals of modern cybersecurity threats
- Best practices for system protection
- How to respond to security incidents
Who This Is For
- IT professionals expanding security skills
- Business owners protecting their data
- Aspiring cybersecurity specialists
Key Benefits
- Practical security skills from industry experts
- Visual learning through video demonstrations
- Comprehensive coverage of cybersecurity essentials
Curriculum Highlights
- Cybersecurity foundations & threat landscape
- Protection strategies & tools
- Incident response & best practices
Focused display
Category
- language english
- Training sessions 73
- duration 8:52:41
- Release Date 2025/04/19