Effective Cybersecurity A Guide to Using Best Practices and Standards

Effective Cybersecurity A Guide to Using Best Practices and Standards
English | Size: 14.61 MB
Category: Security

• Understand the cybersecurity discipline and the role of standards and best practices
• Define security governance, assess risks, and manage strategy and tactics
• Safeguard information and privacy, and ensure GDPR compliance
• Harden systems across the system development life cycle (SDLC)
• Protect servers, virtualized systems, and storage
• Secure networks and electronic communications, from email to VoIP
• Apply the most appropriate methods for user authentication
• Mitigate security risks in supply chains and cloud environments [Read more…]

Packt Risk Management for Cybersecurity and IT Managers

Packt Risk Management for Cybersecurity and IT Managers
English | Size: 947.31 MB
Category: CBTs

Have you ever wondered why your organization’s executives or your manager made a decision to fund or not fund your project? In this course, you will get an inside look at how cybersecurity and information technology (IT) managers determine which projects they will support with funding and which they won’t based on a preliminary risk analysis. Over the past two decades, I have worked in the cybersecurity and information technology realm, fighting for my projects to become funded. Early in my career, I didn’t understand why certain projects would be funded and executed, while others wouldn’t. What I learned, it all came down to risk management by our executives and managers.
[Read more…]

Cybersecurity (Attacks Red Team Activity) | Packt Publishing

Cybersecurity (Attacks Red Team Activity) | Packt Publishing
English | Size: 934.14 MB
Category: CBTs

There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network-and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans. [Read more…]

Cybersecurity (Attacks Red Team Activity)

Cybersecurity (Attacks Red Team Activity)
English | Size: 934.14 MB
Category: CBTs

There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network-and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans.
[Read more…]

Packt Publishing – CompTIA Cybersecurity Analyst CSA+ CS0-001


Packt Publishing – CompTIA Cybersecurity Analyst CSA+ CS0-001
English | Size: 2.26 GB
Genre: eLearning

[Read more…]

Lynda – Cybersecurity Awareness – The Internet of Things (IoT)

Lynda – Cybersecurity Awareness – The Internet of Things (IoT)
English | Size: 95.88 MB
Category: IOT

The Internet of Things (IoT) will change our personal and professional lives forever. By 2020, there are expected to be over 50 billion devices communicating through the internet, ranging from doorbells and thermostats, to cars and washing machines. These devices can make our lives easier and more efficient, but the technology may put our safety and privacy at risk. Knowing about the how the Internet of Things works and what we can do to be safe is important. In this course, Tom Tobiassen provides a basic understanding of IoT, including robots, wearable tech, smart cars, and drones. He discusses the security and privacy implications as well as protective countermeasures that even casual IoT users should know. [Read more…]

Lynda – Cybersecurity Awareness – Security for Cloud Services

Lynda – Cybersecurity Awareness – Security for Cloud Services
English | Size: 111.34 MB
Category: Tutorial

Many organizations are abandoning on-premises hosting in favor of cloud services-however, cloud computing is still a mystery to many. By becoming better acquainted with the various types of cloud offerings-as well as the general security risks involved with each option-companies and organizations can determine if cloud services are right for them. This course covers the different types of cloud service offerings, and presents security advantages and disadvantages as well. Plus, learn about the risks associated with using Skype and Dropbox, as well as risk mitigation strategies. [Read more…]

Lynda – Cybersecurity Awareness – Identifying Personally Identifiable Information

Lynda – Cybersecurity Awareness – Identifying Personally Identifiable Information
English | Size: 144.27 MB
Category: CBTs

As we use our computers to play games, pay for goods and services, and apply for jobs, our online identity is constructed from bits of information that we may or may not be conscious of revealing or sharing. This course discusses different information sources about who we are, what we do, where we are, and with whom we are associated-and how we can protect that information from misuse or corruption. Instructor Jennifer Kurtz explains how personally identifiable information (PII) is formed, and how it is valued and used in the marketplace by legitimate and criminal actors. She also covers the formal and informal capture of PII; goes into the legal and regulatory properties of PII; dives into breach case studies in the medical, financial, educational, government, and commercial sectors; and offers PII protection practices for both individuals and organizations. [Read more…]

Lynda – Cybersecurity Awareness – Cybersecurity While Traveling

Lynda – Cybersecurity Awareness – Cybersecurity While Traveling
English | Size: 86.66 MB
Category: CBTs

Tightly controlled security is a lot tougher when you are on the road. Learn about the various cybersecurity situations you will run into while traveling, and the technology that can be used to help keep you safe. This course reviews the triangle of security, as well as wireless and wired threats and countermeasures. Instructor Jordan Scott designed the training primarily to raise awareness of travel situations commonly encountered while trying to maintain connectivity. This includes accessing open Wi-Fi networks securely, using SSL, setting up VPNs, and more. [Read more…]

Lynda – Cybersecurity Awareness – Building Your Cybersecurity Vocabulary

Lynda – Cybersecurity Awareness – Building Your Cybersecurity Vocabulary
English | Size: 99.57 MB
Category: Tutorial

Cybersecurity can be an intimidating world to navigate. To speak intelligently on the subject, one must have a basic understanding of certain acronyms and terminology-much of which isn’t immediately easy to decode. This practical course was designed to help beginners build their cybersecurity vocabulary, and give them the foundational knowledge they need to approach this subject with confidence. Here, instructor Serge Borso breaks down the vocabulary heard in the cybersecurity industry, and presents scenarios where those words, phrases, and acronyms are used. Upon wrapping up this course, you should have a solid foundation of what cybersecurity is, and what it entails. [Read more…]