پیشنهاد فرادرس

آموزش امنیت سایبری برای کسب و کارهای کوچک و متوسط

دسته بندی ها: آموزش های لیندا (Lynda) ، آموزش کسب و کار

به عنوان صاحب یک کسب و کار کوچک یا متوسط، احتمالا آگاه هستید که تهدیدات امنیتی سایبری در حال افزایش است. یادگیری مسائل مربوط به مراقبت و چگونگی پاسخ بهتر به تهدیدات می تواند به شما در حفظ امنیت کسب و کار کمک کند. در این دوره با حفظ داده و حساب های آنلاین، استفاده از فریمورک NIST Cybersecurity، استاندارد بین المللی ایجاد شده توسط موسسه ملی استاندارد ها و فناوری، مراحل ایمن سازی کسب و کار و غیره آشنا می شوید.

سرفصل:

  • معرفی دوره
  • امنیت فیزیکی در مقابل امنیت سایبری
  • شناسایی آنچه شما را از دیگران ارزشمند می سازد
  • حفاظت از اطلاعات و حساب های ارزشمند
  • تشخیص نقص
  • پاسخ دادن به یک حادثه به روش کارآمد
  • بازیابی از نقص
  • چک لیست فن آوری برای کسب و کارهای کوچک و متوسط
  • تهدیدات امنیتی سایبری چیست؟
  • بهترین شیوه های دسترسی به حساب کاربری
  • راه حل های فناوری برای محافظت از یک کسب و کار
  • مدیریت اعتبار
  • و غیره
آیا این نوشته را دوست داشتید؟
Cybersecurity for Small and Medium Businesses: Essential Training Publisher:Lynda Author:Kristin Judge Duration:1h 34m Level:Beginner

Learn how to protect your small or medium business from cybersecurity threats.
Released: 7/16/2018
As the owner of a small or medium business, you're probably aware that cybersecurity threats are on the rise. Learning which issues to watch out for—and how to best respond to threats—can help you keep your business safe. In this course, instructor Kristin Judge provides business owners and their staff with the foundational knowledge they need to secure their data and online accounts. Using the NIST Cybersecurity Framework—an international standard created by the National Institute of Standards and Technology—Kristin takes you through a five-step process that can help you better secure your business.
Topics include:
Physical security vs. cybersecurity
Identifying what you have that's valuable to others
Protecting valuable data and accounts
Detecting a breach
Responding to an incident in an efficient manner
Recovering from a breach
Technology checklists for small and medium businesses
Introduction
Welcome
1m 4s
What you should know
48s
1. The Basics
Why you should care
4m 5s
Physical security vs. cybersecurity
1m 4s
Anyone can improve the cybersecurity of a business
1m 58s
What are the cybersecurity threat actions facing businesses?
2m 38s
What are the cybersecurity threats?
3m 56s
A five-step process to improve cybersecurity
2m 19s
2. Identify
Step #1: Identify key assets
1m 47s
Inventory sheet: Data and devices
1m 6s
Account access best practices
3m 36s
What about the cloud?
5m 26s
3. Protect
Step #2: Protect data and accounts
1m 1s
Humans: Education and awareness is essential
3m 15s
Sharing online: How to prevent a phish
4m 29s
Technology solutions to protect a business
5m 38s
Passphrases and authentication
4m 48s
Culture of security: Policies, procedures, and attitude
4m 27s
4. Detect
Step #3: Detect a breach
1m 47s
Detecting a compromise: The human element
1m 32s
Cybersecurity assessments and detection technology solutions
4m 40s
5. Respond
Step #4: Respond to a cyber breach
1m 30s
Cybersecurity response plans for business
2m 14s
Key elements of a cyber incident response
5m 6s
Federal government response support and guidance
3m
State breach response laws
3m 13s
6. Recover
Step #5: How to recover from a cyber incident
1m 7s
Cybersecurity insurance
4m 27s
Reputation management
2m 5s
7. Resources
Technology checklists for small and medium businesses
2m 8s
More cybersecurity resources
3m 4s
Scam and threat alerts
3m 32s
Conclusion
Next steps
1m 18s

پیشنهاد فرادرس

لینک های دانلود حجم فایل: 330.0MB همراه با زیرنویس انگلیسی Lynda Cybersecurity for Small and Medium Businesses Essential Training_git.ir.rar