Modern Enterprises Security
Back to Dashboard
Hey there, great course, right? Do you like this course?
All of the most interesting lessons further. In order to continue you just need to purchase it
Enroll course
Course sections
Section 1
Protecting People | Information and Systems – a Growing Problem
1
MES - Why cybercrime is here to stay – a profitable business model
2
MES - The macro-economic cost of cybercrime
3
MES - The macro-economic cost of cybercrime
4
MES - The role of governments and regulation
5
MES - The foundational elements of security
6
MES - The cybersecurity talent shortage
Section 2
The Human Side of Cybersecurity
1
MES - People exploiting people
2
MES - The three types of insider threats
3
MES - The three types of insider threats
Section 3
Anatomy of an Attack
1
MES - Understanding the risk from targeted attacks
2
MES - Stages of an attack
3
MES - Extortion
4
MES - Extortion
5
MES - Stealing information
6
MES - System disruption or destruction
7
MES - Attackers for hire
8
MES - Attackers for hire
Section 4
Protecting People | Information and Systems with Timeless Best Practices
1
MES - The most important threat vector
2
MES - The most important threat vector
3
MES - Time-honored best practices that could stop most breaches
4
MES - Capabilities necessary in the remote world
5
MES - The role of human behavior
6
MES - The everything, everywhere world
Section 5
Protecting against Common Attacks by Partnering with End Users
1
MES - A framework for effective training
2
MES - Making your people your partners
3
MES - Making your people your partners
4
MES - Tabletop exercises
5
MES - Training people to protect against common hacking techniques
Section 6
Information Security for a Changing World
1
MES - Frames of reference
2
MES - Challenges with the traditional information security model
3
MES - Protecting information
4
MES - Securing networks and workloads – past, present, and future
5
MES - Securing identities and granting access
6
MES - Securing endpoints
Section 7
Information Security for a Changing World
1
MES - Frames of reference
2
MES - Challenges with the traditional information security model
3
MES - Protecting information
4
MES - Securing networks and workloads – past, present, and future
5
MES - Securing identities and granting access
6
MES - Securing endpoints
Section 8
Difficulty Securing the Modern Enterprise (with Solutions!)
1
MES - Cybersecurity talent shortage
2
MES - Cybersecurity talent shortage
3
MES - Too much technology with too little process
4
MES - Too much technology with too little process
5
MES - What are we trying to accomplish?
6
MES - What are we trying to accomplish?
7
MES - Lack of continuing education
Section 9
Harnessing Automation Opportunities
1
MES - Defining automation opportunities
2
MES - Defining automation opportunities
3
MES - Gathering data and applying context
4
MES - Gathering data and applying context
5
MES - Testing the system
6
MES - How attackers can leverage automation
Section 10
Cybersecurity at Home
1
MES - Protecting children and teaching them about online safety
2
MES - Password managers
3
MES - Multifactor authentication
4
MES - Password complexity and why it matters
5
MES - Password complexity and why it matters
6
MES - Stop publishing your information!
Questions
My Question
{{ comment.replies_count }}
Send
Load More
Back to Q&A List
Add Comment
{{ message }}
Send
C Program to list all files and sub-directories in a directory
Lesson is locked. Please Buy course to proceed.
Questions
My Question