Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security - Entry Level
Security Principles
Introduction (2:33)
Teaching Approach (2:41)
Curriculum Overview (2:53)
CIA Triad (20:33)
Authentication (17:27)
Risk Management (4:46)
Risk Management Terminology (7:01)
Risk Management Deep Dive (5:39)
Managing Risks in Our Daily Lives (6:30)
Making Decisions Based on Risk Priorities (5:45)
How Risk Management Helps Identifying Risks (7:14)
Risk Assessment (12:22)
Risk Tolerance (16:17)
Risk Priority (12:30)
Risk Treatment (9:54)
Governance (15:03)
Security controls (9:09)
Privacy (5:29)
Ethical Dilemmas in Cybersecurity (8:45)
Incident response, Business Continuity, Disaster Recovery
Curriculum Overview (4:59)
Teaching Approach (2:41)
Incident Response (7:50)
Components of an Incident Response Plan (8:30)
Consulting With Management (8:59)
Business Continuity (13:17)
Business Continuity in Action (5:51)
Disaster Recovery (7:19)
Incident Response Team (8:08)
Access Control Concepts
Security and Access Control Concepts (3:57)
Understanding Access Control Concepts (6:52)
Control Assessments (5:06)
Defense In Depth (11:48)
Least Privilege (5:38)
Privileged Access Management (8:38)
Privileged Account (7:45)
Separation of Duties (5:26)
Authorized Versus Unauthorized Personnel (7:50)
The Benefit Of Multiple Controls (7:35)
Logical Access Controls (6:11)
Controls and Risks (7:04)
Role-Based Access Control (RBAC) (8:04)
Monitoring (7:04)
Physical Security Controls (5:29)
Examples of Physical Access Controls (8:17)
Discretionary Access Control (DAC) (8:26)
Mandatory Access Control (MAC) (8:12)
Network Security
Networking
Networking Models (OSI, TCP/IP)
Security Of the Network
Cyber Threats
Intrusion Detection System (IDS)
Microsegmentation
On-Premises Data Centers
Cloud Computing
Network Segmentation: Demilitarized Zone (DMZ)
Virtual Private Network (VPN)
Managed Service Provider (MSP)
Virtual Local Area Network (VLAN)
Network Access Control (NAC)
Zero Trust
Security Operations
Data Handling
Encryption
Security Awareness Training
How Passwords Work
Hashing
Common Security Policies Deeper Dive
Phishing
Social Engineering
Supporting Security Policies with Procedures
Change Management Components
Logging And Monitoring Security Events
Common Security Policies II
Teach online with
Privileged Account
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock