All language subtitles for 1 - Introduction English 2

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French Download
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt-PT Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 00:00,860 --> 00:01,820 Hello, students, 00:01,850 --> 00:05,540 Myself is Parminder Singh from prep classes, 00:05,660 --> 00:13,070 Our today's topic is cyber security, best practices, trends, technologies and myths, 00:14,060 --> 00:20,660 After going through this course, the students will understand about the cybersecurity best practices, 00:20,690 --> 00:31,070 They will understand that there is need to adopt the best practices such as know to click on each and 00:31,070 --> 00:34,980 every email which may come into their inbox, 00:35,000 --> 00:41,030 They may opt for two factor authentication in case of online accounts, 00:41,300 --> 00:45,770 They should also take the necessary steps to, 00:46,690 --> 00:55,990 Prevent the viruses from attacking their computer, such as they may use latest software, 00:57,350 --> 01:03,690 And they should only purchase branded softwares to be installed in their computers, 01:03,710 --> 01:07,340 They should get the firewalls installed, 01:07,760 --> 01:14,330 The students will also understand that cyber security is very important not only for the individuals 01:14,330 --> 01:16,540 but also for organizations, 01:16,610 --> 01:27,380 It is not that the organizations only need cybersecurity and small level organizations or the local 01:27,380 --> 01:30,560 person or a local ordinary person does not require cybersecurity, 01:30,590 --> 01:38,840 Cybersecurity is important for all the individuals and all the organizations because the cyber criminals 01:38,840 --> 01:47,000 understand that the common person or an ordinary shopkeeper does not spend much or give importance to 01:47,000 --> 01:47,940 cybersecurity, 01:47,960 --> 01:49,370 So they, 01:50,470 --> 01:56,800 So about 50% of the targets of the cyber criminals are ordinary individuals and, 01:58,310 --> 02:00,110 Small level organizations, 02:00,110 --> 02:07,520 So cybersecurity is very important to protect our personnel as well as business data and to ensure the 02:07,520 --> 02:08,810 business continuity, 02:10,330 --> 02:17,110 The students will also understand that these cyber threats are of various types, such as they there 02:17,110 --> 02:24,730 may be man in the middle attack, there may be phishing or social engineering attacks or such type of 02:24,730 --> 02:26,650 other attacks may be there, 02:26,770 --> 02:36,820 The consequences of cyber attacks are various, such as the organization or the individual may suffer 02:36,820 --> 02:38,020 financial loss, 02:38,700 --> 02:42,420 The business continuity of the organization is affected, 02:42,810 --> 02:51,480 Or there is also loss of customers because the brand value of the organization is adversely affected 02:51,480 --> 02:52,770 due to cyber attacks, 02:52,950 --> 02:57,210 Because the customers believe that the organization does not spend much, 02:58,230 --> 02:58,890 In, 03:01,000 --> 03:03,190 Does not invest much in cyber security, 03:04,170 --> 03:13,140 This course also puts emphasis on certain dangerous cybersecurity myths, which we should not believe, 03:13,170 --> 03:15,480 The myths may be that the, 03:16,320 --> 03:20,250 Danger to our computer system is only from the outsiders, 03:20,280 --> 03:30,180 There are also insider threats such as which emanate from our employees, partners or third party persons 03:30,180 --> 03:32,520 who may be working for the organizations, 03:33,560 --> 03:40,610 There is also a myth regarding the various other options that we should always, 03:41,530 --> 03:43,450 That once we have installed, 03:44,360 --> 03:48,460 Cybersecurity and antivirus, 03:48,470 --> 03:53,960 We have purchased antivirus or anti-malware software and installed the same computer we need not worry, 03:53,990 --> 04:02,030 This is not so because there may be some phishing attacks or if you click on some, 04:04,300 --> 04:13,180 If you do not opt for best practices with regard to cybersecurity, you may fall trap into the cyber 04:13,180 --> 04:13,810 attacks, 04:15,150 --> 04:19,980 So there are many other myths in relation to cyber security, 04:20,010 --> 04:21,570 We should come up, 04:21,570 --> 04:25,080 We should leave that aside so that we, 04:26,090 --> 04:28,160 Can reduce the chances of, 04:29,020 --> 04:30,880 Cyber cyber attacks, 04:31,300 --> 04:39,850 Then we will the students will also understand that this cyber criminals launched attacks for money, 04:39,880 --> 04:44,560 They may also launch attack for getting revenge from someone, 04:44,770 --> 04:53,650 They there is cyber attack say for fun or some cyber criminals want they want to be recognized in the 04:53,650 --> 04:55,210 world of cyber criminals, 04:56,710 --> 05:02,290 There is also possibility that some state nations also carry out cyber attacks, 05:02,320 --> 05:03,760 On the other countries, 05:05,230 --> 05:05,770 This, 05:07,230 --> 05:15,720 Course, will also throw light on the emerging trends such as the targeted ransomware attacks are on 05:15,720 --> 05:16,740 the rise, 05:16,830 --> 05:26,730 Remote working is there, which is also causing a lot of problem with regard to cyber security of the 05:27,060 --> 05:30,780 remote work computers which are working remotely, 05:31,840 --> 05:39,430 Now, the more and more organizations are using the services of cloud for storing their data, 05:40,530 --> 05:43,020 There is problem with regard to cloud security, 05:44,090 --> 05:46,160 Then there is increase in the number of, 05:47,080 --> 05:48,910 Internet of Things devices, 05:49,680 --> 05:55,830 Which is also opening another door for the hackers, 05:58,910 --> 06:01,520 But then other such trends are also, 06:02,660 --> 06:03,200 Going on, 06:03,200 --> 06:05,060 Mobile is the latest target, 06:06,070 --> 06:14,620 Because normally we purchase antivirus or anti-malware software for our computers, but we do not take 06:14,620 --> 06:17,320 into consideration the security of the mobile phones, 06:18,080 --> 06:20,720 So the cyber criminals are laying more, 06:21,830 --> 06:28,820 Emphasis or the mobiles are the latest target because we mostly do most of our work on our computers 06:29,060 --> 06:35,060 or on our mobile phones for storing our personal information, for carrying out our business data, 06:35,060 --> 06:40,130 or for carrying out our business transactions online, such as online banking, 06:40,960 --> 06:46,900 The students will also understand that cyber security covers many areas such as network security, Web 06:46,900 --> 06:50,500 security, wireless network security, mobile security, 06:50,590 --> 06:53,980 Cyber Security also covers incident response plan, 06:55,150 --> 07:00,430 The incident response plan should be in place before the incident occurs, 07:00,940 --> 07:08,500 The organization have to devise an incident response team who is responsible for carrying out the incident 07:08,500 --> 07:09,640 response process, 07:09,940 --> 07:17,080 The students will learn What is the incident response process we have discussed, 07:17,230 --> 07:22,720 We will discuss in this course incident response plan process in detail, 07:23,670 --> 07:31,650 Within this process will be in general and the same the incident response process can vary as per the, 07:33,100 --> 07:35,980 Circumstances and the needs of the organization, 07:36,010 --> 07:43,240 The students will also understand that the organizations may have to comply with cybersecurity regulations 07:43,240 --> 07:44,710 and standards, 07:49,210 --> 07:50,580 Thanks for watching, 07:50,590 --> 07:57,220 If you like our course, please spare some time to give a star rating to our course, 7997

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.