Cybersecurity

image158

Cybersecurity Basics Tutorial

 

Length: 1 Hour

Concepts: Definition of cybersecurity. Cybersecurity Threats. Countermeasures - ways to protect your network and data. The responsibility of cybersecurity professionals.

Level: Beginner


This short, enlightening course covers basic cybersecurity principles. It's designed for those who want a basic understanding of what cybersecurity is, the threats that exist in the wild, the bad actors behind these threats, and the duties and responsibilities of cybersecurity professionals.


The Internet Of Things

 Length: 8 Minutes

Author: NIST

 

The Internet of Things embodies the idea that different types of devices can be connected to the internet and configured to send and receive data. Houses can be set to turn lights on or off and turn the heat up or down. Security systems can be monitored over the internet. Cars can send data to a mechanic to speed up the diagnostic process during repairs. Refrigerators can let you know when you're out of milk. While all of this communication adds convenience, it also increases risk. This video explains the benefits and risks associated with the Internet of Things.


Blockchain simply explained

 

Length: 6 minutes

Author: Simply Explained


What is a blockchain and how do they work? This video will explain why blockchains are so special in simple and plain English! 


Beginners Guide to Penetration Testing

Length: 32 Minutes

Author: Pankaj Dubey http://prelrik.com


This video is free and always available. Learn the basics of Penetration testing for those new to ethical hacking and penetration testing. Learn to find the security holes in your organizations computer network.


Penetration Testing with Metasploit

Length: 1 hour 14 Minutes

Author: NetSecNow


This video is free and always available.  Pen Testing with Metasploit, Armitage and msfconsole

End User Security Awareness Training

 Length: 1 hour 8 minutes 

Author: Roundtable Technology and NTAP


 The best free 1 hour security awareness training ever provided by roundtable technology and NTAP videos  http://www.roundtabletechnology.com/  

image159

NIST NICE Webinar (Recorded 9/20/2017)

 Length: 1 Hour Recorded Webinar

Author: NIST


This webinar is provided courtesy of NIST.gov and offers an overview of the new NICE Framework (NIST Special Publication 800-181). It describes ongoing efforts about how and why training and certifications are aligned to the NICE Framework. 


Cybersecurity certifications are valuable credentials that complement academic degrees, work experience, and other expressions of a job candidates’ qualifications. They provide evidence of a person's specific knowledge, skills, and abilities (KSAs) and are most valuable when they are recognizable and verifiable. 


Build a NIST Cybersecurity Program

Length: 1 Hour

Author:  New Horizons Computer Learning Centers 


The NIST Cybersecurity Framework (CSF) provides a prioritized, flexible, repeatable, performance-based, and cost-effective approach to managing cybersecurity risk at all levels in an organization. It is applicable to organizations of all sizes and sectors. This webinar addresses using the NIST Cybersecurity Framework and the following topic areas: (a) Today’s cybersecurity landscape and cyber risks; (b) Considerations for building a cybersecurity program (engineering, technology and business); (c) Adopting the NIST Cybersecurity Framework; (d) Cyber-Risk Assessments, executive scorecards, and roadmaps to remediate control gaps; and (e) Resources.  


WireX

Length: 8 Minutes 

Author: WireX


 The number of security incidents is constantly on the rise; security professionals need to adopt technologies that will help them accelerate and simplify the response process. 


Yet, adopting many point solutions is sometimes complicated, too often not integrated into your current workflows, and procedures are costly and complicated.


WireX Systems is shifting the paradigm in incident response with a solution that enables every team member to conduct faster, better investigations, while chopping down data retention costs.


The company’s Contextual Capture™ technology provides immediate context into security alerts, delivering months of in-depth visibility to the world largest organizations. By up-leveling skills and creating workflows for knowledge sharing, the solution empowers the entire security team to handle more threats in significantly less time by using existing tools already deployed, thus maximizing security operations ROI.


Risk Managment

 Length: 45 Minutes

Author:   Matt Barrett and Celia Paulsen of NIST  


Intro to Risk Management and the NIST Cyber Framework


NIST Cyber Framework Training // Hosted by SDN Communications, SDTA & Dakota State University With Matt Barrett and Celia Paulsen of NIST 

MICROSOFT SECURITY FUNDAMENTALS - MTA 98-367

 Length: 8 hours

Author: Microsoft

Instructors:  Christopher Chapman- Content PM; Thomas Willingham 


With this Microsoft Technology Associate (MTA) security fundamentals course, you can prepare for MTA Exam 98-367. Build an understanding of security layers, operating system security, network security, and security software. This IT security training course leverages Microsoft Official Academic Course (MOAC) material for this exam.  


The video course is provided by Microsoft. The concepts covered in the course are as follows


1. Understanding of Security Layers

2. Understanding Operating System Security

3. Security Policies

4. Network Security

5. Software Security

6.  Windows Security & Forensics 

7. Windows Memory Attacks and Forensics 

8. Windows Authentication Attacks and Forensics 

9.  Windows Forensics 

10. Network Forensics 

11. Malware Incident Response 

12. Practice Exam and registration for Certification Exam


At the end of this course there is an online practice exam available and a link to sign up and register for your exam to obtain your MTA 98-367 credential.