Cybersecurity

image6

Cybersecurity Basics Tutorial

 

Length: 1 Hour

Concepts: Definition of cybersecurity. Cybersecurity Threats. Countermeasures - ways to protect your network and data. The responsibility of cybersecurity professionals.

Level: Beginner


This short, enlightening course covers basic cybersecurity principles. It's designed for those who want a basic understanding of what cybersecurity is, the threats that exist in the wild, the bad actors behind these threats, and the duties and responsibilities of cybersecurity professionals.


The Internet Of Things

 Length: 8 Minutes

Author: NIST

 

The Internet of Things embodies the idea that different types of devices can be connected to the internet and configured to send and receive data. Houses can be set to turn lights on or off and turn the heat up or down. Security systems can be monitored over the internet. Cars can send data to a mechanic to speed up the diagnostic process during repairs. Refrigerators can let you know when you're out of milk. While all of this communication adds convenience, it also increases risk. This video explains the benefits and risks associated with the Internet of Things.


Blockchain simply explained

 

Length: 6 minutes

Author: Simply Explained


What is a blockchain and how do they work? This video will explain why blockchains are so special in simple and plain English! 


Beginners Guide to Penetration Testing

Length: 32 Minutes

Author: Pankaj Dubey http://prelrik.com


This video is free and always available. Learn the basics of Penetration testing for those new to ethical hacking and penetration testing. Learn to find the security holes in your organizations computer network.


Penetration Testing with Metasploit

Length: 1 hour 14 Minutes

Author: NetSecNow


This video is free and always available.  Pen Testing with Metasploit, Armitage and msfconsole

End User Security Awareness Training

 Length: 1 hour 8 minutes 

Author: Roundtable Technology and NTAP


 The best free 1 hour security awareness training ever provided by roundtable technology and NTAP videos  http://www.roundtabletechnology.com/  

image7

NIST NICE Webinar (Recorded 9/20/2017)

 Length: 1 Hour Recorded Webinar

Author: NIST


This webinar is provided courtesy of NIST.gov and offers an overview of the new NICE Framework (NIST Special Publication 800-181). It describes ongoing efforts about how and why training and certifications are aligned to the NICE Framework. 


Cybersecurity certifications are valuable credentials that complement academic degrees, work experience, and other expressions of a job candidates’ qualifications. They provide evidence of a person's specific knowledge, skills, and abilities (KSAs) and are most valuable when they are recognizable and verifiable. 


Build a NIST Cybersecurity Program

Length: 1 Hour

Author:  New Horizons Computer Learning Centers 


The NIST Cybersecurity Framework (CSF) provides a prioritized, flexible, repeatable, performance-based, and cost-effective approach to managing cybersecurity risk at all levels in an organization. It is applicable to organizations of all sizes and sectors. This webinar addresses using the NIST Cybersecurity Framework and the following topic areas: (a) Today’s cybersecurity landscape and cyber risks; (b) Considerations for building a cybersecurity program (engineering, technology and business); (c) Adopting the NIST Cybersecurity Framework; (d) Cyber-Risk Assessments, executive scorecards, and roadmaps to remediate control gaps; and (e) Resources.  


Risk Managment

 Length: 45 Minutes

Author:   Matt Barrett and Celia Paulsen of NIST  


Intro to Risk Management and the NIST Cyber Framework


NIST Cyber Framework Training // Hosted by SDN Communications, SDTA & Dakota State University With Matt Barrett and Celia Paulsen of NIST 

MICROSOFT SECURITY FUNDAMENTALS - MTA 98-367

 Length: 8 hours

Author: Microsoft

Instructors:  Christopher Chapman- Content PM; Thomas Willingham 


With this Microsoft Technology Associate (MTA) security fundamentals course, you can prepare for MTA Exam 98-367. Build an understanding of security layers, operating system security, network security, and security software. This IT security training course leverages Microsoft Official Academic Course (MOAC) material for this exam.  


The video course is provided by Microsoft. The concepts covered in the course are as follows


1. Understanding of Security Layers

2. Understanding Operating System Security

3. Security Policies

4. Network Security

5. Software Security

6.  Windows Security & Forensics 

7. Windows Memory Attacks and Forensics 

8. Windows Authentication Attacks and Forensics 

9.  Windows Forensics 

10. Network Forensics 

11. Malware Incident Response 

12. Practice Exam and registration for Certification Exam


At the end of this course there is an online practice exam available and a link to sign up and register for your exam to obtain your MTA 98-367 credential.