All language subtitles for 3. Goals and Learning Objectives - Volume 1

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,040 --> 00:00:07,370 Let's talk about the goals and learning objectives for Vol. 1 vol. 1 covers the fundamental building 2 00:00:07,370 --> 00:00:13,180 blocks of a required skill sets becoming a security and privacy expert. 3 00:00:13,400 --> 00:00:20,510 You understand the online threat and vulnerability landscape through threat modeling and risk assessments. 4 00:00:20,510 --> 00:00:26,930 This means you understand in detail the threats and adversaries that we face such as hackers trackers 5 00:00:26,930 --> 00:00:32,170 malware zero days exploit kits and much more. 6 00:00:32,300 --> 00:00:39,620 You understand how to determine the potential risk that they pose then how to mitigate that risk through 7 00:00:39,620 --> 00:00:45,270 the selection implementation and monitoring of appropriate security controls. 8 00:00:45,290 --> 00:00:52,490 You will learn how to set up test environments in virtual box and VM where using the guest operating 9 00:00:52,490 --> 00:01:01,220 system of your choice or host operating system of your choice including Windows Mac OSX Linux and Kelly 10 00:01:02,120 --> 00:01:09,710 after this cause you'll understand encryption from symmetric algorithms to asymmetric algorithms hashes 11 00:01:10,160 --> 00:01:14,750 S-sh SSL TLR class and so on. 12 00:01:14,840 --> 00:01:20,350 How encryption works how it can be bypassed and what you can do to mitigate the risks. 13 00:01:20,360 --> 00:01:27,890 Toss in an easy to follow way after this cause you understand the security and privacy differences between 14 00:01:27,890 --> 00:01:33,290 Windows 7 Windows 8 Windows 10 Mac OS X and Linux. 15 00:01:33,290 --> 00:01:38,570 We will cover how to make patching easier across those platforms. 16 00:01:38,720 --> 00:01:43,140 Then how to mitigate their security and privacy issues. 17 00:01:43,160 --> 00:01:46,980 Patching is very important has to be code in the fundamentals. 18 00:01:47,030 --> 00:01:53,960 You will learn practical defenses against social engineering threats like phishing smashing phishing 19 00:01:54,260 --> 00:01:58,540 identity theft scams cons and others. 20 00:01:58,580 --> 00:02:06,580 You'll learn how to use isolation compartmentalisation as a security control covering some boxes. 21 00:02:06,590 --> 00:02:08,420 Application isolation. 22 00:02:08,420 --> 00:02:09,610 Virtual machines. 23 00:02:09,650 --> 00:02:13,560 Unix and cubes OS. 24 00:02:13,710 --> 00:02:18,290 This is Volume 1 of 4 of your complete guide to Internet security. 25 00:02:18,290 --> 00:02:20,490 Privacy and anonymity. 26 00:02:20,580 --> 00:02:25,860 If you want to know about the continuation of the course through the other volumes check out the bonus 27 00:02:25,860 --> 00:02:29,400 lecture at the end to understand how they all fit together. 2945

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.