-
Information security vs cybersecurity: What is the difference?
What sets information security apart from cybersecurity?
This video demystifies the often confused concepts of information security and cybersecurity. Although often used interchangeably, even by professionals in the field, they are distinct fields with unique focuses and implications.
Watch this video to learn the differences and get 3 actionable tips to become more cyber-resilient.
🔗 Deepen your knowledge in cybersecurity:
What is cyber security? Explore our comprehensive guide - https://www.dataguard.co.uk/blog/what-is-cybersecurity/
Read our in-depth article on ISO 27001 controls - Annex A - https://www.dataguard.co.uk/knowledge/iso-27001-controls-annex-a/
Find out more about the ISO 27001 certification process - https://www.dataguard.co.uk/knowledge/iso-27001-certification/
📞 ...
published: 31 Oct 2022
-
What is Information Security (InfoSec) | Buzzword
Information security, or InfoSec, is a common buzzword that focuses on protecting a company's data to ensure its confidentiality, integrity, and availability. These 3 pillars help to ensure the trustworthiness of company data, systems are ready for use at all times, and data is only accessible to authorized users. #infosec
Sometimes there is confusion between this topic and cybersecurity and there is definitely some overlaps between the two.
Learn about these differences in this blog post: https://bit.ly/404elOK
Moments from this video:
00:00 What is InfoSec
00:10 Confidentiality, integrity, and availability
00:33 Integrity for Data in Infosec
00:43 Availability of Data pillar in information security
00:58 Responding to the theft of a company laptop
Information security can involve t...
published: 10 Dec 2019
-
What is Information Security ? | Information Security Explained in 5 mins | Great Learning
Looking for a career upgrade & a better salary? We can help, Choose from our no 1 ranked top programmes. 25k+ career transitions with 400 + top corporate companies. Exclusive for working professionals: https://glacad.me/3zwNVbI
🔥 Get your free certificate of completion for the Introduction to Cyber Security Course, Register Now: https://glacad.me/3vgaEoX 🔥
Today’s video discusses information security, explained in 5 minutes! Information security, oftentimes abbreviated as infosec, is a set of practices to secure and protect data unauthorized access by cutting down on information risks. Infosec involves preventing or reducing the probability of unlawful use, disclosure, corruption, modification, deletion or recording of information. Information Security is built around the 3-objective tr...
published: 12 Jun 2021
-
Information Security in 80 seconds
As our world becomes further connected and data driven, the burden to protect confidential information increases. Not only individual consumers, but large organizations need to be aware of the risk that unsecured information poses.
published: 25 Jul 2016
-
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
IBM Security QRadar EDR : https://ibm.biz/Bdyd7k
IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/Bdyd76
This ten part video series is based on a 400 level class on Enterprise Cybersecurity Architecture taught by Jeff "the Security Guy" Crume at a local university. He'll begin by explaining the foundational principles of cybersecurity - five that are best practices and one that's just the opposite. The subsequent episodes will look at the various domains that apply to a well-designed security architecture. Be sure to subscribe so you'll get notified of the next video!
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity...
published: 31 May 2023
-
Introduction to Information Security
The CES Security Operations Center presents a helpful, animated intro to information security. This video explains and illustrates the concepts of Phishing and Spear Phishing. It also provides some useful tips for strengthening and managing Passwords.
published: 29 Sep 2021
-
Information Security Tutorial
This is a crash course on information security for beginners. It will provide you the basics knowledge and terminology about information security.
⭐ Table of Contents ⭐
⌨️ (0:00) Introduction to Security
⌨️ (17:05) Threats, vulnerabilities and control
⭐ Credit ⭐
Course Author: Mike Murphy
License: Creative Commons Attribution license (reuse allowed)
YT: https://www.youtube.com/channel/UCndXB_kOP-C_KgZ2d_LNzbw
⭐️ Join Us ⭐️
Join our FB Group: https://www.facebook.com/groups/cslesson
Like our FB Page: https://www.facebook.com/cslesson/
Website: https://cslesson.org
published: 28 Oct 2020
-
How I Would Learn Cyber Security if I Could Start Over in 2024 (Beginner Roadmap)
In this video I walk you through a entry level cybersecurity roadmap that I would take if I had to restart my cybersecurity career from scratch!
Resources:
Google Cybersecurity Professional Certificate 👉 https://imp.i384100.net/xky4Q1
CompTIA Security+ 👉 https://www.comptia.org/certifications/security
CompTIA Network+ 👉 https://www.comptia.org/certifications/network
AWS Cloud Practitioner 👉 https://aws.amazon.com/certification/certified-cloud-practitioner/
Security Blue Team Level 1 👉 https://www.securityblue.team/why-btl1/
PJPT by TCM Security 👉 https://certifications.tcm-sec.com/pjpt/
Video Resources:
https://youtu.be/dHxEd5o_22I?si=gTsiO_EZgo2ceZ5e
https://youtu.be/Fw4KYlVfnJM?si=Sj2e2G6nZuxzFxcu
https://youtu.be/jk1p6hKxCPY?si=To7NqmwW3ng84VXn
https://youtu.be/Yug9vP9ix3g?si=b7ZeRtE5...
published: 22 Jul 2024
-
TCS+ | From gen AI to deepfakes – the latest infosec threats
Twice yearly, ESET publishes its Threat Report in which it unpacks the latest trends and developments in the world of information security.
Adrian Stanford, group chief technology officer at ESET Southern Africa, is our guest in the latest episode of TechCentral’s TCS+, and he provides a succinct overview of the key trends identified in the latest ESET Threat Report, for the first half of 2024.
Stanford provides a brief overview of the findings before delving into:
• The threat posed by generative AI, including how bad actors are using the technology to break into systems and target victims;
• The rise of deepfakes and the threat they pose, particularly in mobile;
• The threat posed to Linux-based systems – and why there’s a misconception that malware doesn’t target Linux (or macOS); and
•...
published: 01 Oct 2024
-
CIA Triad
Network Security: CIA Triad
Topics discussed:
1) Definition of computer security by National Institute of Standards and Technology (NIST), US.
2) Three key objectives of the CIA triad – Confidentiality, Integrity, and Availability.
3) Two additional objectives to security – Authenticity, and Accountability.
4) Various levels of impact of security breaches – Low, Medium, and High.
5) Real-time examples and explanations for Confidentiality, Integrity, and Availability.
Follow Neso Academy on Instagram: @nesoacademy (https://bit.ly/2XP63OE)
Contribute: http://www.nesoacademy.org/donate
Memberships: https://bit.ly/2U7YSPI
Books: http://www.nesoacademy.org/recommended-books
Website ► http://www.nesoacademy.org/
Forum ► https://forum.nesoacademy.org/
Facebook ► https://goo.gl/Nt0PmB
Twitter...
published: 29 Mar 2021
2:49
Information security vs cybersecurity: What is the difference?
What sets information security apart from cybersecurity?
This video demystifies the often confused concepts of information security and cybersecurity. Although ...
What sets information security apart from cybersecurity?
This video demystifies the often confused concepts of information security and cybersecurity. Although often used interchangeably, even by professionals in the field, they are distinct fields with unique focuses and implications.
Watch this video to learn the differences and get 3 actionable tips to become more cyber-resilient.
🔗 Deepen your knowledge in cybersecurity:
What is cyber security? Explore our comprehensive guide - https://www.dataguard.co.uk/blog/what-is-cybersecurity/
Read our in-depth article on ISO 27001 controls - Annex A - https://www.dataguard.co.uk/knowledge/iso-27001-controls-annex-a/
Find out more about the ISO 27001 certification process - https://www.dataguard.co.uk/knowledge/iso-27001-certification/
📞 Contact us:
Schedule a demo and consultation today! https://www.dataguard.co.uk/book-meeting/
Stay up to date: Sign up for our newsletter - https://www.dataguard.de/newsletter-sign-up
👍 Engage & Share: Like, comment and share this video to help spread the word about hassle-free ISO 27001 certification.
Stay updated & follow us:
Twitter: https://twitter.com/DataGuard_dg
LinkedIn: https://de.linkedin.com/company/dataguard1
https://wn.com/Information_Security_Vs_Cybersecurity_What_Is_The_Difference
What sets information security apart from cybersecurity?
This video demystifies the often confused concepts of information security and cybersecurity. Although often used interchangeably, even by professionals in the field, they are distinct fields with unique focuses and implications.
Watch this video to learn the differences and get 3 actionable tips to become more cyber-resilient.
🔗 Deepen your knowledge in cybersecurity:
What is cyber security? Explore our comprehensive guide - https://www.dataguard.co.uk/blog/what-is-cybersecurity/
Read our in-depth article on ISO 27001 controls - Annex A - https://www.dataguard.co.uk/knowledge/iso-27001-controls-annex-a/
Find out more about the ISO 27001 certification process - https://www.dataguard.co.uk/knowledge/iso-27001-certification/
📞 Contact us:
Schedule a demo and consultation today! https://www.dataguard.co.uk/book-meeting/
Stay up to date: Sign up for our newsletter - https://www.dataguard.de/newsletter-sign-up
👍 Engage & Share: Like, comment and share this video to help spread the word about hassle-free ISO 27001 certification.
Stay updated & follow us:
Twitter: https://twitter.com/DataGuard_dg
LinkedIn: https://de.linkedin.com/company/dataguard1
- published: 31 Oct 2022
- views: 35749
1:32
What is Information Security (InfoSec) | Buzzword
Information security, or InfoSec, is a common buzzword that focuses on protecting a company's data to ensure its confidentiality, integrity, and availability. T...
Information security, or InfoSec, is a common buzzword that focuses on protecting a company's data to ensure its confidentiality, integrity, and availability. These 3 pillars help to ensure the trustworthiness of company data, systems are ready for use at all times, and data is only accessible to authorized users. #infosec
Sometimes there is confusion between this topic and cybersecurity and there is definitely some overlaps between the two.
Learn about these differences in this blog post: https://bit.ly/404elOK
Moments from this video:
00:00 What is InfoSec
00:10 Confidentiality, integrity, and availability
00:33 Integrity for Data in Infosec
00:43 Availability of Data pillar in information security
00:58 Responding to the theft of a company laptop
Information security can involve the physical protection of documents as well. The importance of strong information security is made clear by the potential financial and reputational harm that could be caused by a data breach where sensitive information is lost or stolen. Information security is becoming more and more important as time goes by, and cybersecurity threats become more prevalent.
Explore how Impact helps companies keep their information more secure: https://bit.ly/3UG087v
Discover a great career with Impact here: https://bit.ly/3HHzuro
Subscribe to our newsletter: https://bit.ly/3JR8PtJ
Follow Impact on social media!
LinkedIn: https://www.linkedin.com/company/impact-networking
Facebook: https://www.facebook.com/impactmybiz
Twitter: https://twitter.com/impactmybiz
Instagram: https://www.instagram.com/impactmybiz/?hl=en
#infosecurity
https://wn.com/What_Is_Information_Security_(Infosec)_|_Buzzword
Information security, or InfoSec, is a common buzzword that focuses on protecting a company's data to ensure its confidentiality, integrity, and availability. These 3 pillars help to ensure the trustworthiness of company data, systems are ready for use at all times, and data is only accessible to authorized users. #infosec
Sometimes there is confusion between this topic and cybersecurity and there is definitely some overlaps between the two.
Learn about these differences in this blog post: https://bit.ly/404elOK
Moments from this video:
00:00 What is InfoSec
00:10 Confidentiality, integrity, and availability
00:33 Integrity for Data in Infosec
00:43 Availability of Data pillar in information security
00:58 Responding to the theft of a company laptop
Information security can involve the physical protection of documents as well. The importance of strong information security is made clear by the potential financial and reputational harm that could be caused by a data breach where sensitive information is lost or stolen. Information security is becoming more and more important as time goes by, and cybersecurity threats become more prevalent.
Explore how Impact helps companies keep their information more secure: https://bit.ly/3UG087v
Discover a great career with Impact here: https://bit.ly/3HHzuro
Subscribe to our newsletter: https://bit.ly/3JR8PtJ
Follow Impact on social media!
LinkedIn: https://www.linkedin.com/company/impact-networking
Facebook: https://www.facebook.com/impactmybiz
Twitter: https://twitter.com/impactmybiz
Instagram: https://www.instagram.com/impactmybiz/?hl=en
#infosecurity
- published: 10 Dec 2019
- views: 69026
6:54
What is Information Security ? | Information Security Explained in 5 mins | Great Learning
Looking for a career upgrade & a better salary? We can help, Choose from our no 1 ranked top programmes. 25k+ career transitions with 400 + top corporate compan...
Looking for a career upgrade & a better salary? We can help, Choose from our no 1 ranked top programmes. 25k+ career transitions with 400 + top corporate companies. Exclusive for working professionals: https://glacad.me/3zwNVbI
🔥 Get your free certificate of completion for the Introduction to Cyber Security Course, Register Now: https://glacad.me/3vgaEoX 🔥
Today’s video discusses information security, explained in 5 minutes! Information security, oftentimes abbreviated as infosec, is a set of practices to secure and protect data unauthorized access by cutting down on information risks. Infosec involves preventing or reducing the probability of unlawful use, disclosure, corruption, modification, deletion or recording of information. Information Security is built around the 3-objective triad, commonly known as CIA - Confidentiality, Integrity, Availability.
Great Learning brings you this video on “What is Information Security? Explained in 5 minutes!” In these 5 minutes, we aim to give a concise and brief understanding of information security and how it works. This video starts with an introduction to infosec, followed by understanding its need. Then we look at the CIA triad - Confidentiality, Integrity, Availability. Finally, we look at information security policies!
Prepare for in-demand cyber security jobs at leading companies with our Post Graduate Programme in
Cyber Security https://www.mygreatlearning.com/pg-program-cyber-security-course?utm_source=CPV_YT&utm_medium=Desc&utm_campaign=Infosec_2022
Gain expert mentorship, access cutting-edge tools, and engage in hands-on projects to advance your career. Enroll now. https://www.mygreatlearning.com/online-cyber-security-course?utm_source=CPV_YT&utm_medium=Desc&utm_campaign=Infosec_2022
Topics Covered
0:00 Introduction
0:24 What is Information Security?
1:38 Why is Information Security important?
3:08 The CIA Triad
4:43 Information Security Policies
Visit Great Learning Academy, to get access to 300+ free courses with 1000+ hours of content on Data Science, Data Analytics, Artificial Intelligence, Big Data, Cloud, Management, Cybersecurity, Software Development and many more. These are supplemented with free projects, assignments, datasets, quizzes. You can earn a certificate of completion at the end of the course for free. https://glacad.me/2Tq7ZvO
Get the free Great Learning App for a seamless experience, enrol for free courses and watch them offline by downloading them. https://glacad.me/3cSKlNl
About Great Learning:
- Great Learning is an online and hybrid learning company that offers high-quality, impactful, and industry-relevant programs to working professionals like you. These programs help you master data-driven decision-making regardless of the sector or function you work in and accelerate your career in high growth areas like Data Science, Big Data Analytics, Machine Learning, Artificial Intelligence & more.
https://wn.com/What_Is_Information_Security_|_Information_Security_Explained_In_5_Mins_|_Great_Learning
Looking for a career upgrade & a better salary? We can help, Choose from our no 1 ranked top programmes. 25k+ career transitions with 400 + top corporate companies. Exclusive for working professionals: https://glacad.me/3zwNVbI
🔥 Get your free certificate of completion for the Introduction to Cyber Security Course, Register Now: https://glacad.me/3vgaEoX 🔥
Today’s video discusses information security, explained in 5 minutes! Information security, oftentimes abbreviated as infosec, is a set of practices to secure and protect data unauthorized access by cutting down on information risks. Infosec involves preventing or reducing the probability of unlawful use, disclosure, corruption, modification, deletion or recording of information. Information Security is built around the 3-objective triad, commonly known as CIA - Confidentiality, Integrity, Availability.
Great Learning brings you this video on “What is Information Security? Explained in 5 minutes!” In these 5 minutes, we aim to give a concise and brief understanding of information security and how it works. This video starts with an introduction to infosec, followed by understanding its need. Then we look at the CIA triad - Confidentiality, Integrity, Availability. Finally, we look at information security policies!
Prepare for in-demand cyber security jobs at leading companies with our Post Graduate Programme in
Cyber Security https://www.mygreatlearning.com/pg-program-cyber-security-course?utm_source=CPV_YT&utm_medium=Desc&utm_campaign=Infosec_2022
Gain expert mentorship, access cutting-edge tools, and engage in hands-on projects to advance your career. Enroll now. https://www.mygreatlearning.com/online-cyber-security-course?utm_source=CPV_YT&utm_medium=Desc&utm_campaign=Infosec_2022
Topics Covered
0:00 Introduction
0:24 What is Information Security?
1:38 Why is Information Security important?
3:08 The CIA Triad
4:43 Information Security Policies
Visit Great Learning Academy, to get access to 300+ free courses with 1000+ hours of content on Data Science, Data Analytics, Artificial Intelligence, Big Data, Cloud, Management, Cybersecurity, Software Development and many more. These are supplemented with free projects, assignments, datasets, quizzes. You can earn a certificate of completion at the end of the course for free. https://glacad.me/2Tq7ZvO
Get the free Great Learning App for a seamless experience, enrol for free courses and watch them offline by downloading them. https://glacad.me/3cSKlNl
About Great Learning:
- Great Learning is an online and hybrid learning company that offers high-quality, impactful, and industry-relevant programs to working professionals like you. These programs help you master data-driven decision-making regardless of the sector or function you work in and accelerate your career in high growth areas like Data Science, Big Data Analytics, Machine Learning, Artificial Intelligence & more.
- published: 12 Jun 2021
- views: 25715
1:23
Information Security in 80 seconds
As our world becomes further connected and data driven, the burden to protect confidential information increases. Not only individual consumers, but large organ...
As our world becomes further connected and data driven, the burden to protect confidential information increases. Not only individual consumers, but large organizations need to be aware of the risk that unsecured information poses.
https://wn.com/Information_Security_In_80_Seconds
As our world becomes further connected and data driven, the burden to protect confidential information increases. Not only individual consumers, but large organizations need to be aware of the risk that unsecured information poses.
- published: 25 Jul 2016
- views: 37585
17:34
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
IBM Security QRadar EDR : https://ibm.biz/Bdyd7k
IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/Bdyd76
This ten part video series is bas...
IBM Security QRadar EDR : https://ibm.biz/Bdyd7k
IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/Bdyd76
This ten part video series is based on a 400 level class on Enterprise Cybersecurity Architecture taught by Jeff "the Security Guy" Crume at a local university. He'll begin by explaining the foundational principles of cybersecurity - five that are best practices and one that's just the opposite. The subsequent episodes will look at the various domains that apply to a well-designed security architecture. Be sure to subscribe so you'll get notified of the next video!
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #ibm
Chapters
00:00 Principles Introduction
01:05 Defense in Depth
04:20 Least Privilege
07:55 Separation of Duties
09:50 Secure by Design
12:15 Keep It Simple, Stupid (KISS)
14:43 Security by Obscurity
https://wn.com/Cybersecurity_Architecture_Five_Principles_To_Follow_(And_One_To_Avoid)
IBM Security QRadar EDR : https://ibm.biz/Bdyd7k
IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/Bdyd76
This ten part video series is based on a 400 level class on Enterprise Cybersecurity Architecture taught by Jeff "the Security Guy" Crume at a local university. He'll begin by explaining the foundational principles of cybersecurity - five that are best practices and one that's just the opposite. The subsequent episodes will look at the various domains that apply to a well-designed security architecture. Be sure to subscribe so you'll get notified of the next video!
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #ibm
Chapters
00:00 Principles Introduction
01:05 Defense in Depth
04:20 Least Privilege
07:55 Separation of Duties
09:50 Secure by Design
12:15 Keep It Simple, Stupid (KISS)
14:43 Security by Obscurity
- published: 31 May 2023
- views: 427723
8:12
Introduction to Information Security
The CES Security Operations Center presents a helpful, animated intro to information security. This video explains and illustrates the concepts of Phishing an...
The CES Security Operations Center presents a helpful, animated intro to information security. This video explains and illustrates the concepts of Phishing and Spear Phishing. It also provides some useful tips for strengthening and managing Passwords.
https://wn.com/Introduction_To_Information_Security
The CES Security Operations Center presents a helpful, animated intro to information security. This video explains and illustrates the concepts of Phishing and Spear Phishing. It also provides some useful tips for strengthening and managing Passwords.
- published: 29 Sep 2021
- views: 9780
27:30
Information Security Tutorial
This is a crash course on information security for beginners. It will provide you the basics knowledge and terminology about information security.
⭐ Table of C...
This is a crash course on information security for beginners. It will provide you the basics knowledge and terminology about information security.
⭐ Table of Contents ⭐
⌨️ (0:00) Introduction to Security
⌨️ (17:05) Threats, vulnerabilities and control
⭐ Credit ⭐
Course Author: Mike Murphy
License: Creative Commons Attribution license (reuse allowed)
YT: https://www.youtube.com/channel/UCndXB_kOP-C_KgZ2d_LNzbw
⭐️ Join Us ⭐️
Join our FB Group: https://www.facebook.com/groups/cslesson
Like our FB Page: https://www.facebook.com/cslesson/
Website: https://cslesson.org
https://wn.com/Information_Security_Tutorial
This is a crash course on information security for beginners. It will provide you the basics knowledge and terminology about information security.
⭐ Table of Contents ⭐
⌨️ (0:00) Introduction to Security
⌨️ (17:05) Threats, vulnerabilities and control
⭐ Credit ⭐
Course Author: Mike Murphy
License: Creative Commons Attribution license (reuse allowed)
YT: https://www.youtube.com/channel/UCndXB_kOP-C_KgZ2d_LNzbw
⭐️ Join Us ⭐️
Join our FB Group: https://www.facebook.com/groups/cslesson
Like our FB Page: https://www.facebook.com/cslesson/
Website: https://cslesson.org
- published: 28 Oct 2020
- views: 46283
7:52
How I Would Learn Cyber Security if I Could Start Over in 2024 (Beginner Roadmap)
In this video I walk you through a entry level cybersecurity roadmap that I would take if I had to restart my cybersecurity career from scratch!
Resources:
Goo...
In this video I walk you through a entry level cybersecurity roadmap that I would take if I had to restart my cybersecurity career from scratch!
Resources:
Google Cybersecurity Professional Certificate 👉 https://imp.i384100.net/xky4Q1
CompTIA Security+ 👉 https://www.comptia.org/certifications/security
CompTIA Network+ 👉 https://www.comptia.org/certifications/network
AWS Cloud Practitioner 👉 https://aws.amazon.com/certification/certified-cloud-practitioner/
Security Blue Team Level 1 👉 https://www.securityblue.team/why-btl1/
PJPT by TCM Security 👉 https://certifications.tcm-sec.com/pjpt/
Video Resources:
https://youtu.be/dHxEd5o_22I?si=gTsiO_EZgo2ceZ5e
https://youtu.be/Fw4KYlVfnJM?si=Sj2e2G6nZuxzFxcu
https://youtu.be/jk1p6hKxCPY?si=To7NqmwW3ng84VXn
https://youtu.be/Yug9vP9ix3g?si=b7ZeRtE5B2_f2JBG
🧑🏻💻 Start your career in IT with this FREE course! 👉 https://coursecareers.com/a/BenTruong?course=it
🔒 Google Cybersecurity Certificate 👉 https://imp.i384100.net/xky4Q1
✍️ Start a Career in GRC! 👉 https://www.grcmastery.com/courses/cyber-security-consulting-grc?affcode=1703194_ha1ooser
🛍️ Check out my digital notes! 👉 https://bentruong.gumroad.com/
📷 Follow me on IG 👉 https://www.instagram.com/cyberwithben
🌎 Visit My Website 👉 https://www.btruong.com/
For any business inquiries contact
[email protected]
Anything posted on my channel are of my own personal opinion/views and are not that of my current employer, future employer, or past employer.
Advertiser Disclosure: Some of the links that appear on this website are from companies which Ben Truong will earn an affiliate commission or referral bonus.
https://wn.com/How_I_Would_Learn_Cyber_Security_If_I_Could_Start_Over_In_2024_(Beginner_Roadmap)
In this video I walk you through a entry level cybersecurity roadmap that I would take if I had to restart my cybersecurity career from scratch!
Resources:
Google Cybersecurity Professional Certificate 👉 https://imp.i384100.net/xky4Q1
CompTIA Security+ 👉 https://www.comptia.org/certifications/security
CompTIA Network+ 👉 https://www.comptia.org/certifications/network
AWS Cloud Practitioner 👉 https://aws.amazon.com/certification/certified-cloud-practitioner/
Security Blue Team Level 1 👉 https://www.securityblue.team/why-btl1/
PJPT by TCM Security 👉 https://certifications.tcm-sec.com/pjpt/
Video Resources:
https://youtu.be/dHxEd5o_22I?si=gTsiO_EZgo2ceZ5e
https://youtu.be/Fw4KYlVfnJM?si=Sj2e2G6nZuxzFxcu
https://youtu.be/jk1p6hKxCPY?si=To7NqmwW3ng84VXn
https://youtu.be/Yug9vP9ix3g?si=b7ZeRtE5B2_f2JBG
🧑🏻💻 Start your career in IT with this FREE course! 👉 https://coursecareers.com/a/BenTruong?course=it
🔒 Google Cybersecurity Certificate 👉 https://imp.i384100.net/xky4Q1
✍️ Start a Career in GRC! 👉 https://www.grcmastery.com/courses/cyber-security-consulting-grc?affcode=1703194_ha1ooser
🛍️ Check out my digital notes! 👉 https://bentruong.gumroad.com/
📷 Follow me on IG 👉 https://www.instagram.com/cyberwithben
🌎 Visit My Website 👉 https://www.btruong.com/
For any business inquiries contact
[email protected]
Anything posted on my channel are of my own personal opinion/views and are not that of my current employer, future employer, or past employer.
Advertiser Disclosure: Some of the links that appear on this website are from companies which Ben Truong will earn an affiliate commission or referral bonus.
- published: 22 Jul 2024
- views: 241795
18:35
TCS+ | From gen AI to deepfakes – the latest infosec threats
Twice yearly, ESET publishes its Threat Report in which it unpacks the latest trends and developments in the world of information security.
Adrian Stanford, gro...
Twice yearly, ESET publishes its Threat Report in which it unpacks the latest trends and developments in the world of information security.
Adrian Stanford, group chief technology officer at ESET Southern Africa, is our guest in the latest episode of TechCentral’s TCS+, and he provides a succinct overview of the key trends identified in the latest ESET Threat Report, for the first half of 2024.
Stanford provides a brief overview of the findings before delving into:
• The threat posed by generative AI, including how bad actors are using the technology to break into systems and target victims;
• The rise of deepfakes and the threat they pose, particularly in mobile;
• The threat posed to Linux-based systems – and why there’s a misconception that malware doesn’t target Linux (or macOS); and
• The latest on plug-in malware impacting WordPress-based websites.
Don’t miss this informative discussion about the evolving world of cyberthreats and how they could impact you and your business.
https://wn.com/Tcs_|_From_Gen_Ai_To_Deepfakes_–_The_Latest_Infosec_Threats
Twice yearly, ESET publishes its Threat Report in which it unpacks the latest trends and developments in the world of information security.
Adrian Stanford, group chief technology officer at ESET Southern Africa, is our guest in the latest episode of TechCentral’s TCS+, and he provides a succinct overview of the key trends identified in the latest ESET Threat Report, for the first half of 2024.
Stanford provides a brief overview of the findings before delving into:
• The threat posed by generative AI, including how bad actors are using the technology to break into systems and target victims;
• The rise of deepfakes and the threat they pose, particularly in mobile;
• The threat posed to Linux-based systems – and why there’s a misconception that malware doesn’t target Linux (or macOS); and
• The latest on plug-in malware impacting WordPress-based websites.
Don’t miss this informative discussion about the evolving world of cyberthreats and how they could impact you and your business.
- published: 01 Oct 2024
- views: 75
16:08
CIA Triad
Network Security: CIA Triad
Topics discussed:
1) Definition of computer security by National Institute of Standards and Technology (NIST), US.
2) Three key obje...
Network Security: CIA Triad
Topics discussed:
1) Definition of computer security by National Institute of Standards and Technology (NIST), US.
2) Three key objectives of the CIA triad – Confidentiality, Integrity, and Availability.
3) Two additional objectives to security – Authenticity, and Accountability.
4) Various levels of impact of security breaches – Low, Medium, and High.
5) Real-time examples and explanations for Confidentiality, Integrity, and Availability.
Follow Neso Academy on Instagram: @nesoacademy (https://bit.ly/2XP63OE)
Contribute: http://www.nesoacademy.org/donate
Memberships: https://bit.ly/2U7YSPI
Books: http://www.nesoacademy.org/recommended-books
Website ► http://www.nesoacademy.org/
Forum ► https://forum.nesoacademy.org/
Facebook ► https://goo.gl/Nt0PmB
Twitter ► https://twitter.com/nesoacademy
Music:
Axol x Alex Skrindo - You [NCS Release]
#NetworkSecurityByNeso #Cryptography #NetworkSecurity #CIATriad
https://wn.com/Cia_Triad
Network Security: CIA Triad
Topics discussed:
1) Definition of computer security by National Institute of Standards and Technology (NIST), US.
2) Three key objectives of the CIA triad – Confidentiality, Integrity, and Availability.
3) Two additional objectives to security – Authenticity, and Accountability.
4) Various levels of impact of security breaches – Low, Medium, and High.
5) Real-time examples and explanations for Confidentiality, Integrity, and Availability.
Follow Neso Academy on Instagram: @nesoacademy (https://bit.ly/2XP63OE)
Contribute: http://www.nesoacademy.org/donate
Memberships: https://bit.ly/2U7YSPI
Books: http://www.nesoacademy.org/recommended-books
Website ► http://www.nesoacademy.org/
Forum ► https://forum.nesoacademy.org/
Facebook ► https://goo.gl/Nt0PmB
Twitter ► https://twitter.com/nesoacademy
Music:
Axol x Alex Skrindo - You [NCS Release]
#NetworkSecurityByNeso #Cryptography #NetworkSecurity #CIATriad
- published: 29 Mar 2021
- views: 312968