Introduction to Cybersecurity Fundamentals
This course focuses on building a foundation for the principles of Cyber Security and protections of data within computers, devices and networks.
Segment 01 - Introduction to the course & instructor
Segment 02 - Getting Started: Defining Cybersecurity
Segment 03 - Reviewing The Security Model: Authentication
Segment 04 - Your Data Online: Confidentiality, Integrity, & Availability
Segment 05 - Key Concepts: Authorization & Non-Repudiation
Segment 06 - Top 4: The Most Common Cyber Attacks
Segment 07 - The Psychology Behind Cyber Attacks
Segment 08 - Playing Defense Through Risk Mitigation
Segment 09 - Going Beyond Traditional Passwords
Segment 10 - Three Key Elements For Authentication
Segment 11 - Vulnerability Alert: Email Spoofing
Segment 12 - Top 6: Keys For Securing Your Emails At Work
Segment 13 - Identifying Different Types Of Data
Segment 14 - Protecting Data Through Encryption
Segment 15 - Protecting Data Through Deletion (Part 1)
Segment 16 - Protecting Data Through Deletion (Part 2)
Segment 17 - The Framework Of IR
Segment 18 - The Early Steps Of The IR Process
Segment 19 - The Final Steps of the IR Process
Segment 20 - Conclusion & Takeaways