Cybersecurity Mastery: Complete Course in a Single Video | Cybersecurity For Beginners

435,909
0
2024-02-01ใซๅ…ฑๆœ‰
โญโญโญโญ๐Ÿ•‘TIME STAMP IS IN THE COMMENTS SECTION๐Ÿ“‹โญโญโญโญโญ

What you'll learn
โœ… Understand the cybersecurity landscape and learn core concepts foundational to security, compliance, and identity solutions.
โœ…Understand the vulnerabilities of an organizations network and mitigate attacks on network infrastructures to protect data.
โœ…Develop and implement threat mitigation strategies by applying effective cybersecurity measures within an Azure environment.
โœ…Demonstrate your new skills with a capstone project and prepare for the industry-recognized Microsoft SC-900 Certification exam.

๐Ÿ‘‰Course Material โฌ‡โฌ‡
drive.google.com/file/d/1F8nS6BOV_j6Td_aZd3QgxKYY2โ€ฆ

โคโค Please like, share, and subscribe for more content! Avoid downloading to support the channel. Thanks for your ongoing support! ๐Ÿ™ #SupportCreators"โคโค

โœจโœจPLEASE IGNORE THESE TAGSโœจโœจ
cybersecurity for beginners
cybersecurity fundamentals
cybersecurity 101
introduction to cybersecurity
cybersecurity basics
cybersecurity crash course
intro to cybersecurity
cybersecurity risk management
cybersecurity tutorial
By Microsoft
#cybersecurity
cyber security,
cybersecurity roadmap,
cybersecurity bootcamp,
#cybersecurityforbeginners
all about cybersecurity,
cybersecurity basics,
cybersecurity basics for beginners,
cybersecurity beginner course,
basics of cybersecurity,
basics of cybersecurity for beginners,
best cybersecurity courses,
cybersecurity crash course,
cybersecurity compliance analyst,
everything about cybersecurity
#cybersecurityanalyst

ใ‚ณใƒกใƒณใƒˆ (21)
  • @Nerdslesson
    โญโญโญโญ๐Ÿ•‘TIME STAMP๐Ÿ“‹โญโญโญโญโญ Cybersecurity For Beginners By Google: https://youtu.be/Ieegg45Pojw โถ INTRODUCTION TO COMPUTERS AND OPERATING SYSTEMS Introduction to Computers and Operating systems ๐Ÿ•›00:00 Course Introduction ๐Ÿ•›14:13 Threat Landscape ๐Ÿ•›23:35 Introduction to Computing devices ๐Ÿ•›34:32 Operating systems Enterprise Systems and Security ๐Ÿ•›49:21 Servers Storage and Backups ๐Ÿ•›1:00:36 Computing Environments ๐Ÿ•›1:11:46 Maintenance and Patches Business Systems Applications ๐Ÿ•›1:26:27 Business Software ๐Ÿ•›1:36:15 Email Apps ๐Ÿ•›1:47:00 Storage Solutions Computers Operating Systems and Security ๐Ÿ•›2:09:26 Final Course assessment ๐Ÿ•›2:13:54 Course Wrap up โž‹ INTRODUCTION TO NETWORKING AND CLOUD COMPUTING Computer Networking ๐Ÿ•›2:16:46 Course introduction ๐Ÿ•›2:21:55 Types and Topologies ๐Ÿ•›2:32:52 IP Addressing Network Devices and Protocols ๐Ÿ•›2:51:22 Infrastructure ๐Ÿ•›3:03:24 Network Communication Models ๐Ÿ•›3:16:00 Protocols and ports ๐Ÿ•›3:26:40 Network Traffic monitoring Network Security ๐Ÿ•›3:41:09 Network Client and Server ๐Ÿ•›3:52:19 Authentication and Authorization ๐Ÿ•›4:08:09 Firewalls and Security tools Cloud Computing and Networking ๐Ÿ•›4:37:44 Introduction to Azure ๐Ÿ•›4:46:34 Virtual Environments ๐Ÿ•›4:59:47 Cloud Services ๐Ÿ•›5:14:33 X as A Service Networking and Cloud Computing ๐Ÿ•›5:30:02 Final Course Project and Assessment ๐Ÿ•›5:37:35 Course wrap up โžŒ CYBERSECURITY THREAT VECTORS AND MITIGATION Threats and attacts ๐Ÿ•›5:40:33 Course introduction ๐Ÿ•›5:44:05 Epic attacts ๐Ÿ•›5:53:59 Theats vectors ๐Ÿ•›6:11:24 Mitigation Strategies Cryptography ๐Ÿ•›6:26:24 Encryption ๐Ÿ•›6:33:41 Public Private key and hashing ๐Ÿ•›6:49:15 Digital Signing and certificates ๐Ÿ•›7:04:27 Authentication and Authorization Network and Device Based threats ๐Ÿ•›7:19:42 Data Transmission ๐Ÿ•›7:35:49 Security controls ๐Ÿ•›7:50:47 Application Updates Security Compliance and Identity ๐Ÿ•›8:06:06 Security and Compaince Concepts ๐Ÿ•›8:19:41 ID and Active Directory ๐Ÿ•›8:34:46 Defence Models Cybersecurity Threat Vectors and Mitigation ๐Ÿ•›8:49:23 Final Course Project and Assessment ๐Ÿ•›8:55:16 Course Wrap up โžCYBERSECURITY IDENTITY AND ACCESS WITH AZURE AD Identity Services ๐Ÿ•›8:58:01 Course introduction ๐Ÿ•›9:02:53 Azure Active Directory ๐Ÿ•›9:24:20 Azure Active Directory and Editions ๐Ÿ•›9:36:51 Azure Active Directory Identity types Active Directory Authentication ๐Ÿ•›9:58:09 Authentication Methods ๐Ÿ•›10:31:30 Multi-Factor Authentication ๐Ÿ•›10:51:25 Password Protection and Resetting Active Directory Access Protection and Governance Management ๐Ÿ•›11:17:11 Condition Access ๐Ÿ•›11:33:46 Roles and Role Based Access ๐Ÿ•›11:45:44 Identity Governance ๐Ÿ•›12:06:51 Privileged Identity management and Protection Identity and Access Solutions ๐Ÿ•›12:26:15 Final Course Project Assessment ๐Ÿ•›12:33:24 Course Wrap up โžŽCYBERSECURITY SOLUTIONS AND MICROSOFT DEFENDER Azure Basics Security Capabilities ๐Ÿ•›12:36:56 Course Introduction ๐Ÿ•›12:41:24 Distributed Denial of Service DDOS Protection ๐Ÿ•›13:04:21 Azure Firewall Protection ๐Ÿ•›13:36:11 Just In Time Access and Encryption Security Management in Azure ๐Ÿ•›13:56:32 Introduction to Cloud Security ๐Ÿ•›14:14:46 Virtual Security Solutions ๐Ÿ•›14:30:03 Azure Standards and Policies ๐Ÿ•›14:42:48 Introduction to SIEM and SOAR Microsoft 365 Defender Threat Protection ๐Ÿ•›15:08:04 Defender Services ๐Ÿ•›15:31:47 Endpoints and Cloud Apps Security ๐Ÿ•›16:05:11 Identity Defence Graded Assessment and Course Wrap up ๐Ÿ•›16:42:45 Final Project and Assessment Cybersecurity Solutions and Microsoft Defender ๐Ÿ•›16:48:18 Course Wrap up โžCYBERSECURITY TOOLS AND TECHNOLOGIES Penetration testing ๐Ÿ•›16:52:36 Course Introduction ๐Ÿ•›16:56:34 Defence and Offense red versus blue ๐Ÿ•›17:14:30 Testing Stages ๐Ÿ•›17:49:38 Types of Penetration Test Preventative Tools ๐Ÿ•›18:13:29 Intrusive Detection and Prevention Systems ๐Ÿ•›18:42:23 Designing Firewalls Solutions in Azure ๐Ÿ•›18:58:55 Azure virtual Private Network VPN ๐Ÿ•›19:37:35 Vulnerability Management Azure Penetration Testing ๐Ÿ•›20:08:57 The Command LIne and Windows Powershell ๐Ÿ•›20:34:49 Setting up Azure for Testing ๐Ÿ•›21:13:43 Running the Test Final Project and Assessment Cybersecurity Tools and Technologies ๐Ÿ•›21:42:15 Final Project and Assessment Cybersecurity Tools and Techonologies ๐Ÿ•›21:48:14 Wrap up Cybersecurity tools and technologies โžCYBERSECURITY MANAGEMENT AND COMPILIANCE Security Administration ๐Ÿ•›21:52:43 Course Introduction ๐Ÿ•›21:56:54 Cloud Security Planning ๐Ÿ•›22:29:28 Cloud adoption framework ๐Ÿ•›22:44:54 Data Management and Administration ๐Ÿ•›23:08:13 Availability and Continuity Compliance Solutions ๐Ÿ•›23:58:47 Compliance Management ๐Ÿ•›24:46:38 Insider Risk ๐Ÿ•›25:14:34 Information Protection and Data lifecycle Laws and Standards ๐Ÿ•›25:47:59 Information Security Management Act ISMA ๐Ÿ•›26:16:26 So International Organizing For Standardization Standards ๐Ÿ•›26:37:44 Control Objectives for Information and related Technologies Cobit Final Project and Assessment Cybersecurity Managent and Compliance ๐Ÿ•›27:05:27 Final Project and Assessment Cybersecurity Managent and Compliance ๐Ÿ•›27:12:41 Course Wrap up Cybersecurity Management and Compliance โž‘ ADVANCED CYBERSECURITY CONCEPTS AND CAPSTONE PROJECT Threat Modeling ๐Ÿ•›27:17:09 Course Introduction ๐Ÿ•›27:20:53 Introduction to Threats Modeling ๐Ÿ•›27:48:26 Threat Modeling Strategies ๐Ÿ•›28:26:47 Azure and threat Modeling Advanced Threats and Mitigation ๐Ÿ•›28:56:55 Susceptible infrastructure and Types of attack ๐Ÿ•›29:32:02 IOT Internet of things and common attacks Security Conscious Modeling ๐Ÿ•›30:23:15 Entry Point and Associated Risks ๐Ÿ•›30:45:36 Secure network Design with Defence in Depth ๐Ÿ•›31:13:19 Mitigation Strategies Capstone Project ๐Ÿ•›31:53:02 Capstone Project ๐Ÿ•›32:05:21 Wrap up Advanced Cybersecurity Concepts and Capstone โž’ MICROSOFT SC 900 EXAM PREPARATION AND PRACTICE Concepts of Security Compliance and Identity ๐Ÿ•›32:09:39 Welcome to the Course ๐Ÿ•›32:15:46 Microsoft Certification ๐Ÿ•›32:20:06 Security and Compliance Concepts ๐Ÿ•›32:50:46 Identity Concepts The Capabilities of Microsoft Azure Active Directory ๐Ÿ•›33:29:52 Authentication Capabilities of Azure AD ๐Ÿ•›33:45:29 Access Management Capabilities of Azure AD ๐Ÿ•›34:01:09 Identity Protection and Governance Capablities of Azure AD Microsoft Security Solutions ๐Ÿ•›34:19:19 Basic Security Capabilities in Azure ๐Ÿ•›34:41:11 Azure Security Management ๐Ÿ•›35:03:03 Security Capabilities of Microsoft Sentinel ๐Ÿ•›35:18:31 Threat protection with Microsoft 365 Defender The Capablities of Microsoft Compliance Solutions ๐Ÿ•›35:49:49 Microsoft Service Trust Portal Privacy Principles ๐Ÿ•›36:03:00 Compliance Management Capabilities of Microsoft Purview ๐Ÿ•›36:20:57 Information Protection and Data Lifecycle Managent Capabilities of Microsoft Risk and Resource Governance ๐Ÿ•›36:49:00 Describe insider risk capabilities in Microsoft Purview ๐Ÿ•›37:07:50 Resource governance Capablities in Azure Practice Exam ๐Ÿ•›37:29:44 SC-900 Practice-Exam ๐Ÿ•›37:35:37
  • @ncairsoft
    So many haters here... Not everyone has a kali vm inside of Parrot on a TAILS vm, but everyone does have to start somewhere. Anyone actually in security knows that an uneducated user is one of the biggest risks. The weather someone is here to start their journey or just to have a better understanding, props to you and keep it up.
  • @TheDocbach
    27 hours in. No sleep. No food. No water. Wish me luck guys!
  • @mwapeg
    Thank you so much, not only did you compile all the lessons into one video, you also provided the lesson and reading content as well. Also before anyone comes at me, yes, this is probably illegal but not all of us can afford to pay for every lesson and some of us desperately need to learn. Knowledge should be free :(
  • @MilkandWaterAh
    The time has finally come! I will complete every hour, every minute and every second of this course. There is no one to stop me but myself. Comment if you believe in me!
  • @jeffwads
    Nothing beats hands-on experience. Nothing.
  • @cptcryogenix
    Amazing videos for beginners, thank you! To your channel
  • @RichardinSA
    Remember back in the day when they would roll the TV/VCR into the classroom on that cart? The directing of this is every 90s instructional video.
  • @theevolversuniverse65
    Thank you for uploading Chapters! This is the only channel Iโ€™ve seen this implemented in this manner. Keep the courses coming!
  • @Aradhyashh
    Omg great work, need more patience and time to complete these work hatsoff ๐Ÿ™thank you ๐Ÿ™๐Ÿ™๐Ÿ™๐Ÿ™
  • @emanda1366
    Great work! Thank you very much! ๐Ÿ๐Ÿ๐Ÿ๐Ÿ๐Ÿ๐Ÿ™
  • @arvindbilwal3374
    Love you guys โค๏ธ you are the best people on YouTube โค๏ธโค๏ธโค๏ธ
  • @CYI3ERPUNK
    BASED upload ; kudos/congrats u absolute chads
  • @user-gs4kj4iv5j
    anyone who completed this video share your experience how was the course reviews for beginners