Intermediate
English
Ibby Cybersecurity Mentorship Live 2021.
Created By
Mohamed Ibrahim
-
Rating
(0) - 0 Reviews
- 50 Students Enrolled
- 18:43 Hours
Course Overview
A structured learning program for Cyber Security for beginners is designed to upskill your career in the cybersecurity space. This program gives you a foundational elaboration on various concepts of cybersecurity landscape and provides you with the required tools to study, explore, practice and manage security essentials in information systems.
Who this course is for:
- Students
- Working Professionals
- System/Network Administrators
- Network Analyst
- Network Support Engineers
What you'll learn
- Threat spectrum
- Sandbox
- Cybercriminal
- SOC
- Anotomy of Hacking
- Cloud Security
- Data Breach
- Container security
- Data Leak Prevention
- CASB
- Threat Intelligence
- BoT Mitigation & API Protection
- NGFW
- SCADA
- Artificial Intelligence
- IoT Security
- ML and DL for Cybersecurity
- WAF as a Service
- SIEM, Wi-Fi Security
Course Curriculum
Total: 106 Lessons
Time: 18:43 Hours
-
The introduction 00:20:28
-
The introduction 00:20:28
-
Understanding the Stud... 00:20:01
-
Understanding the Students 00:20:01
-
Importance of Goal Set... 00:06:25
-
Importance of Goal Setting 00:06:25
-
Why we are here 00:18:45
-
Why we are here 00:18:45
-
Let us Learn the basic... 00:14:48
-
Let us Learn the basics 00:14:48
-
Secutity Fabric 00:23:54
-
Secutity Fabric 00:23:54
-
Anatomy of Cyber Attac... 00:19:38
-
Anatomy of Cyber Attack 00:19:38
-
Security Fabric Recap 00:14:43
-
Security Fabric Recap 00:14:43
-
Anatomy of Hacking 00:21:19
-
Anatomy of Hacking 00:21:19
-
Cyber threat Intellige... 00:08:33
-
Cyber threat Intelligence 00:08:33
-
What is Data Breach 00:10:53
-
What is Data Breach 00:10:53
-
Social Engineering 00:05:50
-
Social Engineering 00:05:50
-
Two Factor Authenticat... 00:01:03
-
Two Factor Authentication 00:01:03
-
VPN and Firewalls 00:02:28
-
VPN and Firewalls 00:02:28
-
Privacy Settings Aware... 00:05:47
-
Privacy Settings Awareness 00:05:47
-
End Point Security 00:02:07
-
End Point Security 00:02:07
-
Next Generation Firewa... 00:06:10
-
Next Generation Firewall 00:06:10
-
NGFW Demo 1 00:21:29
-
NGFW Demo 1 00:21:29
-
NGFW Demo 2 00:24:29
-
NGFW Demo 2 00:24:29
-
What is Cryptography 00:14:16
-
What is Cryptography 00:14:16
-
what is Encryption 00:06:42
-
what is Encryption 00:06:42
-
Cryptography Block Dia... 00:08:14
-
Cryptography Block Diagram 00:08:14
-
Cyber Codes 00:10:12
-
Cyber Codes 00:10:12
-
Encryption Live Demo 00:10:01
-
Encryption Live Demo 00:10:01
-
Cryptography lab Demo 00:10:33
-
Cryptography lab Demo 00:10:33
-
Endpoint Security Solu... 00:12:50
-
Endpoint Security Solution 00:12:50
-
Endpoint Security use ... 00:23:54
-
Endpoint Security use cases 00:23:54
-
FortiNAC 00:23:36
-
FortiNAC 00:23:36
-
Endpoint Security Demo 00:15:00
-
Endpoint Security Demo 00:15:00
-
Artificial Intelligenc... 00:13:00
-
Artificial Intelligence 00:13:00
-
Thread Intelligence 00:13:00
-
Thread Intelligence 00:13:00
-
AI and Malware Detecti... 00:11:00
-
AI and Malware Detection Evolution 00:11:00
-
AI Expert System 00:24:00
-
AI Expert System 00:24:00
-
ATP Demo 00:07:00
-
ATP Demo 00:07:00
-
Sandbox - AI 00:18:00
-
Sandbox - AI 00:18:00
-
SCADA ICS 00:15:00
-
SCADA ICS 00:15:00
-
Fortisandbox Lab 00:20:00
-
Fortisandbox Lab 00:20:00
-
Introduction to Cloud ... 00:10:49
-
Introduction to Cloud Security 00:10:49
-
Adaptive Cloud Securit... 00:15:20
-
Cloud Strategy 00:17:33
-
Cloud Strategy 00:17:33
-
Different Services tha... 00:11:04
-
Dynamic Cloud Security 00:57:58
-
Dynamic Cloud Security 00:57:58
-
Public Cloud Security ... 00:26:00
-
Public Cloud Security Solutions 00:26:00
-
Wi-Fi Security 00:27:29
-
Wi-Fi Security 00:27:29
-
Web Application Securi... 00:19:35
-
Web Application Security, WAF 00:19:35
-
OT Security 00:04:53
-
OT Security 00:04:53
-
OT, SCADA Security 00:13:32
-
OT, SCADA Security 00:13:32
-
Fortinet For OT 00:11:42
-
Fortinet For OT 00:11:42
-
Case Study 00:05:34
-
Case Study 00:05:34
-
Information Security F... 00:02:39
-
Information Security Fundamental 00:02:39
-
Why Secure IoT 00:05:53
-
Why Secure IoT 00:05:53
-
Vulnerability Categori... 00:05:33
-
Vulnerability Categories 00:05:33
-
Mirai Malware 00:02:09
-
Mirai Malware 00:02:09
-
IoT 101 00:06:44
-
IoT 101 00:06:44
-
Components of IoT 00:08:04
-
Components of IoT 00:08:04
-
Assets of IoT 00:02:01
-
Assets of IoT 00:02:01
-
Development For IoT 00:04:05
-
Development For IoT 00:04:05
-
Introduction to Sandbo... 00:04:23
-
Introduction to Sandbox 00:04:23
-
FortiSandbox Overview 00:04:12
-
FortiSandbox Overview 00:04:12
-
Breach Protection Solu... 00:04:39
-
Breach Protection Solution 00:04:39
-
FortiSandbox Demo 00:08:25
-
FortiSandbox Demo 00:08:25
-
FortiAnalyzer 00:09:56
-
FortiAnalyzer 00:09:56
-
Challenges and Solutio... 00:21:45
-
FortiSIEM 00:05:16
-
FortiSIEM 00:05:16
-
FortiAnalyzer Demo 00:09:35
-
FortiAnalyzer Demo 00:09:35
-
Fortinet Security Oper... 00:02:02
-
Fortinet Security Operation Solution 00:02:02
-
AI Driven Security Ope... 00:01:51
-
AI Driven Security Operations 00:01:51
-
Security Operations Ce... 00:13:32
-
Security Operations Center (SOC) 00:13:32
-
SIEM Monitoring Workfl... 00:02:14
-
SIEM Monitoring Workflow 00:02:14
-
Data Sources 00:02:00
-
Data Sources 00:02:00
-
MTTD And MTTR Process 00:03:09
-
MTTD And MTTR Process 00:03:09
-
Traditional SOC Tiers 00:00:56
-
Traditional SOC Tiers 00:00:56
-
SIEM Architecture Diag... 00:01:15
-
SIEM Architecture Diagram 00:01:15
-
SOC Maturity Model 00:01:07
-
SOC Maturity Model 00:01:07
-
SOAR 00:04:59
-
SOAR 00:04:59
-
Augmentation SOC Opera... 00:08:38
-
FortiManager and it... 00:05:15
-
FortiManager and it's use cases 00:05:15
-
FortiManager Lab Demo 00:08:33
-
FortiManager Lab Demo 00:08:33
-
ISMS 00:03:11
-
ISMS 00:03:11
-
Course Introduction 00:03:55
-
Course Introduction 00:03:55
-
Benefits 00:01:06
-
Benefits 00:01:06
-
Security And Risk Mana... 00:06:00
-
Security And Risk Management 00:06:00
-
Elements Of Informatio... 00:03:17
-
Elements Of Information Security 00:03:17
-
Risks 00:08:42
-
Risks 00:08:42
-
IT Governance 00:05:58
-
IT Governance 00:05:58
-
Security Controls And ... 00:16:15
-
Security Controls And Frameworks 00:16:15
-
Compliance And Legal 00:07:12
-
Compliance And Legal 00:07:12
-
Security Policy 00:07:27
-
Security Policy 00:07:27
-
Security Assessment An... 00:01:13
-
Security Assessment And Testing 00:01:13
-
Security Testing 00:03:25
-
Security Testing 00:03:25
-
Security Assessment An... 00:03:55
-
Log Management 00:01:24
-
Log Management 00:01:24
-
Information Security C... 00:01:26
-
Audit 00:02:13
-
Audit 00:02:13
-
Identity And Access Ma... 00:12:04
-
BCP And DRP 00:13:20
-
BCP And DRP 00:13:20
-
Incident Management An... 00:11:29
-
Incident Management And Response 00:11:29
-
Introduction 00:02:28
-
Introduction 00:02:28
-
Blockchain Terminologi... 00:35:00
-
Blockchain Terminologies 00:35:00
-
Distinction Between Da... 00:03:13
-
What Is Blockchain And... 00:22:14
-
What Is Blockchain And Ethereum 00:22:14
-
Cryptographic Componen... 00:08:32
-
Cryptographic Component 00:08:32
-
Consensus Components 00:09:45
-
Consensus Components 00:09:45
-
Smart Contract Theory 00:05:27
-
Smart Contract Theory 00:05:27
-
Smart Contract Applica... 00:09:05
-
Smart Contract Application 00:09:05
Item Reviews - 0
Submit Reviews
This Course Include:
- 18:43 Hours On-Demand Videos
- 106 Lessons
- Lifetime Access
- Access on Mobile and TV