Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity Best Practices for the MSP
Introduction
Welcome to SquareOne Security (3:47)
README
Cybersecurity for the SMB: Then and Now (20:01)
What Does Good Security Look Like?
Why Use a Cybersecurity Framework? (1:28)
CIS Critical Security Controls Overview (5:29)
NIST Cybersecurity Framework Core (6:54)
NIST Cybersecurity Framework Tiers (5:57)
NIST Cybersecurity Framework Profiles (6:21)
Understanding Cyber Attacks (11:44)
Other Frameworks from U.K. and Australia (14:26)
Basic CIS Controls Deep Dive (13:26)
Building Your Security Practice
Simple Cybersecurity Assessments (2:31)
The Security Triangle (12:16)
Services Agreements: Security Essentials (13:28)
Services Agreements: Advanced Security (9:51)
Assume Breach (4:56)
Understanding Incident Response (15:50)
Getting Started With Your Security Practice (15:15)
Sales: Overcoming Myths and Common Objections (7:24)
Your Next Steps (3:08)
Thank you
Continuing the conversation (0:14)
Cybersecurity for the SMB: Then and Now
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock