Cybersecurity Mastery: Complete Course in a Single Video | Cybersecurity For Beginners
377,212
Published 2024-02-01
What you'll learn
β Understand the cybersecurity landscape and learn core concepts foundational to security, compliance, and identity solutions.
β Understand the vulnerabilities of an organizations network and mitigate attacks on network infrastructures to protect data.
β Develop and implement threat mitigation strategies by applying effective cybersecurity measures within an Azure environment.
β Demonstrate your new skills with a capstone project and prepare for the industry-recognized Microsoft SC-900 Certification exam.
πCourse Material β¬β¬
drive.google.com/file/d/1F8nS6BOV_j6Td_aZd3QgxKYY2β¦
β€β€ Please like, share, and subscribe for more content! Avoid downloading to support the channel. Thanks for your ongoing support! π #SupportCreators"β€β€
β¨β¨PLEASE IGNORE THESE TAGSβ¨β¨
cybersecurity for beginners
cybersecurity fundamentals
cybersecurity 101
introduction to cybersecurity
cybersecurity basics
cybersecurity crash course
intro to cybersecurity
cybersecurity risk management
cybersecurity tutorial
By Microsoft
#cybersecurity
cyber security,
cybersecurity roadmap,
cybersecurity bootcamp,
#cybersecurityforbeginners
all about cybersecurity,
cybersecurity basics,
cybersecurity basics for beginners,
cybersecurity beginner course,
basics of cybersecurity,
basics of cybersecurity for beginners,
best cybersecurity courses,
cybersecurity crash course,
cybersecurity compliance analyst,
everything about cybersecurity
#cybersecurityanalyst
All Comments (21)
-
ββββπTIME STAMPπβββββ Cybersecurity For Beginners By Google: https://youtu.be/Ieegg45Pojw βΆ INTRODUCTION TO COMPUTERS AND OPERATING SYSTEMS Introduction to Computers and Operating systems π00:00 Course Introduction π14:13 Threat Landscape π23:35 Introduction to Computing devices π34:32 Operating systems Enterprise Systems and Security π49:21 Servers Storage and Backups π1:00:36 Computing Environments π1:11:46 Maintenance and Patches Business Systems Applications π1:26:27 Business Software π1:36:15 Email Apps π1:47:00 Storage Solutions Computers Operating Systems and Security π2:09:26 Final Course assessment π2:13:54 Course Wrap up β INTRODUCTION TO NETWORKING AND CLOUD COMPUTING Computer Networking π2:16:46 Course introduction π2:21:55 Types and Topologies π2:32:52 IP Addressing Network Devices and Protocols π2:51:22 Infrastructure π3:03:24 Network Communication Models π3:16:00 Protocols and ports π3:26:40 Network Traffic monitoring Network Security π3:41:09 Network Client and Server π3:52:19 Authentication and Authorization π4:08:09 Firewalls and Security tools Cloud Computing and Networking π4:37:44 Introduction to Azure π4:46:34 Virtual Environments π4:59:47 Cloud Services π5:14:33 X as A Service Networking and Cloud Computing π5:30:02 Final Course Project and Assessment π5:37:35 Course wrap up β CYBERSECURITY THREAT VECTORS AND MITIGATION Threats and attacts π5:40:33 Course introduction π5:44:05 Epic attacts π5:53:59 Theats vectors π6:11:24 Mitigation Strategies Cryptography π6:26:24 Encryption π6:33:41 Public Private key and hashing π6:49:15 Digital Signing and certificates π7:04:27 Authentication and Authorization Network and Device Based threats π7:19:42 Data Transmission π7:35:49 Security controls π7:50:47 Application Updates Security Compliance and Identity π8:06:06 Security and Compaince Concepts π8:19:41 ID and Active Directory π8:34:46 Defence Models Cybersecurity Threat Vectors and Mitigation π8:49:23 Final Course Project and Assessment π8:55:16 Course Wrap up βCYBERSECURITY IDENTITY AND ACCESS WITH AZURE AD Identity Services π8:58:01 Course introduction π9:02:53 Azure Active Directory π9:24:20 Azure Active Directory and Editions π9:36:51 Azure Active Directory Identity types Active Directory Authentication π9:58:09 Authentication Methods π10:31:30 Multi-Factor Authentication π10:51:25 Password Protection and Resetting Active Directory Access Protection and Governance Management π11:17:11 Condition Access π11:33:46 Roles and Role Based Access π11:45:44 Identity Governance π12:06:51 Privileged Identity management and Protection Identity and Access Solutions π12:26:15 Final Course Project Assessment π12:33:24 Course Wrap up βCYBERSECURITY SOLUTIONS AND MICROSOFT DEFENDER Azure Basics Security Capabilities π12:36:56 Course Introduction π12:41:24 Distributed Denial of Service DDOS Protection π13:04:21 Azure Firewall Protection π13:36:11 Just In Time Access and Encryption Security Management in Azure π13:56:32 Introduction to Cloud Security π14:14:46 Virtual Security Solutions π14:30:03 Azure Standards and Policies π14:42:48 Introduction to SIEM and SOAR Microsoft 365 Defender Threat Protection π15:08:04 Defender Services π15:31:47 Endpoints and Cloud Apps Security π16:05:11 Identity Defence Graded Assessment and Course Wrap up π16:42:45 Final Project and Assessment Cybersecurity Solutions and Microsoft Defender π16:48:18 Course Wrap up βCYBERSECURITY TOOLS AND TECHNOLOGIES Penetration testing π16:52:36 Course Introduction π16:56:34 Defence and Offense red versus blue π17:14:30 Testing Stages π17:49:38 Types of Penetration Test Preventative Tools π18:13:29 Intrusive Detection and Prevention Systems π18:42:23 Designing Firewalls Solutions in Azure π18:58:55 Azure virtual Private Network VPN π19:37:35 Vulnerability Management Azure Penetration Testing π20:08:57 The Command LIne and Windows Powershell π20:34:49 Setting up Azure for Testing π21:13:43 Running the Test Final Project and Assessment Cybersecurity Tools and Technologies π21:42:15 Final Project and Assessment Cybersecurity Tools and Techonologies π21:48:14 Wrap up Cybersecurity tools and technologies βCYBERSECURITY MANAGEMENT AND COMPILIANCE Security Administration π21:52:43 Course Introduction π21:56:54 Cloud Security Planning π22:29:28 Cloud adoption framework π22:44:54 Data Management and Administration π23:08:13 Availability and Continuity Compliance Solutions π23:58:47 Compliance Management π24:46:38 Insider Risk π25:14:34 Information Protection and Data lifecycle Laws and Standards π25:47:59 Information Security Management Act ISMA π26:16:26 So International Organizing For Standardization Standards π26:37:44 Control Objectives for Information and related Technologies Cobit Final Project and Assessment Cybersecurity Managent and Compliance π27:05:27 Final Project and Assessment Cybersecurity Managent and Compliance π27:12:41 Course Wrap up Cybersecurity Management and Compliance β ADVANCED CYBERSECURITY CONCEPTS AND CAPSTONE PROJECT Threat Modeling π27:17:09 Course Introduction π27:20:53 Introduction to Threats Modeling π27:48:26 Threat Modeling Strategies π28:26:47 Azure and threat Modeling Advanced Threats and Mitigation π28:56:55 Susceptible infrastructure and Types of attack π29:32:02 IOT Internet of things and common attacks Security Conscious Modeling π30:23:15 Entry Point and Associated Risks π30:45:36 Secure network Design with Defence in Depth π31:13:19 Mitigation Strategies Capstone Project π31:53:02 Capstone Project π32:05:21 Wrap up Advanced Cybersecurity Concepts and Capstone β MICROSOFT SC 900 EXAM PREPARATION AND PRACTICE Concepts of Security Compliance and Identity π32:09:39 Welcome to the Course π32:15:46 Microsoft Certification π32:20:06 Security and Compliance Concepts π32:50:46 Identity Concepts The Capabilities of Microsoft Azure Active Directory π33:29:52 Authentication Capabilities of Azure AD π33:45:29 Access Management Capabilities of Azure AD π34:01:09 Identity Protection and Governance Capablities of Azure AD Microsoft Security Solutions π34:19:19 Basic Security Capabilities in Azure π34:41:11 Azure Security Management π35:03:03 Security Capabilities of Microsoft Sentinel π35:18:31 Threat protection with Microsoft 365 Defender The Capablities of Microsoft Compliance Solutions π35:49:49 Microsoft Service Trust Portal Privacy Principles π36:03:00 Compliance Management Capabilities of Microsoft Purview π36:20:57 Information Protection and Data Lifecycle Managent Capabilities of Microsoft Risk and Resource Governance π36:49:00 Describe insider risk capabilities in Microsoft Purview π37:07:50 Resource governance Capablities in Azure Practice Exam π37:29:44 SC-900 Practice-Exam π37:35:37
-
So many haters here... Not everyone has a kali vm inside of Parrot on a TAILS vm, but everyone does have to start somewhere. Anyone actually in security knows that an uneducated user is one of the biggest risks. The weather someone is here to start their journey or just to have a better understanding, props to you and keep it up.
-
Thank all of you to provide this course
-
Love you guys β€οΈ you are the best people on YouTube β€οΈβ€οΈβ€οΈ
-
Great work! Thank you very much! ππππππ
-
Wow πawesome π
-
Thank you so much for this
-
Huge thanks for this free lesson
-
Amazing videos for beginner, thank you!
-
Omg great work, need more patience and time to complete these work hatsoff πthank you ππππ
-
Thanks so much for this upload
-
Amazing videos for beginners, thank you! To your channel
-
Thank you β€
-
Thank you so much, not only did you compile all the lessons into one video, you also provided the lesson and reading content as well. Also before anyone comes at me, yes, this is probably illegal but not all of us can afford to pay for every lesson and some of us desperately need to learn. Knowledge should be free :(
-
BASED upload ; kudos/congrats u absolute chads
-
Thanks for this β€
-
Remember back in the day when they would roll the TV/VCR into the classroom on that cart? The directing of this is every 90s instructional video.
-
Unbelievable ππ
-
27 hours in. No sleep. No food. No water. Wish me luck guys!
-
Thank you.