Cybersecurity Mastery: Complete Course in a Single Video | Cybersecurity For Beginners
435,909
2024-02-01ใซๅ
ฑๆ
What you'll learn
โ Understand the cybersecurity landscape and learn core concepts foundational to security, compliance, and identity solutions.
โ Understand the vulnerabilities of an organizations network and mitigate attacks on network infrastructures to protect data.
โ Develop and implement threat mitigation strategies by applying effective cybersecurity measures within an Azure environment.
โ Demonstrate your new skills with a capstone project and prepare for the industry-recognized Microsoft SC-900 Certification exam.
๐Course Material โฌโฌ
drive.google.com/file/d/1F8nS6BOV_j6Td_aZd3QgxKYY2โฆ
โคโค Please like, share, and subscribe for more content! Avoid downloading to support the channel. Thanks for your ongoing support! ๐ #SupportCreators"โคโค
โจโจPLEASE IGNORE THESE TAGSโจโจ
cybersecurity for beginners
cybersecurity fundamentals
cybersecurity 101
introduction to cybersecurity
cybersecurity basics
cybersecurity crash course
intro to cybersecurity
cybersecurity risk management
cybersecurity tutorial
By Microsoft
#cybersecurity
cyber security,
cybersecurity roadmap,
cybersecurity bootcamp,
#cybersecurityforbeginners
all about cybersecurity,
cybersecurity basics,
cybersecurity basics for beginners,
cybersecurity beginner course,
basics of cybersecurity,
basics of cybersecurity for beginners,
best cybersecurity courses,
cybersecurity crash course,
cybersecurity compliance analyst,
everything about cybersecurity
#cybersecurityanalyst
ใณใกใณใ (21)
-
โญโญโญโญ๐TIME STAMP๐โญโญโญโญโญ Cybersecurity For Beginners By Google: https://youtu.be/Ieegg45Pojw โถ INTRODUCTION TO COMPUTERS AND OPERATING SYSTEMS Introduction to Computers and Operating systems ๐00:00 Course Introduction ๐14:13 Threat Landscape ๐23:35 Introduction to Computing devices ๐34:32 Operating systems Enterprise Systems and Security ๐49:21 Servers Storage and Backups ๐1:00:36 Computing Environments ๐1:11:46 Maintenance and Patches Business Systems Applications ๐1:26:27 Business Software ๐1:36:15 Email Apps ๐1:47:00 Storage Solutions Computers Operating Systems and Security ๐2:09:26 Final Course assessment ๐2:13:54 Course Wrap up โ INTRODUCTION TO NETWORKING AND CLOUD COMPUTING Computer Networking ๐2:16:46 Course introduction ๐2:21:55 Types and Topologies ๐2:32:52 IP Addressing Network Devices and Protocols ๐2:51:22 Infrastructure ๐3:03:24 Network Communication Models ๐3:16:00 Protocols and ports ๐3:26:40 Network Traffic monitoring Network Security ๐3:41:09 Network Client and Server ๐3:52:19 Authentication and Authorization ๐4:08:09 Firewalls and Security tools Cloud Computing and Networking ๐4:37:44 Introduction to Azure ๐4:46:34 Virtual Environments ๐4:59:47 Cloud Services ๐5:14:33 X as A Service Networking and Cloud Computing ๐5:30:02 Final Course Project and Assessment ๐5:37:35 Course wrap up โ CYBERSECURITY THREAT VECTORS AND MITIGATION Threats and attacts ๐5:40:33 Course introduction ๐5:44:05 Epic attacts ๐5:53:59 Theats vectors ๐6:11:24 Mitigation Strategies Cryptography ๐6:26:24 Encryption ๐6:33:41 Public Private key and hashing ๐6:49:15 Digital Signing and certificates ๐7:04:27 Authentication and Authorization Network and Device Based threats ๐7:19:42 Data Transmission ๐7:35:49 Security controls ๐7:50:47 Application Updates Security Compliance and Identity ๐8:06:06 Security and Compaince Concepts ๐8:19:41 ID and Active Directory ๐8:34:46 Defence Models Cybersecurity Threat Vectors and Mitigation ๐8:49:23 Final Course Project and Assessment ๐8:55:16 Course Wrap up โCYBERSECURITY IDENTITY AND ACCESS WITH AZURE AD Identity Services ๐8:58:01 Course introduction ๐9:02:53 Azure Active Directory ๐9:24:20 Azure Active Directory and Editions ๐9:36:51 Azure Active Directory Identity types Active Directory Authentication ๐9:58:09 Authentication Methods ๐10:31:30 Multi-Factor Authentication ๐10:51:25 Password Protection and Resetting Active Directory Access Protection and Governance Management ๐11:17:11 Condition Access ๐11:33:46 Roles and Role Based Access ๐11:45:44 Identity Governance ๐12:06:51 Privileged Identity management and Protection Identity and Access Solutions ๐12:26:15 Final Course Project Assessment ๐12:33:24 Course Wrap up โCYBERSECURITY SOLUTIONS AND MICROSOFT DEFENDER Azure Basics Security Capabilities ๐12:36:56 Course Introduction ๐12:41:24 Distributed Denial of Service DDOS Protection ๐13:04:21 Azure Firewall Protection ๐13:36:11 Just In Time Access and Encryption Security Management in Azure ๐13:56:32 Introduction to Cloud Security ๐14:14:46 Virtual Security Solutions ๐14:30:03 Azure Standards and Policies ๐14:42:48 Introduction to SIEM and SOAR Microsoft 365 Defender Threat Protection ๐15:08:04 Defender Services ๐15:31:47 Endpoints and Cloud Apps Security ๐16:05:11 Identity Defence Graded Assessment and Course Wrap up ๐16:42:45 Final Project and Assessment Cybersecurity Solutions and Microsoft Defender ๐16:48:18 Course Wrap up โCYBERSECURITY TOOLS AND TECHNOLOGIES Penetration testing ๐16:52:36 Course Introduction ๐16:56:34 Defence and Offense red versus blue ๐17:14:30 Testing Stages ๐17:49:38 Types of Penetration Test Preventative Tools ๐18:13:29 Intrusive Detection and Prevention Systems ๐18:42:23 Designing Firewalls Solutions in Azure ๐18:58:55 Azure virtual Private Network VPN ๐19:37:35 Vulnerability Management Azure Penetration Testing ๐20:08:57 The Command LIne and Windows Powershell ๐20:34:49 Setting up Azure for Testing ๐21:13:43 Running the Test Final Project and Assessment Cybersecurity Tools and Technologies ๐21:42:15 Final Project and Assessment Cybersecurity Tools and Techonologies ๐21:48:14 Wrap up Cybersecurity tools and technologies โCYBERSECURITY MANAGEMENT AND COMPILIANCE Security Administration ๐21:52:43 Course Introduction ๐21:56:54 Cloud Security Planning ๐22:29:28 Cloud adoption framework ๐22:44:54 Data Management and Administration ๐23:08:13 Availability and Continuity Compliance Solutions ๐23:58:47 Compliance Management ๐24:46:38 Insider Risk ๐25:14:34 Information Protection and Data lifecycle Laws and Standards ๐25:47:59 Information Security Management Act ISMA ๐26:16:26 So International Organizing For Standardization Standards ๐26:37:44 Control Objectives for Information and related Technologies Cobit Final Project and Assessment Cybersecurity Managent and Compliance ๐27:05:27 Final Project and Assessment Cybersecurity Managent and Compliance ๐27:12:41 Course Wrap up Cybersecurity Management and Compliance โ ADVANCED CYBERSECURITY CONCEPTS AND CAPSTONE PROJECT Threat Modeling ๐27:17:09 Course Introduction ๐27:20:53 Introduction to Threats Modeling ๐27:48:26 Threat Modeling Strategies ๐28:26:47 Azure and threat Modeling Advanced Threats and Mitigation ๐28:56:55 Susceptible infrastructure and Types of attack ๐29:32:02 IOT Internet of things and common attacks Security Conscious Modeling ๐30:23:15 Entry Point and Associated Risks ๐30:45:36 Secure network Design with Defence in Depth ๐31:13:19 Mitigation Strategies Capstone Project ๐31:53:02 Capstone Project ๐32:05:21 Wrap up Advanced Cybersecurity Concepts and Capstone โ MICROSOFT SC 900 EXAM PREPARATION AND PRACTICE Concepts of Security Compliance and Identity ๐32:09:39 Welcome to the Course ๐32:15:46 Microsoft Certification ๐32:20:06 Security and Compliance Concepts ๐32:50:46 Identity Concepts The Capabilities of Microsoft Azure Active Directory ๐33:29:52 Authentication Capabilities of Azure AD ๐33:45:29 Access Management Capabilities of Azure AD ๐34:01:09 Identity Protection and Governance Capablities of Azure AD Microsoft Security Solutions ๐34:19:19 Basic Security Capabilities in Azure ๐34:41:11 Azure Security Management ๐35:03:03 Security Capabilities of Microsoft Sentinel ๐35:18:31 Threat protection with Microsoft 365 Defender The Capablities of Microsoft Compliance Solutions ๐35:49:49 Microsoft Service Trust Portal Privacy Principles ๐36:03:00 Compliance Management Capabilities of Microsoft Purview ๐36:20:57 Information Protection and Data Lifecycle Managent Capabilities of Microsoft Risk and Resource Governance ๐36:49:00 Describe insider risk capabilities in Microsoft Purview ๐37:07:50 Resource governance Capablities in Azure Practice Exam ๐37:29:44 SC-900 Practice-Exam ๐37:35:37
-
So many haters here... Not everyone has a kali vm inside of Parrot on a TAILS vm, but everyone does have to start somewhere. Anyone actually in security knows that an uneducated user is one of the biggest risks. The weather someone is here to start their journey or just to have a better understanding, props to you and keep it up.
-
27 hours in. No sleep. No food. No water. Wish me luck guys!
-
Thank you so much, not only did you compile all the lessons into one video, you also provided the lesson and reading content as well. Also before anyone comes at me, yes, this is probably illegal but not all of us can afford to pay for every lesson and some of us desperately need to learn. Knowledge should be free :(
-
The time has finally come! I will complete every hour, every minute and every second of this course. There is no one to stop me but myself. Comment if you believe in me!
-
Nothing beats hands-on experience. Nothing.
-
Amazing videos for beginners, thank you! To your channel
-
Thank all of you to provide this course
-
Remember back in the day when they would roll the TV/VCR into the classroom on that cart? The directing of this is every 90s instructional video.
-
Huge thanks for this free lesson
-
Thank you for uploading Chapters! This is the only channel Iโve seen this implemented in this manner. Keep the courses coming!
-
Omg great work, need more patience and time to complete these work hatsoff ๐thank you ๐๐๐๐
-
Great work! Thank you very much! ๐๐๐๐๐๐
-
Love you guys โค๏ธ you are the best people on YouTube โค๏ธโค๏ธโค๏ธ
-
BASED upload ; kudos/congrats u absolute chads
-
Amazing videos for beginner, thank you!
-
anyone who completed this video share your experience how was the course reviews for beginners
-
Wow am so grateful thank you so much for the course
-
Thank you. Great course. The best.
-
Am glad to see other detamind people here. ๐