Cybersecurity Basics I Cybersecurity 101

Cybersecurity Basics I Cybersecurity 101
Are you interested in learning about Cybersecurity? Look no further than this full guide that is designed to give you a broad, basic understanding of various cybersecurity concepts as well as various things you can do to continue your cybersecurity journey. Want to support the channel? Consider buying me a coffee! There are also some affiliate links below to build out your Cybersecurity Homelab: https://ift.tt/3pjE59R If this video was helpful, please consider sharing, liking, and subscribing. Below are some playlists that you may be interested in, and if you want to support the channel and get some cool gear, consider the affiliate links below. Cybersecurity 101: https://youtube.com/playlist?list=PLXZvTsGz3Vti2EgC1DmB3qc7_TnV-oizl CompTIA Security+ Playlist: https://youtube.com/playlist?list=PLXZvTsGz3Vtj1Q90q1OMpkKj2p1eLwabX Follow me on Twitter: https://twitter.com/sec_studio Check out my website: https://ift.tt/3JbqxFy #studiosec #cybersecurity #cybersecurity101 #infosec #learncybersecurity Here at StudioSec, we want to make Cybersecurity easy and applicable. We hope this video accomplished this goal for you. Please subscribe for more content, and leave a comment below if you have any ideas or feedback you’d like to leave me. I’m always looking for ways to improve and make this channel more relevant to you. Interested in starting a lab or sprucing up your home office? Check out these links for cool things I highly recommend! [AFFILIATE LINKS] For Security+: Security+ eBook: https://amzn.to/3moopAZ Security+ Practice Tests: https://amzn.to/3BjWZ34 Ultimate Home Lab: For VMs | ASUS ROG Laptop: https://amzn.to/3tiuwXT 4k Monitor | MSi Optix MAG321CURV: https://amzn.to/3tm79fY HD Monitor | Acer 1080p Monitor: https://amzn.to/3vqMYjc Ultimate Raspberry Pi Starter Kit: https://amzn.to/3vn5usC Wireless Keyboard/Mouse Pair: https://amzn.to/3vnb0eC HDMI Cord: https://amzn.to/3bJhyg0 Hub: https://amzn.to/38Eoyc6 Wire Sleeve: https://amzn.to/3bNw3j0 Wifi Dongle: https://amzn.to/3tnfEaX Big fat power strip: https://amzn.to/3bLAafq Basic Dynamic Home Lab: For VMs | (More Affordable) Beefy Desktop: https://amzn.to/2Q5cgTF HD Monitor | Acer 1080p Monitor: https://amzn.to/3vqMYjc Raspi 4: https://amzn.to/2OSVcPY Organize RPis | Raspi Tower: https://amzn.to/3cwimnr Wireless Keyboard/Mouse Pair: https://amzn.to/3vnb0eC Hub: https://amzn.to/38Eoyc6 Wire Sleeve: https://amzn.to/3bNw3j0 USB C adapter: https://amzn.to/38Ep3D0 Wifi Dongle: https://amzn.to/3tnfEaX HDMI Cord: https://amzn.to/3bJhyg0 Big fat power strip: https://amzn.to/3bLAafq Keep Desk Tidy: Wire Sleeve: https://amzn.to/3bNw3j0 Cleaner Desk | Desk Organizer: https://amzn.to/3eBPGw4 Maximize Space | Monitor Platform: https://amzn.to/3rLmfLK Cool Cybersecurity Toys For Your Lab: Powerful Charging Station: https://amzn.to/3cwjwPP WiFi Pineapple: https://amzn.to/38Frl4J Long Range Antenna: https://amzn.to/3qMamnt GPS dongle: https://amzn.to/3vn7W2i Card reader: https://amzn.to/3qUMWg1 Seagate External HD: https://amzn.to/2Oza4TT Hue Lights: https://amzn.to/2Oy7nlF Royalty-Free Background music: Sunlit - Cloudchord, G Mills Burn My Mind - Tesk Cold Heart Women - C Y G N Lazy Pacific - C Y G N StreamBeats Album - Harris Heller Massive thank you to these excellent artists for providing their craft to help others. Check out their music on Apple Music and Spotify! Twitter: @CalebBMcMurtrey Timestamps: 0:00 Intro 1:10 Ethics in Cybersecurity 10:06 Keeping Up In Cybersecurity 19.12 Keeping Up With Attackers 25:26 Humans & Cybersecurity 33:35 OPSEC 42:15 Cybersecurity Jobs 55:42 Resumes 1:10:26 Data Storytelling 1:17:53 Affordable Homelabs 1:25:32 TryHackMe Overview 1:31:58 HackTheBox Overview 1:44:53 NIST Framework 1:54:06 CIA Triad 2:01:17 Top 10 Infosec Terms 2:10:51 Risk Overview 2:15:28 Risk Assessments 2:22:32 Cybersecurity Governance 2:34:26 Cybersecurity Policies 2:38:15 OSI Model 2:43:01 Cloud v On-Prem 2:51:37 Virtualization 2:58:32 Containerization 3:05:52 VPN Overview 3:11:57 Hashing v Encryption 3:23:37 SCADAs 3:27:57 SIEMs 3:36:49 Bug Bounties 3:45:51 Ransomware 3:50:00 Operating Systems 4:02:07 Cyberattack Types 4:14:39 Threat Actor Types 4:28:39 Threat Hunting 4:43:04 Cybersecurity Technologies 4:49:19 Cybersecurity Tools 5:00:55 Networking Tools 5:09:10 Vulnerabilities 5:24:29 Enterprise Security 5:32:44 Indicators of Compromise (IOCs) 5:44:55 Penetration Testing 5:53:21 Vulnerability Scanning 6:00:02 Malware 6:12:07 Cyberattack Types II 6:43:04 Social Engineering 6:53:49 You Survived

Comments