💎Unlock Premium Features
By - 7alen7

Cybersecurity Iceberg Explained

Cybersecurity Iceberg Explained

7alen7

0 mins
128100+ students

📝 About This Course

If you've watched the video all the way through, then click this link to claim your digital certification for passing my entry level cyber course: https://en.wikipedia.org/wiki/Trollface Any corrections to the video will be posted below or pinned in a comment: 5:16 - Somali prince should be Nigerian prince, but the scam is the same 1:00:00 - User @samrichardson3122 pointed out that this entry also bares similarities to how the KGB bugged American type writers during the cold war. See more info here (https://www.popularmechanics.com/military/a30370413/typewriter-bugging-cold-war/) This piece of work contains content that was found entirely through research on the surface web. No new information was disseminated through this video. Please do not shoot the messenger. Intro: (0:00) Insider Threat: (1:02) NetworkPlus/APlus: (12:55) SecurityPlus: (28:28) CISSP: (42:06) BlackBadge: (51:40) True 0 Risk: (1:04:43) Outro: (1:06:06) マヨネーズ

🚀 What You'll Learn

Complete understanding of the topic

Hands-on practical knowledge

Real-world examples and use cases

Industry best practices

Premium

Get Full Course Access

Take your learning to the next level with premium features

Unlimited access to all chapters
Interactive quizzes & assessments
Downloadable certificate