وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

The Cybersecurity for Business Crash Course

سرفصل های دوره

Cybersecurity for business owners, employees, and individuals - learn the fundamentals of cybersecurity today!


1 - Introduction
  • 1 -Cybersecurity for Business Crash Course Notes.pdf
  • 1 -Introduction and download your free study guide

  • 2 - Why Cybersecurity is Important to Businesses
  • 1 -Difference between IT Security, Information Security and Cybersecurity
  • 2 -Why is Cybersecurity Important
  • 3 -The CIA Triad - Confidentiality, Integrity, Availability

  • 3 - Common Cyber Threats to Businesses
  • 1 -Social Engineering and Phishing Attacks
  • 2 -Malware and Ransomware
  • 3 -Insider Threats and Business Email Compromise
  • 4 -DDoS Attacks
  • 5 -Zero-day Vulnerability and MITM (man-in-the-middle) Attacks
  • 6 -Supply Chain Attacks

  • 4 - Key Regulations and Frameworks in Cybersecurity
  • 1 -GDPR, Center for Internet Security
  • 2 -PCIDSS, HIPAA
  • 3 -NIST - National Institute of Standards and Technology Framework
  • 4 -The ISOIEC 27001 Framework, The Essential 8

  • 5 - Cybersecurity Culture and Role of the EmployerEmployee
  • 1 -Why a Cybersecurity Culture is Important
  • 2 -Role of the Business Owner and the Employee

  • 6 - Incident Response, Business Continuity, and Disaster Recovery Plans
  • 1 -Incident Response Plan (IRP)
  • 2 -Business Continuity Plan (BCP)
  • 3 -Disaster Recovery Plan (DRP)

  • 7 - Identity and Access Management
  • 1 -Technical Controls & Multi-factor Authentication (MFA)
  • 2 -Network Segmentation
  • 3 -Privileged Access Management
  • 4 -Physical and Administrative Controls

  • 8 - Data Management, Cloud Security and Remote Work
  • 1 -Understanding Data Management, Classification, Retention and Disposal
  • 2 -Cloud Security
  • 3 -Remote Work and VPNs

  • 9 - Securing Physical Devices
  • 1 -Email Authentication
  • 2 -Password Management and Tools
  • 3 -Firewalls, Encyption
  • 4 -Patching, Backup Hygiene
  • 5 -Penetration Testing and Vulnerability Scanning
  • 6 -EDR, MDR, and XDR Tools

  • 10 - Cyber Insurance
  • 1 -Why is Cyber Insurance Valuable to Businesses
  • 2 -Understanding First and Third Party Coverages

  • 11 - Third Party and First Party Risk Management & Defence in Depth
  • 1 -Understanding Third Party Risk Management
  • 2 -Understanding First Party Risk Management Frameworks
  • 3 -Understanding the Defence in Depth Strategy
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 44520
    حجم: 914 مگابایت
    مدت زمان: 133 دقیقه
    تاریخ انتشار: ۲۰ اردیبهشت ۱۴۰۴
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید