Essential Guide to Cybersecurity
This course represents the essentials of Cybersecurity, and it is designed in the way that the capabilities learned by following this training course will be used to protect organizations and the society as a whole from areas of emerging threats.
1
Segment - 01 - Welcome to the course
Segment - 02 - Introductory Remarks
Segment - 03 - What is Cybersecurity?
Segment - 04 - Fundamental tenets of cybersecurity
2
Segment - 05 - Photo or information leakage
Segment - 06 - Threat Landscape
Segment - 07 - Endless security incident
3
Segment - 08 - attack-surface
Segment - 09 - Malware and Vulnerabilities
Segment - 10 - The open SCAP Project
Segment - 11 - The Center for Internet Security
Segment - 12 - Malware and Vulnerability Scanners
Segment - 13 - The Cloud Controls Matrix (CCM)
Segment - 14 - The Open Web Application Security Project-(OWSAP)
Segment - 15 - Federal Information Processing Standards (FIPS)
Segment - 16 - Identifying and scoring vulnerabilities
Segment - 17 - National Checklist Program (NCP)
4
Segment - 18 - Compliance & Data Privacy
5
Segment - 19 - What is Cybersecurity Culture?
Segment - 20 - Why is it important in the workplace?
Segment - 21 - How to measure the level and track changes?
6
Segment - 22 - Security Personal Shortage