Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Toolkit for Cybersecurity Professionals: Foundations for Businesses
Topic 1: Getting Started
1: The Course Prerequisites (0:46)
2: The Course Manual (1:33)
Topic 2: Endpoint Security and Patch Management
1: Selecting and Managing Antivirus and Anti-Malware (10:12)
2: Safe Browsing Habits and Email Hygiene (5:16)
3: Implementing Patch Management Processes (5:07)
4: Automating Patch Deployment for Endpoints (6:14)
Topic 3: Security Policy Framework
1: Introduction to Security Policy Framework (6:49)
2: Developing and Implementing Security Policy Framework (12:07)
3: Security Policy Enforcement and Regular Reviews (4:31)
4: Security Framework Training and Awareness (7:50)
Topic 4: Data Backup and Recovery Strategies
1: Data Backup and Recovery Fundamentals (5:01)
2: Different Types of Data Backup Methods (6:17)
3: Automating, Testing and Verifying Backups (7:18)
4: Backup Storage, and Recovery Strategies (10:00)
Topic 5: Managing Security Incidents
1: Understanding the Incident Response Lifecycle (7:09)
2: Incident Response Planning (15:02)
3: Detecting and Classifying Security Incidents (6:53)
4: Incident Response and Post-Incident Activities (11:55)
Topic 6: Legal Considerations in Cybersecurity
1: Legal and Regulatory Considerations of Data Breaches (5:52)
2: Compliance with Data Protection Laws and Regulations (5:16)
3: Managing Liability and Legal Responsibilities (6:52)
4: Legal Professionals and Contractual Obligations (5:44)
Topic 7: Vendor Security
1: Understanding Vendor Threats and Its Impacts (10:11)
2: Ensuring Vendor Security (14:51)
3: Vendor Security Measures (14:01)
4: Vendor Security Countermeasures (6:17)
Topic 8: Conclusion
The Next Step (3:22)
1: Data Backup and Recovery Fundamentals
Complete and Continue