|  

[UDEMY] Cyber Security Fundamentals 2019 [FTU] GloDLS



Size :942.18 MB
Peers : Seeders : 0      Leechers : 0
Added : 5 years ago » by SaM » in Tutorials
Language : English
Last Updated :7 months ago
Info_Hash :A474EA7D94B33DB02390D609BF1C90742651F4B4

Torrent File Contents

[UDEMY] Cyber Security Fundamentals 2019 [FTU] GloDLS
  1. Introduction/1. Instructor introduction.mp4
  -  4.13 MB

  1. Introduction/1. Instructor introduction.vtt
  -  1.19 KB

  1. Introduction/2. Course overview.mp4
  -  18.73 MB

  1. Introduction/2. Course overview.vtt
  -  4.94 KB

  2. Understanding the cybersecurity landscape/1. Current Cybersecurity Landscape.mp4
  -  161.4 MB

  2. Understanding the cybersecurity landscape/1. Current Cybersecurity Landscape.vtt
  -  29.57 KB

  2. Understanding the cybersecurity landscape/2. Assume Compromise Philosophy.mp4
  -  51 MB

  2. Understanding the cybersecurity landscape/2. Assume Compromise Philosophy.vtt
  -  12.84 KB

  2. Understanding the cybersecurity landscape/3. Cost of Breach.mp4
  -  56.71 MB

  2. Understanding the cybersecurity landscape/3. Cost of Breach.vtt
  -  10.55 KB

  2. Understanding the cybersecurity landscape/4. Section 2 Quiz.html
  -  139 Bytes

  3. Red Team Penetration, lateral movement, escalation, and exfiltration/1. Red Team versus Blue Team exercises.mp4
  -  28.96 MB

  3. Red Team Penetration, lateral movement, escalation, and exfiltration/1. Red Team versus Blue Team exercises.vtt
  -  8.53 KB

  3. Red Team Penetration, lateral movement, escalation, and exfiltration/2. The Attacker's Objective.mp4
  -  53.23 MB

  3. Red Team Penetration, lateral movement, escalation, and exfiltration/2. The Attacker's Objective.vtt
  -  16.68 KB

  3. Red Team Penetration, lateral movement, escalation, and exfiltration/3. Red Team Kill Chain.mp4
  -  135.84 MB

  3. Red Team Penetration, lateral movement, escalation, and exfiltration/3. Red Team Kill Chain.vtt
  -  33.36 KB

  3. Red Team Penetration, lateral movement, escalation, and exfiltration/4.1 Document Vulnerabilities.pdf.pdf
  -  657.19 KB

  3. Red Team Penetration, lateral movement, escalation, and exfiltration/4. Document Vulnerabilities.mp4
  -  10.13 MB

  3. Red Team Penetration, lateral movement, escalation, and exfiltration/4. Document Vulnerabilities.vtt
  -  3.14 KB

  3. Red Team Penetration, lateral movement, escalation, and exfiltration/5. Section 3 Quiz.html
  -  139 Bytes

  4. Blue Team Detection, Investigation, Response and Mitigation/1.1 BlueTeam.pdf.pdf
  -  657.19 KB

  4. Blue Team Detection, Investigation, Response and Mitigation/1. Blue Team.mp4
  -  21.84 MB

  4. Blue Team Detection, Investigation, Response and Mitigation/1. Blue Team.vtt
  -  6.64 KB

  4. Blue Team Detection, Investigation, Response and Mitigation/2.1 BlueTeamKillChain.pdf.pdf
  -  679.17 KB

  4. Blue Team Detection, Investigation, Response and Mitigation/2. Blue Team Kill Chain.mp4
  -  67.02 MB

  4. Blue Team Detection, Investigation, Response and Mitigation/2. Blue Team Kill Chain.vtt
  -  17.66 KB

  4. Blue Team Detection, Investigation, Response and Mitigation/3.1 RestrictPrivilegeEscalation.pdf.pdf
  -  676.53 KB

  4. Blue Team Detection, Investigation, Response and Mitigation/3. Restrict Privilege Escalation.mp4
  -  57.09 MB

  4. Blue Team Detection, Investigation, Response and Mitigation/3. Restrict Privilege Escalation.vtt
  -  12.23 KB

  4. Blue Team Detection, Investigation, Response and Mitigation/4.1 RestrictLateralMovement.pdf.pdf
  -  673.85 KB

  4. Blue Team Detection, Investigation, Response and Mitigation/4. Restrict Lateral Movement.mp4
  -  40.99 MB

  4. Blue Team Detection, Investigation, Response and Mitigation/4. Restrict Lateral Movement.vtt
  -  11.41 KB

  4. Blue Team Detection, Investigation, Response and Mitigation/5.1 Azure Security Center.html
  -  137 Bytes

  4. Blue Team Detection, Investigation, Response and Mitigation/5.2 AttackDetection.pdf.pdf
  -  692.71 KB

  4. Blue Team Detection, Investigation, Response and Mitigation/5.3 Windows Defender ATP.html
  -  193 Bytes

  4. Blue Team Detection, Investigation, Response and Mitigation/5.4 Microsoft ATA.html
  -  133 Bytes

  4. Blue Team Detection, Investigation, Response and Mitigation/5.5 Office 365 ATP.html
  -  137 Bytes

  4. Blue Team Detection, Investigation, Response and Mitigation/5.6 Azure ATP.html
  -  138 Bytes

  4. Blue Team Detection, Investigation, Response and Mitigation/5. Attack Detection.mp4
  -  85.72 MB

  4. Blue Team Detection, Investigation, Response and Mitigation/5. Attack Detection.vtt
  -  21.94 KB

  4. Blue Team Detection, Investigation, Response and Mitigation/6. Section 4 Quiz.html
  -  139 Bytes

  5. Beyond The Breach/1.1 Azure Information Protection.html
  -  193 Bytes

  5. Beyond The Breach/1.2 CIA Triad.pdf.pdf
  -  654.62 KB

  5. Beyond The Breach/1. CIA Triad.mp4
  -  29.25 MB

  5. Beyond The Breach/1. CIA Triad.vtt
  -  11.57 KB

  5. Beyond The Breach/2.1 Security Compliance Toolkit.html
  -  159 Bytes

  5. Beyond The Breach/2.2 Organization Preparations.pdf.pdf
  -  657.31 KB

  5. Beyond The Breach/2. Organization Preparations.mp4
  -  65.36 MB

  5. Beyond The Breach/2. Organization Preparations.vtt
  -  13.49 KB

  5. Beyond The Breach/3.1 DevelopingPolicies.pdf.pdf
  -  651.16 KB

  5. Beyond The Breach/3. Developing and Maintaining Policies.mp4
  -  48.31 MB

  5. Beyond The Breach/3. Developing and Maintaining Policies.vtt
  -  14.6 KB

  5. Beyond The Breach/4. Section 5 Quiz.html
  -  139 Bytes

  5. Beyond The Breach/vz
  -  0 Bytes

  6. Final Exam/1. Final Exam.html
  -  139 Bytes

  Discuss.FreeTutorials.Us.html
  -  165.68 KB

  FreeCoursesOnline.Me.html
  -  108.3 KB

  FreeTutorials.Eu.html
  -  102.23 KB

  How you can help Team-FTU.txt
  -  259 Bytes

  [TGx]Downloaded from torrentgalaxy.org.txt
  -  524 Bytes

  Torrent Downloaded From GloDls.buzz.txt
  -  84 Bytes



Torrent Description

Description:


Introduction to Enterprise Cyber Security Fundamental Concepts (Network security, information security, OS security,etc)

Created by: Cristian Calinescu
Last updated: 2/2019
Language: English
Caption (CC): Included
Torrent Contains: 62 Files, 6 Folders
Course Source: https://www.udemy.com/enterprise-security-fundamentals/

What you'll learn

• Describe the current cybersecurity landscape
• Explain the Assume Compromise approach to security
• Red team versus Blue team exercises
• Red team kill chain, including: Reconnaissance Beachhead Persistence Lateral movement Elevation Exfiltration.
• Blue team kill chain, including Gathering baseline data Detection Alerting Investigation Response Execution
• Organizational preparation, security processes, and responses

Requirements

• Basic experience with Windows Server administration, maintenance, and troubleshooting.
• Basic experience and understanding of Windows networking technologies, to include Windows Firewall network setting, and cloud services concepts.
• Introductory level knowledge of Active Directory, including functions of a domain control, sign on services, and an understanding of group policy.

Description

This course is part of a series of 9 courses which address all aspects to become a Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the first course from a series of 9 courses which will be released in the next months, as follows:

• Cyber Security Fundamentals 2019 (Introduction to Cybersecurity)

• Threat Detection ( Detect security breaches early - explore the capabilities of Microsoft's threat detection and mitigation tools - including hands on Lab)

• Powershell Security ( Learn how to use Powershell to enhance security and remediate new threats. Learn how to implement and use Desired State Configuration (DSC), Just Enough Administration (JEA) and many more - including hands on Lab)

• Manage Identity  (Learn the industry's best practices in regards to managing identity and especially privileged identities. This course takes a hands-on approach to identity management. You will create a bastion host, configure Privileged Access Management, set up Microsoft Identity Manager PAM, and more - including hands on Lab)

• Office 365 Security ( Review the different types of threats that can target your organization and learn how to implement and manage Office 365 security features like Advanced Threat Protection, Threat Intelligence, and Advanced Security Management)

• Securing Windows 10 Operating System ( Learn about the continually evolving security features of the Windows 10 operating system. Discover how to deploy its advanced capabilities - including hands on Lab)

• Windows Server 2016 Security Features ( Windows Server 2016 provides layers of protection that help address both known and emerging threats. This course addresses how to implement and leverage all these security features. Learn how it actively contributes to securing your infrastructure so you can better safeguard against security breaches - including hands on Lab)

• Microsoft Azure Security Features ( Learn Azure security best practices and understand the terminology, tools, and techniques for creating a highly secure, resilient cloud service. You will also learn about and use the additional security services offered in Azure and Intune)

• Planning and Implementing a Security Incident Response (Learn to manage an enterprise security incident while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts)


In this course, we examine the concept of Red team – Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros (the red team) attacks some part or parts of a company’s security infrastructure, and an opposing group (the blue team) defends against the attack. Both teams work to strengthen a company’s defenses.

You'll learn how both the red and blue teams help the business attain a higher level of security, something the security industry is now calling the Purple team.

You will also learn the fundamental aspects of security in an Enterprise and overall like : CIA Triad concept or Assume Breach philosophy.

You will have a Quiz at the end of each Section and a Final Exam, so you can test the knowledge that you have gained throughout the course.

What you'll learn ?

After completing this course, students will be able to:

Describe the current enterprise security landscape

Define the Assume Compromise approach

Practice Red team versus Blue team exercises

Develop organizational security preparation, processes, and responses

Who this course is for:

• Security Administrators
• Security Analysts
• System Administrator
• Everyone who wants to learn about the current cybersecurity landscape and how to improve your organization's security posture.