589689.xyz

Cybersecurity for Small and Medium Businesses - Essential Training

  • 收录时间:2021-06-04 21:50:38
  • 文件大小:342MB
  • 下载次数:1
  • 最近下载:2021-06-04 21:50:38
  • 磁力链接:

文件列表

  1. 2.1. The Basics/03.Why you should care.mp4 30MB
  2. 1.Introduction/01.Welcome.mp4 21MB
  3. 4.3. Protect/16.Technology solutions to protect a business.mp4 19MB
  4. 7.6. Recover/28.Cybersecurity insurance.mp4 15MB
  5. 4.3. Protect/15.Sharing online - How to prevent a phish.mp4 14MB
  6. 2.1. The Basics/07.What are the cybersecurity threats.mp4 14MB
  7. 4.3. Protect/18.Culture of security - Policies, procedures, and attitude.mp4 14MB
  8. 6.5. Respond/24.Key elements of a cyber incident response.mp4 13MB
  9. 4.3. Protect/17.Passphrases and authentication.mp4 13MB
  10. 3.2. Identify/11.Account access best practices.mp4 12MB
  11. 5.4. Detect/21.Cybersecurity assessments and detection technology solutions.mp4 12MB
  12. 8.7. Resources/32.Scam and threat alerts.mp4 11MB
  13. 8.7. Resources/31.More cybersecurity resources.mp4 11MB
  14. 3.2. Identify/12.What about the cloud.mp4 11MB
  15. 6.5. Respond/26.State breach response laws.mp4 9MB
  16. 3.2. Identify/09.Step #1 - Identify key assets.mp4 9MB
  17. 6.5. Respond/22.Step #4 - Respond to a cyber breach.mp4 9MB
  18. 5.4. Detect/19.Step #3 - Detect a breach.mp4 9MB
  19. 2.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9MB
  20. 9.Conclusion/33.Next steps.mp4 9MB
  21. 6.5. Respond/25.Federal government response support and guidance.mp4 8MB
  22. 8.7. Resources/30.Technology checklists for small and medium businesses.mp4 8MB
  23. 4.3. Protect/14.Humans - Education and awareness is essential.mp4 7MB
  24. 2.1. The Basics/08.A five-step process to improve cybersecurity.mp4 7MB
  25. 7.6. Recover/29.Reputation management.mp4 7MB
  26. 2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.mp4 7MB
  27. 4.3. Protect/13.Step #2 - Protect data and accounts.mp4 6MB
  28. 6.5. Respond/23.Cybersecurity response plans for business.mp4 6MB
  29. 7.6. Recover/27.Step #5 - How to recover from a cyber incident.mp4 6MB
  30. 5.4. Detect/20.Detecting a compromise - The human element.mp4 5MB
  31. 1.Introduction/02.What you should know.mp4 5MB
  32. 2.1. The Basics/04.Physical security vs. cybersecurity.mp4 5MB
  33. 3.2. Identify/10.Inventory sheet - Data and devices.mp4 3MB
  34. 4.3. Protect/16.Technology solutions to protect a business.en.srt 9KB
  35. 3.2. Identify/12.What about the cloud.en.srt 9KB
  36. 6.5. Respond/24.Key elements of a cyber incident response.en.srt 9KB
  37. 5.4. Detect/21.Cybersecurity assessments and detection technology solutions.en.srt 8KB
  38. 4.3. Protect/18.Culture of security - Policies, procedures, and attitude.en.srt 8KB
  39. 4.3. Protect/15.Sharing online - How to prevent a phish.en.srt 7KB
  40. 4.3. Protect/17.Passphrases and authentication.en.srt 7KB
  41. 7.6. Recover/28.Cybersecurity insurance.en.srt 7KB
  42. 2.1. The Basics/03.Why you should care.en.srt 7KB
  43. 2.1. The Basics/07.What are the cybersecurity threats.en.srt 6KB
  44. 3.2. Identify/11.Account access best practices.en.srt 6KB
  45. 8.7. Resources/32.Scam and threat alerts.en.srt 6KB
  46. 4.3. Protect/14.Humans - Education and awareness is essential.en.srt 5KB
  47. 8.7. Resources/31.More cybersecurity resources.en.srt 5KB
  48. 6.5. Respond/26.State breach response laws.en.srt 5KB
  49. 6.5. Respond/25.Federal government response support and guidance.en.srt 5KB
  50. 2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.en.srt 4KB
  51. 2.1. The Basics/08.A five-step process to improve cybersecurity.en.srt 4KB
  52. 6.5. Respond/23.Cybersecurity response plans for business.en.srt 4KB
  53. 8.7. Resources/30.Technology checklists for small and medium businesses.en.srt 3KB
  54. 7.6. Recover/29.Reputation management.en.srt 3KB
  55. 2.1. The Basics/05.Anyone can improve the cybersecurity of a business.en.srt 3KB
  56. 5.4. Detect/19.Step #3 - Detect a breach.en.srt 3KB
  57. 3.2. Identify/09.Step #1 - Identify key assets.en.srt 3KB
  58. 5.4. Detect/20.Detecting a compromise - The human element.en.srt 3KB
  59. 6.5. Respond/22.Step #4 - Respond to a cyber breach.en.srt 2KB
  60. 9.Conclusion/33.Next steps.en.srt 2KB
  61. 1.Introduction/01.Welcome.en.srt 2KB
  62. 2.1. The Basics/04.Physical security vs. cybersecurity.en.srt 2KB
  63. 7.6. Recover/27.Step #5 - How to recover from a cyber incident.en.srt 2KB
  64. 3.2. Identify/10.Inventory sheet - Data and devices.en.srt 2KB
  65. 4.3. Protect/13.Step #2 - Protect data and accounts.en.srt 2KB
  66. 1.Introduction/02.What you should know.en.srt 1KB