Lynda - Cybersecurity for Small and Medium Businesses Essential Training

seeders: 18
leechers: 5
updated:
Added by xHOBBiTx in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...

Files

Lynda - Cybersecurity for Small and Medium Businesses Essential Training 1.Introduction
  • 01.Welcome.en.srt (2.0 KB)
  • 01.Welcome.mp4 (20.9 MB)
  • 02.What you should know.en.srt (1.5 KB)
  • 02.What you should know.mp4 (4.8 MB)
2.1. The Basics
  • 03.Why you should care.en.srt (6.6 KB)
  • 03.Why you should care.mp4 (30.2 MB)
  • 04.Physical security vs. cybersecurity.en.srt (1.9 KB)
  • 04.Physical security vs. cybersecurity.mp4 (4.6 MB)
  • 05.Anyone can improve the cybersecurity of a business.en.srt (3.4 KB)
  • 05.Anyone can improve the cybersecurity of a business.mp4 (8.7 MB)
  • 06.What are the cybersecurity threat actions facing businesses.en.srt (4.4 KB)
  • 06.What are the cybersecurity threat actions facing businesses.mp4 (6.6 MB)
  • 07.What are the cybersecurity threats.en.srt (6.3 KB)
  • 07.What are the cybersecurity threats.mp4 (13.9 MB)
  • 08.A five-step process to improve cybersecurity.en.srt (3.8 KB)
  • 08.A five-step process to improve cybersecurity.mp4 (6.8 MB)
3.2. Identify
  • 09.Step #1 - Identify key assets.en.srt (3.1 KB)
  • 09.Step #1 - Identify key assets.mp4 (9.1 MB)
  • 10.Inventory sheet - Data and devices.en.srt (1.8 KB)
  • 10.Inventory sheet - Data and devices.mp4 (2.9 MB)
  • 11.Account access best practices.en.srt (5.8 KB)
  • 11.Account access best practices.mp4 (12.3 MB)
  • 12.What about the cloud.en.srt (9.1 KB)
  • 12.What about the cloud.mp4 (10.8 MB)
4.3. Protect
  • 13.Step #2 - Protect data and accounts.en.srt (1.7 KB)
  • 13.Step #2 - Protect data and accounts.mp4 (6.3 MB)
  • 14.Humans - Education and awareness is essential.en.srt (5.4 KB)
  • 14.Humans - Education and awareness is essential.mp4 (7.0 MB)
  • 15.Sharing online - How to prevent a phish.en.srt (7.5 KB)
  • 15.Sharing online - How to prevent a phish.mp4 (14.3 MB)
  • 16.Technology solutions to protect a business.en.srt (9.4 KB)
  • 16.Technology solutions to protect a business.mp4 (19.2 MB)
  • 17.Passphrases and authentication.en.srt (7.4 KB)
  • 17.Passphrases and authentication.mp4 (12.7 MB)
  • 18.Culture of security - Policies, procedures, and attitude.en.srt (7.5 KB)
  • 18.Culture of security - Policies, procedures, and attitude.mp4 (13.6 MB)
5.4. Detect
  • 19.Step #3 - Detect a breach.en.srt (3.1 KB)
  • 19.Step #3 - Detect a breach.mp4 (8.8 MB)
  • 20.Detecting a compromise - The human element.en.srt (2.6 KB)
  • 20.Detecting a compromise - The human element.mp4 (4.9 MB)
  • 21.Cybersecurity assessments and detection technology solutions.en.srt (7.6 KB)
  • 21.Cybersecurity assessments and detection technology solutions.mp4 (12.2 MB)
6.5. Respond
  • 22.Step #4 - Respond to a cyber breach.en.srt (2.4 KB)
  • 22.Step #4 - Respond to a cyber breach.mp4 (8.9 MB)
  • 23.Cybersecurity response plans for business.en.srt (3.7 KB)
  • 23.Cybersecurity response plans for business.mp4 (6.2 MB)
  • 24.Key elements of a cyber incident response.en.srt (8.5 KB)
  • 24.Key elements of a cyber incident response.mp4 (12.9 MB)
  • 25.Federal government response support and guidance.en.srt (4.9 KB)
  • 25.Federal government response support and guidance.mp4 (7.8 MB)
  • 26.State breach response laws.en.srt (5.0 KB)
  • 26.State breach response laws.mp4 (9.1 MB)
7.6. Recover
  • 27.Step #5 - How to recover from a cyber incident.en.srt (1.8 KB)
  • 27.Step #5 - How to recover from a cyber incident.mp4 (5.5 MB)
  • 28.Cybersecurity insurance.en.srt (7.0 KB)
  • 28.Cybersecurity insurance.mp4 (15.0 MB)
  • 29.Reputation management.en.srt (3.4 KB)
  • 29.Reputation management.mp4 (6.8 MB)
8.7. Resources
  • 30.Technology checklists for small and medium businesses.en.srt (3.5 KB)
  • 30.Technology checklists for small and medium businesses.mp4 (7.8 MB)
  • 31.More cybersecurity resources.en.srt (5.1 KB)
  • 31.More cybersecurity resources.mp4 (11.0 MB)
  • 32.Scam and threat alerts.en.srt (5.8 KB)
  • 32.Scam and threat alerts.mp4 (11.2 MB)
9.Conclusion
  • 33.Next steps.en.srt (2.1 KB)
  • 33.Next steps.mp4 (8.5 MB)

Description

Code:

Title: Cybersecurity for Small and Medium Businesses: Essential Training
Publisher: Lynda
Type: Security
Size: 343M
URL: https://www.lynda.com/IT-Infrastructure-tutorials/Cybersecurity-Small-Medium-Businesses-Essential-Training/693100-2.html
Author: Kristin Judge
Duration: 1h 34m
Skill: Beginner



Screens





Download torrent
341.7 MB
seeders:18
leechers:5
Lynda - Cybersecurity for Small and Medium Businesses Essential Training


Trackers

tracker name
udp://tracker.coppersurfer.tk:6969
udp://tracker.pirateparty.gr:6969
udp://eddie4.nl:6969
udp://9.rarbg.me:2710/announce
udp://inferno.demonoid.pw:3391/announce
µTorrent compatible trackers list

Download torrent
341.7 MB
seeders:18
leechers:5
Lynda - Cybersecurity for Small and Medium Businesses Essential Training


Torrent hash: D9672A811CF4F65301BBA8EF9D1BCAA80813AB40