Course
Hands-On Incident Response Fundamentals
Cyber Security
/
Cyber Threats and Identifying Risk
Hands-On Incident Response Fundamentals
3hrs 22m - Most companies have a difficult time finding and hiring qualified Incident Response (IR) analysts. For that matter, many whom make their way into this hands-on security profession lack a solid foundation. In this course, Hands-On...
Incident Response and Recovery for SSCP®
Cyber Security
/
Cyber Threats and Identifying Risk
Incident Response and Recovery for SSCP®
1hr 7m - Did you know that every major breach mandate specified in regulatory and legal frameworks has an injunction contacting customers but lack requirements for reaching out to law enforcement? In this course, Incident Response and Recovery...
Malware Analysis Fundamentals
Cyber Security
/
Cyber Threats and Identifying Risk
Malware Analysis Fundamentals
3hrs 20m - Since finding malware is a common occurrence for anyone that performs incident response, knowing how to properly analyze that malware is an essential skill. In this course, Malware Analysis Fundamentals, you'll gain the ability to...
Mobile Security Threats
Cyber Security
/
Cyber Threats and Identifying Risk
Mobile Security Threats
20m - In today’s video, we will be looking at mobile security threats. Mobile device security is the protection of; Smartphones, Tablets, Laptops and IoT devices. Security has become increasingly important in mobile computing due to the...
Protecting Devices and Applications in Microsoft 365
Cyber Security
/
Cyber Threats and Identifying Risk
Protecting Devices and Applications in Microsoft 365
1hr 50m - In this course, Protecting Devices and Applications in Microsoft 365, you'll learn to protect your Windows 10 and mobile devices from advanced threats using Microsoft applications and utilities. First, you'll explore Microsoft Defender...
Risk Identification, Monitoring, and Analysis for SSCP®
Cyber Security
/
Cyber Threats and Identifying Risk
Risk Identification, Monitoring, and Analysis for SSCP®
54m - Risk is inevitable when working in information and technology. In this course, Risk Identification, Monitoring, and Analysis for SSCP®, you'll learn to manage risk in an information and technology organization. First, you'll explore the...
Selecting a Risk Management Framework for Your Organization
Cyber Security
/
Cyber Threats and Identifying Risk
Selecting a Risk Management Framework for Your Organization
8m - Why would you want a risk management framework, and how would your organization benefit from one? These questions can be answered in many ways. A risk management framework provides a road map of security controls that should be considered to...
Threat Intelligence: Cyber Threats and Kill Chain Methodology
Cyber Security
/
Cyber Threats and Identifying Risk
Threat Intelligence: Cyber Threats and Kill Chain Methodology
2hrs 27m - As a cyber threat intelligence analyst, you must understand the main threats and how attackers do their work. By understanding the hacker mindset and the procedures that malicious attackers use, you will be able to better protect your...

Oh, no. Nothing was found.

Use a different term and try again.