Lynda – Cybersecurity Awareness – The Internet of Things (IoT)

Lynda – Cybersecurity Awareness – The Internet of Things (IoT)
English | Size: 95.88 MB
Category: IOT

The Internet of Things (IoT) will change our personal and professional lives forever. By 2020, there are expected to be over 50 billion devices communicating through the internet, ranging from doorbells and thermostats, to cars and washing machines. These devices can make our lives easier and more efficient, but the technology may put our safety and privacy at risk. Knowing about the how the Internet of Things works and what we can do to be safe is important. In this course, Tom Tobiassen provides a basic understanding of IoT, including robots, wearable tech, smart cars, and drones. He discusses the security and privacy implications as well as protective countermeasures that even casual IoT users should know. [Read more…]

Lynda – Cybersecurity Awareness – Security for Cloud Services

Lynda – Cybersecurity Awareness – Security for Cloud Services
English | Size: 111.34 MB
Category: Tutorial

Many organizations are abandoning on-premises hosting in favor of cloud services-however, cloud computing is still a mystery to many. By becoming better acquainted with the various types of cloud offerings-as well as the general security risks involved with each option-companies and organizations can determine if cloud services are right for them. This course covers the different types of cloud service offerings, and presents security advantages and disadvantages as well. Plus, learn about the risks associated with using Skype and Dropbox, as well as risk mitigation strategies. [Read more…]

Lynda – Cybersecurity Awareness – Identifying Personally Identifiable Information

Lynda – Cybersecurity Awareness – Identifying Personally Identifiable Information
English | Size: 144.27 MB
Category: CBTs

As we use our computers to play games, pay for goods and services, and apply for jobs, our online identity is constructed from bits of information that we may or may not be conscious of revealing or sharing. This course discusses different information sources about who we are, what we do, where we are, and with whom we are associated-and how we can protect that information from misuse or corruption. Instructor Jennifer Kurtz explains how personally identifiable information (PII) is formed, and how it is valued and used in the marketplace by legitimate and criminal actors. She also covers the formal and informal capture of PII; goes into the legal and regulatory properties of PII; dives into breach case studies in the medical, financial, educational, government, and commercial sectors; and offers PII protection practices for both individuals and organizations. [Read more…]

Lynda – Cybersecurity Awareness – Cybersecurity While Traveling

Lynda – Cybersecurity Awareness – Cybersecurity While Traveling
English | Size: 86.66 MB
Category: CBTs

Tightly controlled security is a lot tougher when you are on the road. Learn about the various cybersecurity situations you will run into while traveling, and the technology that can be used to help keep you safe. This course reviews the triangle of security, as well as wireless and wired threats and countermeasures. Instructor Jordan Scott designed the training primarily to raise awareness of travel situations commonly encountered while trying to maintain connectivity. This includes accessing open Wi-Fi networks securely, using SSL, setting up VPNs, and more. [Read more…]

Lynda – Cybersecurity Awareness – Building Your Cybersecurity Vocabulary

Lynda – Cybersecurity Awareness – Building Your Cybersecurity Vocabulary
English | Size: 99.57 MB
Category: Tutorial

Cybersecurity can be an intimidating world to navigate. To speak intelligently on the subject, one must have a basic understanding of certain acronyms and terminology-much of which isn’t immediately easy to decode. This practical course was designed to help beginners build their cybersecurity vocabulary, and give them the foundational knowledge they need to approach this subject with confidence. Here, instructor Serge Borso breaks down the vocabulary heard in the cybersecurity industry, and presents scenarios where those words, phrases, and acronyms are used. Upon wrapping up this course, you should have a solid foundation of what cybersecurity is, and what it entails. [Read more…]

Livelessons – CompTIA Cybersecurity Analyst CSA+ (CS0-001)

Livelessons – CompTIA Cybersecurity Analyst CSA+ (CS0-001)
English | Size: 9.18 GB
Category: Tutorial

The CompTIA Cybersecurity Analyst CSA+ (CS0-001) Complete Video Course is an engaging, self-paced video training solution that provides learners with 12 hours of personal, visual instruction from two cybersecurity expert trainers. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CSA+ exam as well as a deeper understanding of cyber security foundations and principles. [Read more…]

Livelessons – CompTIA Cybersecurity Analyst CSA+ (CS0-001) Complete – All Lessons

Livelessons – CompTIA Cybersecurity Analyst CSA+ (CS0-001) Complete – All Lessons
English | Size: 10.39 GB
Category: CBTs

12 hours of deep-dive training covering every objective in the CompTIA Cybersecurity Analyst CSA+ (CS0-001) exam

The CompTIA Cybersecurity Analyst CSA+ (CS0-001) Complete Video Course is an engaging, self-paced video training solution that provides learners with 12 hours of personal, visual instruction from two cybersecurity expert trainers. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CSA+ exam as well as a deeper understanding of cyber security foundations and principles.
[Read more…]

Lynda – Cybersecurity Awareness – The Protection and Destruction of Portable Data

Lynda – Cybersecurity Awareness – The Protection and Destruction of Portable Data
English | Size: 101.50 MB
Category: CBTs

Our valued, portable data assets benefit from intentional scrutiny and governance guidelines about how each should be preserved, protected, and destroyed. This course is for anyone who has data assets that are not contained in a locked file cabinet. It may also have relevance to those who have hard copy documents, but who have not considered how those documents should be managed. Here, learn about the different states of data, and how individuals and organizations can protect their portable data that’s at risk. Upon completing this course, you’ll have the knowledge you need to design and implement your own data management plan [Read more…]

Lynda – Cybersecurity Awareness – Safer Digital Communications

Lynda – Cybersecurity Awareness – Safer Digital Communications
English | Size: 109.86 MB
Category: CBTs

The internet is extremely useful and powerful, but it comes with risks. Learn to identify and avoid dangerous situations online and improve the security of your computers and your network. This course is intended to increase your knowledge of internet safety and give you safer digital communication habits. Tom Tobiassen reviews some of the tricks and techniques used by unsavory characters, hackers, and bullies on the internet, and provides tips for protecting your identity, encrypting data, securing your network, and using social media responsibly. [Read more…]

Lynda – Cybersecurity Awareness – Breaking Down Cloud Security

Lynda – Cybersecurity Awareness – Breaking Down Cloud Security
English | Size: 192.84 MB
Category: Tutorial

Cloud computing has made the sharing of information and resources significantly easier-but it has also brought about some unique security concerns. In this entry-level course, instructor Scott Hogg provides an introduction to cloud security, including common terminology and vocabulary. Throughout the course, Scott covers the topic of cloud security in a down-to-earth manner, and provides realistic security measures you can put into practice right away. He reviews the current industry-standard guidelines for cloud security. He also goes into several popular cloud service provider (CSP) security models and security controls.
[Read more…]