وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

The Cybersecurity for Business Crash Course

سرفصل های دوره

Cybersecurity for business owners, employees, and individuals - learn the fundamentals of cybersecurity today!


1 - Introduction
  • 1 -Cybersecurity for Business Crash Course Notes.pdf
  • 1 -Introduction and download your free study guide

  • 2 - Why Cybersecurity is Important to Businesses
  • 1 -Difference between IT Security, Information Security and Cybersecurity
  • 2 -Why is Cybersecurity Important
  • 3 -The CIA Triad - Confidentiality, Integrity, Availability

  • 3 - Common Cyber Threats to Businesses
  • 1 -Social Engineering and Phishing Attacks
  • 2 -Malware and Ransomware
  • 3 -Insider Threats and Business Email Compromise
  • 4 -DDoS Attacks
  • 5 -Zero-day Vulnerability and MITM (man-in-the-middle) Attacks
  • 6 -Supply Chain Attacks

  • 4 - Key Regulations and Frameworks in Cybersecurity
  • 1 -GDPR, Center for Internet Security
  • 2 -PCIDSS, HIPAA
  • 3 -NIST - National Institute of Standards and Technology Framework
  • 4 -The ISOIEC 27001 Framework, The Essential 8

  • 5 - Cybersecurity Culture and Role of the EmployerEmployee
  • 1 -Why a Cybersecurity Culture is Important
  • 2 -Role of the Business Owner and the Employee

  • 6 - Incident Response, Business Continuity, and Disaster Recovery Plans
  • 1 -Incident Response Plan (IRP)
  • 2 -Business Continuity Plan (BCP)
  • 3 -Disaster Recovery Plan (DRP)

  • 7 - Identity and Access Management
  • 1 -Technical Controls & Multi-factor Authentication (MFA)
  • 2 -Network Segmentation
  • 3 -Privileged Access Management
  • 4 -Physical and Administrative Controls

  • 8 - Data Management, Cloud Security and Remote Work
  • 1 -Understanding Data Management, Classification, Retention and Disposal
  • 2 -Cloud Security
  • 3 -Remote Work and VPNs

  • 9 - Securing Physical Devices
  • 1 -Email Authentication
  • 2 -Password Management and Tools
  • 3 -Firewalls, Encyption
  • 4 -Patching, Backup Hygiene
  • 5 -Penetration Testing and Vulnerability Scanning
  • 6 -EDR, MDR, and XDR Tools

  • 10 - Cyber Insurance
  • 1 -Why is Cyber Insurance Valuable to Businesses
  • 2 -Understanding First and Third Party Coverages

  • 11 - Third Party and First Party Risk Management & Defence in Depth
  • 1 -Understanding Third Party Risk Management
  • 2 -Understanding First Party Risk Management Frameworks
  • 3 -Understanding the Defence in Depth Strategy
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 44520
    حجم: 914 مگابایت
    مدت زمان: 133 دقیقه
    تاریخ انتشار: ۲۰ اردیبهشت ۱۴۰۴
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید