PowerPoint Presentation

Published on
Embed video
Share video
Ask about this video

Scene 1 (0s)

Cybersecurity Training: Building a Secure Foundation.

Scene 2 (16s)

Module 1. Introduction to Information Security & ISO 27001.

Scene 3 (1m 25s)

Module 2. Information Security Policies & Governance.

Scene 4 (2m 25s)

Module 3. Asset & Data Management. A.5.9. Identifying & Classifying Information Assets.

Scene 5 (3m 28s)

Module 4. Access Control & Identity Management. Controlling who can access what information is fundamental to security. This module covers the principles and practices of managing user identities and access privileges. It emphasizes the importance of robust controls to prevent unauthorized access and protect sensitive information..

Scene 6 (4m 41s)

Module 5. Cryptography & Data Protection. Cryptography is the cornerstone of data protection, ensuring that sensitive information remains confidential and unaltered. This module explores various cryptographic techniques and their application in securing data at rest and in transit..

Scene 7 (5m 38s)

Module 6. Network & Endpoint Security. Protecting the network perimeter and individual devices is crucial for preventing unauthorized access, malware infections, and data breaches. This module covers essential strategies for securing both networks and endpoints, forming a multi-layered defense..

Scene 8 (6m 47s)

Module 7. Application & Secure Development Security.

Scene 9 (7m 18s)

thiiiii!ii iiiiiiiih iiii$iiiti iiii lii -. Module 8.

Scene 10 (7m 52s)

Module 9. Business Continuity & Disaster Recovery.

Scene 11 (8m 27s)

Module 10. Supplier & Third-Party Security. Supplier Risk Assessment (A.5.19, A.5.20): Thoroughly assessing the security posture of all suppliers and third parties..

Scene 12 (8m 56s)

Module 11. Human Factor & Security Awareness. Phishing & Social Engineering Awareness.

Scene 13 (9m 26s)

Module 12. Compliance, Audits & Continuous Improvement.

Scene 14 (9m 42s)

Module 12 (Continued). Key Aspects of Compliance & Improvement.

Scene 15 (10m 16s)

Module 13. Emerging Cybersecurity Trends. AI & ML in Cybersecurity.

Scene 16 (10m 45s)

Key Takeaways & Next Steps. Continuous Adaptation.