zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Lynda - Cybersecurity for Small and Medium Businesses Essential Training
magnet:?xt=urn:btih:293d2c81c57d50335cd1b2c95a32dadcf7cc4662&dn=Lynda - Cybersecurity for Small and Medium Businesses Essential Training
磁力链接详情
文件列表详情
293d2c81c57d50335cd1b2c95a32dadcf7cc4662
infohash:
33
文件数量
341.55 MB
文件大小
2019-6-7 21:31
创建日期
2024-11-30 01:12
最后访问
相关分词
Lynda
-
Cybersecurity
for
Small
and
Medium
Businesses
Essential
Training
1.Introduction/01.Welcome.mp4 20.89 MB
1.Introduction/02.What you should know.mp4 4.8 MB
2.1. The Basics/03.Why you should care.mp4 30.17 MB
2.1. The Basics/04.Physical security vs. cybersecurity.mp4 4.57 MB
2.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 8.68 MB
2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.mp4 6.62 MB
2.1. The Basics/07.What are the cybersecurity threats.mp4 13.9 MB
2.1. The Basics/08.A five-step process to improve cybersecurity.mp4 6.84 MB
3.2. Identify/09.Step #1 - Identify key assets.mp4 9.05 MB
3.2. Identify/10.Inventory sheet - Data and devices.mp4 2.91 MB
3.2. Identify/11.Account access best practices.mp4 12.29 MB
3.2. Identify/12.What about the cloud.mp4 10.76 MB
4.3. Protect/13.Step #2 - Protect data and accounts.mp4 6.35 MB
4.3. Protect/14.Humans - Education and awareness is essential.mp4 7.01 MB
4.3. Protect/15.Sharing online - How to prevent a phish.mp4 14.34 MB
4.3. Protect/16.Technology solutions to protect a business.mp4 19.22 MB
4.3. Protect/17.Passphrases and authentication.mp4 12.68 MB
4.3. Protect/18.Culture of security - Policies, procedures, and attitude.mp4 13.64 MB
5.4. Detect/19.Step #3 - Detect a breach.mp4 8.84 MB
5.4. Detect/20.Detecting a compromise - The human element.mp4 4.87 MB
5.4. Detect/21.Cybersecurity assessments and detection technology solutions.mp4 12.25 MB
6.5. Respond/22.Step #4 - Respond to a cyber breach.mp4 8.92 MB
6.5. Respond/23.Cybersecurity response plans for business.mp4 6.16 MB
6.5. Respond/24.Key elements of a cyber incident response.mp4 12.93 MB
6.5. Respond/25.Federal government response support and guidance.mp4 7.82 MB
6.5. Respond/26.State breach response laws.mp4 9.12 MB
7.6. Recover/27.Step #5 - How to recover from a cyber incident.mp4 5.54 MB
7.6. Recover/28.Cybersecurity insurance.mp4 15.03 MB
7.6. Recover/29.Reputation management.mp4 6.83 MB
8.7. Resources/30.Technology checklists for small and medium businesses.mp4 7.8 MB
8.7. Resources/31.More cybersecurity resources.mp4 10.98 MB
8.7. Resources/32.Scam and threat alerts.mp4 11.2 MB
9.Conclusion/33.Next steps.mp4 8.54 MB
其他位置