资源详情

返回首页 | 相关搜索
Lynda - Cybersecurity for Small and Medium Businesses Essential Training
大小 341.7 MB
文件数 66
Info Hash: D9672A811CF4F65301BBA8EF9D1BCAA80813AB40
收录时间 2025-12-21 12:03:21
更新时间 2025-12-30 15:06:48
文件列表 (66)
1.Introduction/01.Welcome.en.srt
2.02 KB
1.Introduction/01.Welcome.mp4
20.89 MB
1.Introduction/02.What you should know.en.srt
1.47 KB
1.Introduction/02.What you should know.mp4
4.8 MB
2.1. The Basics/03.Why you should care.en.srt
6.58 KB
2.1. The Basics/03.Why you should care.mp4
30.17 MB
2.1. The Basics/04.Physical security vs. cybersecurity.en.srt
1.87 KB
2.1. The Basics/04.Physical security vs. cybersecurity.mp4
4.57 MB
2.1. The Basics/05.Anyone can improve the cybersecurity of a business.en.srt
3.36 KB
2.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4
8.68 MB
2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.en.srt
4.42 KB
2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.mp4
6.62 MB
2.1. The Basics/07.What are the cybersecurity threats.en.srt
6.27 KB
2.1. The Basics/07.What are the cybersecurity threats.mp4
13.9 MB
2.1. The Basics/08.A five-step process to improve cybersecurity.en.srt
3.84 KB
2.1. The Basics/08.A five-step process to improve cybersecurity.mp4
6.84 MB
3.2. Identify/09.Step #1 - Identify key assets.en.srt
3.06 KB
3.2. Identify/09.Step #1 - Identify key assets.mp4
9.05 MB
3.2. Identify/10.Inventory sheet - Data and devices.en.srt
1.82 KB
3.2. Identify/10.Inventory sheet - Data and devices.mp4
2.91 MB
3.2. Identify/11.Account access best practices.en.srt
5.81 KB
3.2. Identify/11.Account access best practices.mp4
12.29 MB
3.2. Identify/12.What about the cloud.en.srt
9.1 KB
3.2. Identify/12.What about the cloud.mp4
10.76 MB
4.3. Protect/13.Step #2 - Protect data and accounts.en.srt
1.68 KB
4.3. Protect/13.Step #2 - Protect data and accounts.mp4
6.35 MB
4.3. Protect/14.Humans - Education and awareness is essential.en.srt
5.44 KB
4.3. Protect/14.Humans - Education and awareness is essential.mp4
7.01 MB
4.3. Protect/15.Sharing online - How to prevent a phish.en.srt
7.46 KB
4.3. Protect/15.Sharing online - How to prevent a phish.mp4
14.34 MB
4.3. Protect/16.Technology solutions to protect a business.en.srt
9.44 KB
4.3. Protect/16.Technology solutions to protect a business.mp4
19.22 MB
4.3. Protect/17.Passphrases and authentication.en.srt
7.38 KB
4.3. Protect/17.Passphrases and authentication.mp4
12.68 MB
4.3. Protect/18.Culture of security - Policies, procedures, and attitude.en.srt
7.51 KB
4.3. Protect/18.Culture of security - Policies, procedures, and attitude.mp4
13.64 MB
5.4. Detect/19.Step #3 - Detect a breach.en.srt
3.1 KB
5.4. Detect/19.Step #3 - Detect a breach.mp4
8.84 MB
5.4. Detect/20.Detecting a compromise - The human element.en.srt
2.57 KB
5.4. Detect/20.Detecting a compromise - The human element.mp4
4.87 MB
5.4. Detect/21.Cybersecurity assessments and detection technology solutions.en.srt
7.64 KB
5.4. Detect/21.Cybersecurity assessments and detection technology solutions.mp4
12.25 MB
6.5. Respond/22.Step #4 - Respond to a cyber breach.en.srt
2.36 KB
6.5. Respond/22.Step #4 - Respond to a cyber breach.mp4
8.92 MB
6.5. Respond/23.Cybersecurity response plans for business.en.srt
3.69 KB
6.5. Respond/23.Cybersecurity response plans for business.mp4
6.16 MB
6.5. Respond/24.Key elements of a cyber incident response.en.srt
8.51 KB
6.5. Respond/24.Key elements of a cyber incident response.mp4
12.93 MB
6.5. Respond/25.Federal government response support and guidance.en.srt
4.94 KB
6.5. Respond/25.Federal government response support and guidance.mp4
7.82 MB
6.5. Respond/26.State breach response laws.en.srt
4.99 KB
6.5. Respond/26.State breach response laws.mp4
9.12 MB
7.6. Recover/27.Step #5 - How to recover from a cyber incident.en.srt
1.82 KB
7.6. Recover/27.Step #5 - How to recover from a cyber incident.mp4
5.54 MB
7.6. Recover/28.Cybersecurity insurance.en.srt
6.95 KB
7.6. Recover/28.Cybersecurity insurance.mp4
15.03 MB
7.6. Recover/29.Reputation management.en.srt
3.41 KB
7.6. Recover/29.Reputation management.mp4
6.83 MB
8.7. Resources/30.Technology checklists for small and medium businesses.en.srt
3.5 KB
8.7. Resources/30.Technology checklists for small and medium businesses.mp4
7.8 MB
8.7. Resources/31.More cybersecurity resources.en.srt
5.13 KB
8.7. Resources/31.More cybersecurity resources.mp4
10.98 MB
8.7. Resources/32.Scam and threat alerts.en.srt
5.75 KB
8.7. Resources/32.Scam and threat alerts.mp4
11.2 MB
9.Conclusion/33.Next steps.en.srt
2.12 KB
9.Conclusion/33.Next steps.mp4
8.54 MB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。