Cyber Security is Archive: in 90 MinutesBrief about the essential cybersecurity technologies, devices, and physical security mechanisms for IT organizationsThis course aims to point out the security essentials for any given IT organization..
Archive: Cyber Security in 90 MinutesBrief about the essential cybersecurity technologies, devices, and physical security mechanisms for IT organizationsThis course aims to point out the security essentials for any given IT organization.
The course is enables students to setup a secure base from scratch or review an existing security skeleton for their IT environments..
The course enables students to setup a secure base from scratch or review an existing security skeleton for their IT environments.
The course is targets the IT security beginners as well as professionals to enrich their knowledge about cyber security and to pursue their career in such field..
The course targets the IT security beginners as well as professionals to enrich their knowledge about cyber security and to pursue their career in such field.
The course material is is based on my understanding of several IT security curricula such as SANS, CEH, etc..The course is meant to be brief to fit security specialists, IT admins, and developersWho is the target audience?Cybersecurity beginnersCybersecurity professionalsIT security officersCourse CurriculumCyber Security in 90 minutesIntroduction (3:53)1..
The course material is based on my understanding of several IT security curricula such as SANS, CEH, etc..The course is meant to be brief to fit security specialists, IT admins, and developersWho is the target audience?Cybersecurity beginnersCybersecurity professionalsIT security officersCourse CurriculumCyber Security in 90 minutesIntroduction (3:53)1.
Passwords (9:23)2. is Securing.
Securing Passwords (9:23)2.
Operating Systems (9:34)3. is Securing.
Securing Operating Systems (9:34)3.
Network is Securing Switches (8:51)5..
Securing Network Switches (8:51)5.
Network Routers (7:46)6. is Securing.
Securing Network Routers (7:46)6.
Wireless Networks (9:28)7. is Securing.
Securing Wireless Networks (9:28)7.