July 5, 2024
Cyber and Organized Crimes

Cybersecurity Mastery: Complete Course in a Single Video | Cybersecurity For Beginners



⭐⭐⭐⭐🕑TIME STAMP IS IN THE COMMENTS SECTION📋⭐⭐⭐⭐⭐

What you’ll learn
✅ Understand the cybersecurity landscape and learn core concepts foundational to security, compliance, and identity solutions.
✅Understand the vulnerabilities of an organizations network and mitigate attacks on network infrastructures to protect data.
✅Develop and implement threat mitigation strategies by applying effective cybersecurity measures within an Azure environment.
✅Demonstrate your new skills with a capstone project and prepare for the industry-recognized Microsoft SC-900 Certification exam.

👉Course Material ⬇⬇

❤❤ Please like, share, and subscribe for more content! Avoid downloading to support the channel. Thanks for your ongoing support! 🙏 #SupportCreators”❤❤

✨✨PLEASE IGNORE THESE TAGS✨✨
cybersecurity for beginners
cybersecurity fundamentals
cybersecurity 101
introduction to cybersecurity
cybersecurity basics
cybersecurity crash course
intro to cybersecurity
cybersecurity risk management
cybersecurity tutorial
By Microsoft
#cybersecurity
cyber security,
cybersecurity roadmap,
cybersecurity bootcamp,
#cybersecurityforbeginners
all about cybersecurity,
cybersecurity basics,
cybersecurity basics for beginners,
cybersecurity beginner course,
basics of cybersecurity,
basics of cybersecurity for beginners,
best cybersecurity courses,
cybersecurity crash course,
cybersecurity compliance analyst,
everything about cybersecurity
#cybersecurityanalyst

source

42 Comments

  • @Nerdslesson July 3, 2024

    ⭐⭐⭐⭐🕑TIME STAMP📋⭐⭐⭐⭐⭐

    Cybersecurity For Beginners By Google: https://youtu.be/Ieegg45Pojw

    ❶ INTRODUCTION TO COMPUTERS AND OPERATING SYSTEMS

    Introduction to Computers and Operating systems
    🕛00:00 Course Introduction
    🕛14:13 Threat Landscape
    🕛23:35 Introduction to Computing devices
    🕛34:32 Operating systems

    Enterprise Systems and Security
    🕛49:21 Servers Storage and Backups
    🕛1:00:36 Computing Environments
    🕛1:11:46 Maintenance and Patches

    Business Systems Applications
    🕛1:26:27 Business Software
    🕛1:36:15 Email Apps
    🕛1:47:00 Storage Solutions

    Computers Operating Systems and Security
    🕛2:09:26 Final Course assessment
    🕛2:13:54 Course Wrap up

    ➋ INTRODUCTION TO NETWORKING AND CLOUD COMPUTING

    Computer Networking
    🕛2:16:46 Course introduction
    🕛2:21:55 Types and Topologies
    🕛2:32:52 IP Addressing

    Network Devices and Protocols
    🕛2:51:22 Infrastructure
    🕛3:03:24 Network Communication Models
    🕛3:16:00 Protocols and ports
    🕛3:26:40 Network Traffic monitoring

    Network Security
    🕛3:41:09 Network Client and Server
    🕛3:52:19 Authentication and Authorization
    🕛4:08:09 Firewalls and Security tools

    Cloud Computing and Networking
    🕛4:37:44 Introduction to Azure
    🕛4:46:34 Virtual Environments
    🕛4:59:47 Cloud Services
    🕛5:14:33 X as A Service

    Networking and Cloud Computing
    🕛5:30:02 Final Course Project and Assessment
    🕛5:37:35 Course wrap up

    ➌ CYBERSECURITY THREAT VECTORS AND MITIGATION

    Threats and attacts
    🕛5:40:33 Course introduction
    🕛5:44:05 Epic attacts
    🕛5:53:59 Theats vectors
    🕛6:11:24 Mitigation Strategies

    Cryptography
    🕛6:26:24 Encryption
    🕛6:33:41 Public Private key and hashing
    🕛6:49:15 Digital Signing and certificates
    🕛7:04:27 Authentication and Authorization

    Network and Device Based threats
    🕛7:19:42 Data Transmission
    🕛7:35:49 Security controls
    🕛7:50:47 Application Updates

    Security Compliance and Identity
    🕛8:06:06 Security and Compaince Concepts
    🕛8:19:41 ID and Active Directory
    🕛8:34:46 Defence Models

    Cybersecurity Threat Vectors and Mitigation
    🕛8:49:23 Final Course Project and Assessment
    🕛8:55:16 Course Wrap up

    ➍CYBERSECURITY IDENTITY AND ACCESS WITH AZURE AD

    Identity Services
    🕛8:58:01 Course introduction
    🕛9:02:53 Azure Active Directory
    🕛9:24:20 Azure Active Directory and Editions
    🕛9:36:51 Azure Active Directory Identity types

    Active Directory Authentication
    🕛9:58:09 Authentication Methods
    🕛10:31:30 Multi-Factor Authentication
    🕛10:51:25 Password Protection and Resetting

    Active Directory Access Protection and Governance Management
    🕛11:17:11 Condition Access
    🕛11:33:46 Roles and Role Based Access
    🕛11:45:44 Identity Governance
    🕛12:06:51 Privileged Identity management and Protection

    Identity and Access Solutions
    🕛12:26:15 Final Course Project Assessment
    🕛12:33:24 Course Wrap up

    ➎CYBERSECURITY SOLUTIONS AND MICROSOFT DEFENDER

    Azure Basics Security Capabilities
    🕛12:36:56 Course Introduction
    🕛12:41:24 Distributed Denial of Service DDOS Protection
    🕛13:04:21 Azure Firewall Protection
    🕛13:36:11 Just In Time Access and Encryption

    Security Management in Azure
    🕛13:56:32 Introduction to Cloud Security
    🕛14:14:46 Virtual Security Solutions
    🕛14:30:03 Azure Standards and Policies
    🕛14:42:48 Introduction to SIEM and SOAR

    Microsoft 365 Defender Threat Protection
    🕛15:08:04 Defender Services
    🕛15:31:47 Endpoints and Cloud Apps Security
    🕛16:05:11 Identity Defence

    Graded Assessment and Course Wrap up
    🕛16:42:45 Final Project and Assessment Cybersecurity Solutions and Microsoft Defender
    🕛16:48:18 Course Wrap up

    ➏CYBERSECURITY TOOLS AND TECHNOLOGIES

    Penetration testing
    🕛16:52:36 Course Introduction
    🕛16:56:34 Defence and Offense red versus blue
    🕛17:14:30 Testing Stages
    🕛17:49:38 Types of Penetration Test

    Preventative Tools
    🕛18:13:29 Intrusive Detection and Prevention Systems
    🕛18:42:23 Designing Firewalls Solutions in Azure
    🕛18:58:55 Azure virtual Private Network VPN
    🕛19:37:35 Vulnerability Management

    Azure Penetration Testing
    🕛20:08:57 The Command LIne and Windows Powershell
    🕛20:34:49 Setting up Azure for Testing
    🕛21:13:43 Running the Test

    Final Project and Assessment Cybersecurity Tools and Technologies
    🕛21:42:15 Final Project and Assessment Cybersecurity Tools and Techonologies
    🕛21:48:14 Wrap up Cybersecurity tools and technologies

    ➐CYBERSECURITY MANAGEMENT AND COMPILIANCE

    Security Administration
    🕛21:52:43 Course Introduction
    🕛21:56:54 Cloud Security Planning
    🕛22:29:28 Cloud adoption framework
    🕛22:44:54 Data Management and Administration
    🕛23:08:13 Availability and Continuity

    Compliance Solutions
    🕛23:58:47 Compliance Management
    🕛24:46:38 Insider Risk
    🕛25:14:34 Information Protection and Data lifecycle

    Laws and Standards
    🕛25:47:59 Information Security Management Act ISMA
    🕛26:16:26 So International Organizing For Standardization Standards
    🕛26:37:44 Control Objectives for Information and related Technologies Cobit

    Final Project and Assessment Cybersecurity Managent and Compliance
    🕛27:05:27 Final Project and Assessment Cybersecurity Managent and Compliance
    🕛27:12:41 Course Wrap up Cybersecurity Management and Compliance

    ➑ ADVANCED CYBERSECURITY CONCEPTS AND CAPSTONE PROJECT

    Threat Modeling
    🕛27:17:09 Course Introduction
    🕛27:20:53 Introduction to Threats Modeling
    🕛27:48:26 Threat Modeling Strategies
    🕛28:26:47 Azure and threat Modeling

    Advanced Threats and Mitigation
    🕛28:56:55 Susceptible infrastructure and Types of attack
    🕛29:32:02 IOT Internet of things and common attacks

    Security Conscious Modeling
    🕛30:23:15 Entry Point and Associated Risks
    🕛30:45:36 Secure network Design with Defence in Depth
    🕛31:13:19 Mitigation Strategies

    Capstone Project
    🕛31:53:02 Capstone Project
    🕛32:05:21 Wrap up Advanced Cybersecurity Concepts and Capstone

    ➒ MICROSOFT SC 900 EXAM PREPARATION AND PRACTICE

    Concepts of Security Compliance and Identity
    🕛32:09:39 Welcome to the Course
    🕛32:15:46 Microsoft Certification
    🕛32:20:06 Security and Compliance Concepts
    🕛32:50:46 Identity Concepts

    The Capabilities of Microsoft Azure Active Directory
    🕛33:29:52 Authentication Capabilities of Azure AD
    🕛33:45:29 Access Management Capabilities of Azure AD
    🕛34:01:09 Identity Protection and Governance Capablities of Azure AD

    Microsoft Security Solutions
    🕛34:19:19 Basic Security Capabilities in Azure
    🕛34:41:11 Azure Security Management
    🕛35:03:03 Security Capabilities of Microsoft Sentinel
    🕛35:18:31 Threat protection with Microsoft 365 Defender

    The Capablities of Microsoft Compliance Solutions
    🕛35:49:49 Microsoft Service Trust Portal Privacy Principles
    🕛36:03:00 Compliance Management Capabilities of Microsoft Purview
    🕛36:20:57 Information Protection and Data Lifecycle Managent Capabilities of Microsoft

    Risk and Resource Governance
    🕛36:49:00 Describe insider risk capabilities in Microsoft Purview
    🕛37:07:50 Resource governance Capablities in Azure

    Practice Exam
    🕛37:29:44 SC-900 Practice-Exam
    🕛37:35:37 Course Wrap up

  • @user-uk3eh3ny3s July 3, 2024

    Start today July 2

  • @SadaqatAli-op8bl July 3, 2024

    1 July 2024

  • There are many lessons missing from this long video. Anyone get this? When they review the whole week's lessons I find many lessons are missing which I didn't go though.

  • HEy Nerd, In every week's lesson there are many lessons which are missing. I find it when I watched all through and at the end they reviewed all lessons. There are many many lessons you don't include in this video. This actually gaps our knowledge. Ain't I True?

  • @Itz-Just-ME July 3, 2024

    trash

  • Thanks ver usefull course

  • @user-sz8uw9cj9r July 3, 2024

    Kominfo has to take this course, i think😂

  • @benjaminapetersen July 3, 2024

    This is really interesting! It would be handy as a collection of videos rather than one video to make it easier to move the timeline.

  • @gurunagu4750 July 3, 2024

    Guys, I am looking to switch career from civil engineer to cybersecurity. Any guidance?

  • @aae7583 July 3, 2024

    you are changing lives. There is no EXCUSE when something like this is available. thank you!!!

  • @dillontierney8150 July 3, 2024

    iS THIS A LEGIT COURSE??? NOW WAY???!!

  • @JeanBaptisteChabi July 3, 2024

    How do you upload 37h video but YouTube always tell me the Limit is 12 h

  • @cricgamer755 July 3, 2024

    I appreciate your efforts getting the @Microsoft course from @coursera and posting it here. so that everyone can take advantage of it without paying for it.

  • @Yasminf2005 July 3, 2024

    راني داخلة هنايا ومعرفتش كفاه دنفهملهم هي انا نفهم شوي بصح هاذو يشاطرو في الهدرة وفوقها معنيش ميكرو جاية ق بلاطاي حابة نتعلم برك وزيد طويييل 😅😂

  • @ibarvasquez July 3, 2024

    good content!

  • @Sandra_Chijioke July 3, 2024

    1 day and 13 hours??? 1 full day😭😭??
    really????

  • @compros1 July 3, 2024

    Thanks for the effort 😊

  • @SpeaksYourWord July 3, 2024

    Can I earn money if I finish this?

  • @mingosutu July 3, 2024

    Typical talk and talk and talk and talk and all is about MONEY. Youtube is full of free courses

  • @ggoog1845 July 3, 2024

    Finished all 37 hours wow that was tough.

  • Este é um aspecto da atual conjuntura global de vai gerar grande demanda

  • @user-zn8fd1vx6h July 3, 2024

    please is the microsoft exam for free?

  • @henny1387 July 3, 2024

    has anybody downloaded course material on google drive is it safe ? please let me know

  • @OmarAhmed-nw6lr July 3, 2024

    This is No Cypersecrutiy course Tutorial they say 37 hours
    With no Practical
    Guys this is demo to come to them
    They are bad

  • @josephgabriel6845 July 3, 2024

    You guys are amazing!!!

  • @The007enzo1 July 3, 2024

    I bet most of the people with negative comments are not successful at nothing, especially not cybersecurity because of your mindset

  • @The007enzo1 July 3, 2024

    You can listen to it every night for 30 days until it's in your subconscious mind… instead of being negative

  • @gejesoo3447 July 3, 2024

    better watch indian toturial haha 😅

  • @aujlo July 3, 2024

    Gonna watch this 37 hours straight no food no water just straight up adderall

  • @oko098 July 3, 2024

    Some one made a 72 hr meth fueled gooning session, i am gonna make a 30 hr + meth fueled cyber security learning session

  • @soumininnyy July 3, 2024

    Great great work ❤

  • @ODEHAGAJIZION July 3, 2024

    Wow incredible 👏 I've been looking for an opportunity like this, and I now have the right resources to start my cybersecurity journey 🥺🥺💪 Thank you so much for this 🙏🙏 I'll share my experience when I'm done ✅

  • @user-vh3zy3fc3f July 3, 2024

    Is there programming lang. And linux In this course bec i cant choose between this course and freecode camp course

  • @user-ey5sq2dy1w July 3, 2024

    Am interested

  • @user-wj1hn5ys5z July 3, 2024

    Please upload software testing course (QA). Thanks

  • @valimalidudu7991 July 3, 2024

    Microsoft Certified Security, Complience And Identity Foundamentals: ❌
    Microsoft Certified Data Stealing: ✅

  • @Heirofheavenn July 3, 2024

    This is very helpful but I feel like it needs to be a bit more organized 🤍😇

  • @Lacerated1DJ3 July 3, 2024

    Thank you for this video, security education should be free to all.

  • I am so grateful for this course! Mighty blessings

  • @GloryOfotare July 3, 2024

    Couldn't download course materials

  • @oliveramoah7733 July 3, 2024

    Like my comment, I'll be back

Leave a Reply

Your email address will not be published. Required fields are marked *

X
Enable Notifications OK No thanks
Verified by MonsterInsights