Course | |||||
---|---|---|---|---|---|
Cyber Security / Cyber Threats and Identifying Risk 3hrs 22m - Most companies have a difficult time finding and hiring qualified Incident Response (IR) analysts. For that matter, many whom make their way into this hands-on security profession lack a solid foundation. In this course, Hands-On... | |||||
Cyber Security / Cyber Threats and Identifying Risk 1hr 7m - Did you know that every major breach mandate specified in regulatory and legal frameworks has an injunction contacting customers but lack requirements for reaching out to law enforcement? In this course, Incident Response and Recovery... | |||||
Cyber Security / Cyber Threats and Identifying Risk 3hrs 20m - Since finding malware is a common occurrence for anyone that performs incident response, knowing how to properly analyze that malware is an essential skill. In this course, Malware Analysis Fundamentals, you'll gain the ability to... | |||||
Cyber Security / Cyber Threats and Identifying Risk 20m - In today’s video, we will be looking at mobile security threats. Mobile device security is the protection of; Smartphones, Tablets, Laptops and IoT devices. Security has become increasingly important in mobile computing due to the... | |||||
Cyber Security / Cyber Threats and Identifying Risk 1hr 50m - In this course, Protecting Devices and Applications in Microsoft 365, you'll learn to protect your Windows 10 and mobile devices from advanced threats using Microsoft applications and utilities. First, you'll explore Microsoft Defender... | |||||
Cyber Security / Cyber Threats and Identifying Risk 54m - Risk is inevitable when working in information and technology. In this course, Risk Identification, Monitoring, and Analysis for SSCP®, you'll learn to manage risk in an information and technology organization. First, you'll explore the... | |||||
Cyber Security / Cyber Threats and Identifying Risk 8m - Why would you want a risk management framework, and how would your organization benefit from one? These questions can be answered in many ways. A risk management framework provides a road map of security controls that should be considered to... | |||||
Cyber Security / Cyber Threats and Identifying Risk 2hrs 27m - As a cyber threat intelligence analyst, you must understand the main threats and how attackers do their work. By understanding the hacker mindset and the procedures that malicious attackers use, you will be able to better protect your... |