What people say...

Reviews from our learners who have used our other resource libraries

5 star rating

Excellent

Rita Kene-Nwegbe

I love the videos and articles. They gave me insights to the different tasks.

I love the videos and articles. They gave me insights to the different tasks.

Read Less
5 star rating

Very informative and Easy Reference

Samantha Ford

Great selection of resources that are broken down in a way that's easy to follow. Enjoyed the videos and explanations given for each technique. Also some ver...

Read More

Great selection of resources that are broken down in a way that's easy to follow. Enjoyed the videos and explanations given for each technique. Also some very useful links to templates etc. that I will definitely be using going forward.

Read Less

Our Library Offers

We have put together a range of resources to help you find information quickly and easily.

    1. How to access your resources

      FREE PREVIEW
    2. Agora Cybersecurity Study Guide

    1. 1.4.2 The 5 components of Information Systems

    2. 1.4.2 Computer Basics Understanding Applications

    3. 1.4.2 What is a database

    4. 1.4.2 What is IT infrastructure?

    5. 1.4.3 What does a data centre do?

    6. 1.4.4 Servers & Clients

    7. 1.4.4 Servers and Clients (2)

    8. 1.4.5 What is a web server

    9. 1.4.5 Web Server vs Application Server

    10. 1.4.5 What is a static file server?

    11. 1.4.5 What is a directory server?

    12. 1.4.5 What are directory services

    13. 1.4.6 What is a platform? Platform Business Models and Why They're Dominant | Applico

    14. 1.4.6 What is Platform as a service?

    15. 1.4.6 Saas, Paas and Iaas Part 1

    16. 1.4.6 Sas, Paas & Iaas Part 2

    17. 1.4.7 What is the OSI model?

    18. 1.5.2 What is the internet protocol

    19. 1.5.2 What is the TCP/IP Protocol

    20. 1.5.2 TCP/IP Model

    21. 1.5.3 What Is Systems Development Life Cycle?

    22. 1.5.4 Waterfall model in Software Development

    23. 1.5.4 Agile in Software Development

    24. 1.5.5 Staging Deployments

    25. 1.5.6 ITIL - What is it?

    26. 1.5.7 What is Patch Management?

    27. 1.5.8 What is a web application?

    28. 1.5.8 Web pages, Websites, and Web Applications

    29. 1.5.8 The Internet vs the Web

    30. 1.5.8 HTTP & the Web

    31. 1.6.2 What is Information Management?

    32. 1.6.3 Cloud Computing for Beginners

    33. 1.6.4 Cloud vs On-Prem

    34. 1.6.4 Cost of Cloud vs On-Prem

    35. 1.6.5 Management Services

    36. 1.6.6 Digitization, Digital Transformation and Innovation: What’s the Difference?

    37. 1.6.7 What is Business Intelligence

    38. 1.6.8 Internet of Things explained simply

    39. Administrator and operator logs

    1. Anonymization and Pseudonymization under GDPR

    2. Anonymization + Pseudonymization | 60 Seconds of Legal Science | Shook

    3. CIA: What is CIA Triad?

    4. CISO: Three Keys to CISO Success

    5. Defense in Depth

    6. DMZ: What is a DMZ? (Demilitarized Zone)

    7. DRM: What is digital rights management (DRM)?

    8. Information Assurance and Security - CIS4930

    9. Information Security Management System (ISMS)

    10. Internet of Things: What is IoT

    11. Intrusion Detection and Prevention Systems (IDS/ IPS) | Security Basics

    12. Managed Security Service Provider (MSSP): What is it?

    13. Network Segmentation

    14. Rights Expression Language (REL)

    15. Risk Appetite Explained - Risk Tolerance -Risk Tolerance Tips (Financial perspective)

    16. Security Benchmarking

    17. SIEM: Security Information & Event Management Explained

    18. Virtual Private Network (VPN): What is VPN

    1. Common Cyber-Attacks Explained

    2. Cybersecurity Basics #2 - Vulnerabilities, Exploits, and Threats

    3. Executive summary

    4. Cyber Security – Top 10 Threats

    5. Cybersecurity 101: Vulnerability vs Threat vs Risk

    6. Ownership in Risk Management

    7. Risk Assessment

    8. Risk Management Framework (RMF) Overview

    9. Risk ownership and assigning risk

    10. Security Controls Testing

    11. SWOT Analysis - What is SWOT? Definition, Examples and How to Do a SWOT Analysis

    12. The Difference Between Backup and Disaster Recovery

    13. The importance of Threat Modeling

    14. The law of diminishing returns

    15. Vulnerability Discovery

    16. Vulnerability remediation overview

    17. Vulnerability Scanning With Authentication

    18. What’s the Difference Between Risk Capacity vs. Risk Appetite?

    19. What is Authentication

    20. What is Business Continuity?

    21. Commercial off the Shelf (COTS) Tutorial

    22. What is Penetration Testing?

    23. What is the MoSCoW Method?

    1. FIPS 199 200 - Information Categorization and Classification

    2. Information Security Incident Management - BIA (Business Impact Analysis)

    3. Non-Repudiation

    4. Threats and Threat Agents

    5. What is Information Assurance vs Information Security vs Cyber Security?

    6. Cyber Security Risk Assessment

    7. Security Controls - CompTIA Security+ SY0-501 - 5.7

    8. MicroNugget: What are the Different Types & Functions of Security Controls?

    9. NIST Cyber Security Framework (Introduction)

    10. NIST Cyber Security Framework

    11. What is ISO 27001? | A Brief Summary of the Standard

    12. What is ITIL (and ITSM)? Project Management in Under 5

    13. COBIT2019 Overview

    14. Demystifying NIST 800-53

    15. Attack Tree Demonstration

    16. Understanding the STRIDE mnemonic for six common InfoSec threats

    17. Vulnerability Scanning

    18. Select Controls for Risk Management Framework

    19. Cybersecurity Trends for 2023

    1. Compromising Electromagnetic Emanations of Wired Keyboards 1

    2. Compromising Electromagnetic Emanations of Wired Keyboards 2

    3. DHCP Explained | Step by Step

    4. Difference Between Whitelist and Blacklist Policy in Cisco Tetration

    5. Domain Name System DNS

    6. Encryption as Fast As Possible

    7. Hardware Security Module (HSM)

    8. Host-based vs Network Firewalls: What’s the difference?

    9. How An Information Asset Register Can Help Keep Your Business Safe

    10. How Does Full Disk Encryption Work?

    11. How Does Individual File Encryption Work?

    12. IaaS Explained

    13. Introduction to IT Asset Management

    14. Allow egress traffic and block ingress traffic to your network

    15. TechTalk | Securing internet egress and ingress traffic for workloads in AWS, Azure and GCP

    16. Over the Air Firmware Update

    17. Cybersecurity Awareness - The Threat Landscape

    18. Rob's Phishy Friday! - Phishing Awareness Training Video

    19. What is a honeypot, How to install and what can we see from honeypots?

    20. What is an API?

    21. What is an Embedded System?

    22. What is Endpoint Security?

    23. What is Malware?

    24. Why are flat networks a problem nowadays?

    25. Why Data Isolation Matters

    26. Implementing Physical Security For a Data Center

About this course

  • $75.00
  • 180 lessons
  • 0 hours of video content
Watch Intro Video

Video

Find out why cybersecurity training is important for Business Analysts

Get the Cybersecurity Library for free. by purchasing the CCA Cybersecurity Masterclass Bundle

Get 25% off this course (save $123.75). Use promo code: BDAY25 at checkout.

  • 00 Days
  • 00 Hours
  • 00 Minutes
  • 00 Seconds