Cyber Security Data Security Combat Cyber Threats ChatGPT
Language: English | Size:10.99 GB
Genre:eLearning
Files Included :
1 - Introduction.mp4 (101.03 MB)
MP4
3 - Lets Celebrate Your Progress In This Course 25 50 75 100.mp4 (11.94 MB)
MP4
4 - Preview The 87 Page Cyber Security Awareness Workbook You Get With This Course.mp4 (31.32 MB)
MP4
76 - What is an Attack.mp4 (52.83 MB)
MP4
77 - Categories of Cyber Attacks.mp4 (95.42 MB)
MP4
78 - Types of Attacks.mp4 (7.11 MB)
MP4
79 - Password attack and its types.mp4 (187.34 MB)
MP4
80 - Malware Attack.mp4 (30.93 MB)
MP4
81 - Types of Malware Worms.mp4 (12.02 MB)
MP4
82 - Types of Malware Viruses.mp4 (53.5 MB)
MP4
83 - Types of Malware Trojan.mp4 (49.96 MB)
MP4
84 - Types of Malware Adware.mp4 (15.21 MB)
MP4
85 - Types of Malware Spyware.mp4 (6.22 MB)
MP4
86 - Types of Malware Crimeware.mp4 (13.1 MB)
MP4
87 - Types of Malware Rootkit.mp4 (12.1 MB)
MP4
88 - Types of Malware Ransomware.mp4 (69.22 MB)
MP4
89 - Man in the Middle Attack.mp4 (22.03 MB)
MP4
90 - Man in the Middle Attack Example.mp4 (28.77 MB)
MP4
91 - Sniffing Attack.mp4 (106.73 MB)
MP4
92 - DOS Attack.mp4 (87.63 MB)
MP4
93 - DOS Attack Example.mp4 (44.86 MB)
MP4
100 - Crosssite Scripting Attack.mp4 (43.84 MB)
MP4
101 - Post Scanning Attack.mp4 (217.99 MB)
MP4
94 - What is DDOS Attack.mp4 (102.9 MB)
MP4
95 - DDOS Attack Example.mp4 (90.3 MB)
MP4
96 - Phishing Attack.mp4 (65.83 MB)
MP4
97 - Phishing Attack Example.mp4 (23.97 MB)
MP4
98 - SQL Injection Attack.mp4 (15.67 MB)
MP4
99 - Example of SQL Injection Attack.mp4 (23.25 MB)
MP4
102 - What is Cryptology.mp4 (100.09 MB)
MP4
103 - The Need for Cryptography.mp4 (62.43 MB)
MP4
104 - Basic Cryptography System.mp4 (13.68 MB)
MP4
105 - What is Encryption.mp4 (10.64 MB)
MP4
106 - What is Decryption.mp4 (6.85 MB)
MP4
107 - Define Plain text.mp4 (3.86 MB)
MP4
108 - Youve Achieved 50 Lets Celebrate Your Progress And Keep Going To 75.mp4 (2.4 MB)
MP4
109 - What is Secret Key.mp4 (5.15 MB)
MP4
110 - What is Cipher text.mp4 (6.67 MB)
MP4
111 - Cryptography System.mp4 (15.3 MB)
MP4
112 - Cryptography in everyday life.mp4 (143.84 MB)
MP4
113 - Types of Cryptography.mp4 (7.82 MB)
MP4
114 - Symmetric Key Cryptography.mp4 (36.58 MB)
MP4
115 - Asymmetric Key Cryptography.mp4 (57.37 MB)
MP4
116 - What is Hashing.mp4 (127.93 MB)
MP4
117 - Hashing Algorithm.mp4 (7.38 MB)
MP4
118 - Techniques of Hashing.mp4 (127.41 MB)
MP4
119 - What is Substitution Cipher.mp4 (87.13 MB)
MP4
120 - What is Transposition Cipher.mp4 (11.48 MB)
MP4
121 - Cesar Cipher and how it works.mp4 (53.69 MB)
MP4
122 - Example of Cesar Cipher.mp4 (75.76 MB)
MP4
123 - Transposition Cipher.mp4 (13.11 MB)
MP4
124 - Example of Transposition Cipher.mp4 (35.16 MB)
MP4
125 - Stream Cipher.mp4 (59.88 MB)
MP4
126 - Block Cipher.mp4 (25.4 MB)
MP4
127 - Advantages of Symmetric Key Cryptography.mp4 (12.83 MB)
MP4
128 - Why Asymmetric key cryptography is important.mp4 (7.62 MB)
MP4
129 - Advantages of Asymmetric Key Cryptography.mp4 (20.05 MB)
MP4
130 - Digital Signature.mp4 (55.46 MB)
MP4
131 - Signing and Verification Process.mp4 (47.55 MB)
MP4
132 - How to check the Integrity of a Message.mp4 (118.21 MB)
MP4
133 - Security Measures.mp4 (66.01 MB)
MP4
134 - What is Firewall.mp4 (223.82 MB)
MP4
135 - Types of Firewall Packet Filter.mp4 (37.35 MB)
MP4
136 - Types of Firewall Stateful Inspection Firewall.mp4 (29.28 MB)
MP4
137 - Types of Firewall Proxyserver firewall.mp4 (95.03 MB)
MP4
138 - Cyber Law.mp4 (59.52 MB)
MP4
139 - Why there is a need for Cyber Law.mp4 (59.35 MB)
MP4
140 - What is Cyber Crime.mp4 (31 MB)
MP4
141 - Classification of Cyber Crime.mp4 (26.04 MB)
MP4
142 - Cyber Crimes Against Person Cyber Stalking.mp4 (12.88 MB)
MP4
143 - Cyber Crimes Against Person Dissemination of obscene Material.mp4 (9.52 MB)
MP4
144 - Cyber Crimes Against Person Defamation.mp4 (6.8 MB)
MP4
145 - Cyber Crimes Against Person Hacking.mp4 (27.88 MB)
MP4
146 - Cyber Crimes Against Person Cracking.mp4 (15.14 MB)
MP4
147 - Cyber Crimes Against Person Email and SMS Spoofing.mp4 (21.18 MB)
MP4
148 - Youve Achieved 75 Lets Celebrate Your Progress And Keep Going To 100.mp4 (2.64 MB)
MP4
149 - Cyber Crimes Against Person Carding.mp4 (27.84 MB)
MP4
150 - Cyber Crimes Against Person Cheating and Fraud.mp4 (23.51 MB)
MP4
151 - Cyber Crimes Against Person Assault by Threat.mp4 (7.47 MB)
MP4
152 - Cyber Crime Against Persons Property.mp4 (220.39 MB)
MP4
153 - Cyber Crime against Government.mp4 (46.84 MB)
MP4
154 - Cyber Crime against Society at Large.mp4 (92.68 MB)
MP4
155 - Definition of Digital Forensics.mp4 (142.99 MB)
MP4
156 - Process of Digital Forensics.mp4 (160.76 MB)
MP4
157 - Types of Digital Forensics.mp4 (17.06 MB)
MP4
10 - Three Types of Security Goals.mp4 (27.23 MB)
MP4
11 - Importance of Cybersecurity.mp4 (56.96 MB)
MP4
12 - Threat Vulnerability and Risk.mp4 (11.86 MB)
MP4
13 - Networking Devices Router.mp4 (13.24 MB)
MP4
14 - Networking Devices Switch.mp4 (9.59 MB)
MP4
15 - What is an IP Address.mp4 (46 MB)
MP4
16 - What is a MAC Address.mp4 (14.85 MB)
MP4
17 - What is a PORT Address.mp4 (12.48 MB)
MP4
18 - What is a DNS.mp4 (26.73 MB)
MP4
19 - What is a VPN.mp4 (12.55 MB)
MP4
20 - What is a Virus.mp4 (31.61 MB)
MP4
21 - Learn Hacking and the different Types of Hackers.mp4 (75.32 MB)
MP4
22 - Job Profiles in the field of Cybersecurity.mp4 (25.51 MB)
MP4
23 - Important Cybersecurity Skills.mp4 (163.37 MB)
MP4
5 - Cyber Security Course Overview.mp4 (12.84 MB)
MP4
6 - Introduction of Facilitator.mp4 (57.29 MB)
MP4
7 - Is our Data really safe on internet.mp4 (5.06 MB)
MP4
8 - What is Cybersecurity.mp4 (7.12 MB)
MP4
9 - Evolution of Cyber Threats.mp4 (21.85 MB)
MP4
158 - Definition of Cybersecurity.mp4 (10.65 MB)
MP4
159 - Importance of securing data networks and digitalIT assets.mp4 (10.84 MB)
MP4
160 - Overview of the next few sections.mp4 (11 MB)
MP4
161 - The importance of strong passwords.mp4 (14.72 MB)
MP4
162 - Best practices for password creation and management.mp4 (10.16 MB)
MP4
163 - The risks of weak passwords.mp4 (9.51 MB)
MP4
164 - The use of password managers.mp4 (8.03 MB)
MP4
165 - Definition of common attacks malware phishing ransomware etc.mp4 (8.99 MB)
MP4
166 - Understanding how attacks work and their impact.mp4 (10.15 MB)
MP4
167 - Reallife examples of attacks.mp4 (13.28 MB)
MP4
168 - Understanding and identifying potential threats.mp4 (8.73 MB)
MP4
169 - Best practices for avoiding attacks.mp4 (7.79 MB)
MP4
170 - The role of software and hardware solutions in defense.mp4 (10.68 MB)
MP4
171 - The importance of user education and awareness.mp4 (9.79 MB)
MP4
172 - Overview of common cybersecurity departments CISO SOC etc.mp4 (18.95 MB)
MP4
173 - Understanding the responsibilities of each department.mp4 (12.81 MB)
MP4
174 - Importance of collaboration between departments.mp4 (8.51 MB)
MP4
175 - Types of security measures encryption firewalls etc.mp4 (5.75 MB)
MP4
176 - The importance of implementing multiple layers of security.mp4 (9.88 MB)
MP4
177 - The role of security audits and assessments.mp4 (19.63 MB)
MP4
178 - The importance of keeping security measures uptodate.mp4 (9.47 MB)
MP4
179 - Understanding quantum computing and its potential impact on cybersecurity.mp4 (17.34 MB)
MP4
180 - The potential benefits and risks of quantum computing.mp4 (5.07 MB)
MP4
181 - The need for new approaches to cybersecurity in a quantum world.mp4 (10.78 MB)
MP4
182 - The importance of continuous training and education.mp4 (14.84 MB)
MP4
183 - Understanding the importance of good judgement and discernment.mp4 (8.8 MB)
MP4
184 - The importance of promoting a culture of cybersecurity within the organization.mp4 (9.65 MB)
MP4
185 - Summary of key takeaways from the course.mp4 (11.22 MB)
MP4
186 - The importance of staying informed and updated on the latest developments in cyb.mp4 (15.15 MB)
MP4
187 - The importance of continued effort to secure digital assets and information.mp4 (16.51 MB)
MP4
188 - Overview of the section.mp4 (12.07 MB)
MP4
189 - The importance of learning from past breaches and attacks.mp4 (7.96 MB)
MP4
24 - Introduction to cybersecutirty and ChatGPT.mp4 (10.19 MB)
MP4
25 - Cyber Threat Landscape.mp4 (10.97 MB)
MP4
26 - Basic of natural language processing.mp4 (9.73 MB)
MP4
27 - ChatGPT Architecture.mp4 (10.33 MB)
MP4
28 - Data collection and processing.mp4 (8.22 MB)
MP4
190 - The Target Data Breach.mp4 (14.06 MB)
MP4
191 - The Capital One Data Breach.mp4 (10 MB)
MP4
192 - The Anthem Data Breach.mp4 (9.76 MB)
MP4
193 - The Community Health Systems Data Breach.mp4 (23.54 MB)
MP4
194 - The Equifax Data Breach.mp4 (11.2 MB)
MP4
195 - The Yahoo Data Breaches.mp4 (18.4 MB)
MP4
196 - The JPMorgan Chase Data Breach.mp4 (9.5 MB)
MP4
197 - The Bank of America Data Breach.mp4 (6.84 MB)
MP4
198 - The OPM Data Breach.mp4 (10.67 MB)
MP4
199 - The SolarWinds Supply Chain Attack.mp4 (7.26 MB)
MP4
200 - Summary of the lessons learned from the case studies.mp4 (18.71 MB)
MP4
201 - The importance of taking proactive measures to prevent similar breaches.mp4 (12.33 MB)
MP4
202 - Youve Achieved 100 Lets Celebrate Remember To Share Your Certificate.mp4 (5.49 MB)
MP4
203 - A Digital Masterclass In 12 Lessons PLUS Download Your Workbook.mp4 (258.37 MB)
MP4
204 - Download Your 35 Page Digital Transformation Workbook Follow Along.mp4 (138.49 MB)
MP4
205 - Wipeboard Lesson How Hackathons Drive Agile Teams Business Value Solve COVID.mp4 (438.09 MB)
MP4
207 - Digital Winners Have Turned Business Upside Down.mp4 (33.63 MB)
MP4
208 - Grasp The Nettle The Second Half Of Exponential Is Here.mp4 (36.85 MB)
MP4
209 - Digital Money And The Future Of Finance.mp4 (126.84 MB)
MP4
210 - Digital Disruption In Banking.mp4 (34.67 MB)
MP4
212 - How The Crazy Ones Do It.mp4 (34.89 MB)
MP4
213 - Cloud As A Disruption Enabler For All.mp4 (123.15 MB)
MP4
215 - Digitally Rewiring The Modern Firm.mp4 (26.92 MB)
MP4
216 - Disrupt Yourself Or Die A Digital Death.mp4 (80.6 MB)
MP4
217 - Learn How Agile Changed Everything.mp4 (29.99 MB)
MP4
218 - Get Obsessed Now With Customer Experience.mp4 (32.3 MB)
MP4
219 - Top Talent For The Future Fit Organisation.mp4 (20.4 MB)
MP4
220 - Super Apps Drive Banking Beyond Money.mp4 (30.34 MB)
MP4
221 - Learn Digital Transformation Intro.mp4 (65.29 MB)
MP4
222 - Learnings Digital Transformation.mp4 (76.9 MB)
MP4
223 - The Idea of Strategic Ambidexterity.mp4 (68.04 MB)
MP4
224 - Learnings Digital Transformation Self Disruption.mp4 (30.99 MB)
MP4
225 - Learning Digital Transformation Agile and Customer Experience.mp4 (39.4 MB)
MP4
226 - Learning Digital Transformation Talent and Beyond the core.mp4 (39.29 MB)
MP4
227 - Learn Digital Disruption intro.mp4 (37.84 MB)
MP4
228 - Learning Digital Disruption Digital Winners and Losers.mp4 (297.77 MB)
MP4
229 - Opinion on Digital Disruption on Africa.mp4 (56.86 MB)
MP4
230 - Learn Digital Disruption Experimental Growth.mp4 (56.03 MB)
MP4
231 - Learn Digital Disruption banking discontinuity of innovation and cloud.mp4 (29.44 MB)
MP4
29 - Threat Detection with ChatGPT.mp4 (17.38 MB)
MP4
30 - Malware detection and prevention.mp4 (7.24 MB)
MP4
31 - Phishing Detection and Prevention.mp4 (15.99 MB)
MP4
32 - Insider Threat Detection.mp4 (19.2 MB)
MP4
33 - Fraud Detection.mp4 (7.25 MB)
MP4
232 - Digital Disruption Webinar.mp4 (412.22 MB)
MP4
233 - Digital Transformation Webinar.mp4 (1.51 GB)
MP4
34 - Threat Inteligence.mp4 (8.87 MB)
MP4
35 - Risk assessment and management.mp4 (14.63 MB)
MP4
36 - Security Monitoring and Incident Response.mp4 (9.5 MB)
MP4
37 - Access Control and Authentication.mp4 (6.35 MB)
MP4
38 - Vulnerability Scanning and Management.mp4 (7.46 MB)
MP4
39 - Encryption and Decryption.mp4 (9.63 MB)
MP4
40 - Data privacy and protection.mp4 (14.42 MB)
MP4
41 - Identity and access management.mp4 (8.94 MB)
MP4
42 - Security testing and Evaluation.mp4 (9.24 MB)
MP4
43 - Network security.mp4 (8.58 MB)
MP4
44 - Cloud security.mp4 (8.21 MB)
MP4
45 - Web application security.mp4 (16.36 MB)
MP4
46 - Social Engeneering attacks.mp4 (8.03 MB)
MP4
47 - Incident Response Planning.mp4 (19.51 MB)
MP4
48 - Security governance and compliance.mp4 (10.48 MB)
MP4
49 - Security awareness training.mp4 (10.44 MB)
MP4
50 - Machine learning for cybersecurity.mp4 (8.31 MB)
MP4
51 - Mobile device security.mp4 (12.1 MB)
MP4
52 - Cybersecurity operations.mp4 (8.51 MB)
MP4
53 - Future of ChatGPT and cybersecurity.mp4 (13.03 MB)
MP4
54 - Fundamentals of NetworkingOverview.mp4 (17.82 MB)
MP4
55 - Computer Networks.mp4 (72.01 MB)
MP4
56 - The OSI Model.mp4 (26.3 MB)
MP4
57 - OSI Model Application Layer.mp4 (35.53 MB)
MP4
58 - OSI Model Presentation Layer.mp4 (27.14 MB)
MP4
59 - OSI Model Session Layer.mp4 (30.85 MB)
MP4
60 - OSI Model Transport Layer.mp4 (38.29 MB)
MP4
61 - OSI Model Network Layer.mp4 (48.71 MB)
MP4
62 - OSI Model Data Link Layer.mp4 (21.23 MB)
MP4
63 - OSI Model Physical Layer.mp4 (9.72 MB)
MP4
64 - OSI Layers Example.mp4 (8.3 MB)
MP4
65 - OSI Layers Protocols.mp4 (14.1 MB)
MP4
66 - HTTP Protocol.mp4 (198.06 MB)
MP4
67 - Youve Achieved 25 Lets Celebrate Your Progress And Keep Going To 50.mp4 (2 MB)
MP4
68 - TCP Protocol.mp4 (27.24 MB)
MP4
69 - UDP Protocol.mp4 (33.94 MB)
MP4
70 - Difference between UDP and TCP Protocol.mp4 (46.49 MB)
MP4
71 - DHCP Protocol.mp4 (74.45 MB)
MP4
72 - ARP Protocol.mp4 (24.07 MB)
MP4
73 - What is an IP address and its types.mp4 (59.77 MB)
MP4
74 - What is a Port Address and its types.mp4 (80.74 MB)
MP4
75 - Network Troubleshooting.mp4 (191.3 MB)
MP4