SSCP Cert Prep: 3 Risk Identification, Monitoring, and Analysis (2018) | Mike Chapple | LYNDA

SSCP Cert Prep: 3 Risk Identification, Monitoring, and Analysis (2018) | Mike Chapple | LYNDA
English | Size: 330.20 MB
Category: Tutorial

Jump start your career in IT by earning the (ISC)2 Systems Security Certified Practitioner (SSCP) certification. In this installment of the SSCP Cert Prep series, instructor Mike Chapple covers the objectives of Risk Identification, Monitoring, and Analysis, the third domain of the SSCP exam. Topics include quantitative risk assessment, risk visibility and reporting, vulnerability assessment tools, and security assessment techniques. In addition, learn about security information and event management (SIEM) systems, visualization and reporting, software testing, and more.
[Read more…]

Enterprise Pentesting Monitoring Art Hacking

Enterprise Pentesting Monitoring Art Hacking
English | Size: 1.50 GB
Category: CBTs

The Rough Cuts/Sneak Peek program provides early access to Pearson products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including post-production editing. [Read more…]

AWS MasterClass Monitoring and DevOps with AWS CloudWatch

AWS MasterClass Monitoring and DevOps with AWS CloudWatch
English | Size: 4.02 GB
Category: CBTs

What Will I Learn?
Learn how you can keep a close eye on AWS infrastructure you have using AWS CloudWatch
You will have everything you need to master on various alerting and monitoring services available from AWS
You will know about various AWS CloudWatch monitoring services such as EC2, RDS, EBS, ELB and you will be able to use them
Know about how you can use AWS SNS to send notifications
You will have a deep understanding about how to monitor your AWS billing and costs [Read more…]

Pluralsight – Linux Performance Monitoring and Tuning (Released 9 Jan 2018)

Pluralsight – Linux Performance Monitoring and Tuning (Released 9 Jan 2018)
English | Size: 301.25 MB
Category: E-learning | Linux | others

You’ve probably spent time worrying about the health and welfare of your Linux servers. Wouldn’t you love some insight into what’s really going going on under the hood and, more importantly, into setting up a monitoring protocol that will alert you quickly if things seem to be heading south again?
In Linux Performance Monitoring and Tuning, you will learn how to identify and manage the way application processes handle CPU, memory, network, and storage resources.
You will also learn to use and interpret tools like systemctl, top, iftop, nice, cgroups, and tc, how to monitor the performance of fleets of servers using Collectd, Nagios, and nmon. [Read more…]

O’Reilly – Monitoring and Improving the Performance of Machine Learning Models

O’Reilly – Monitoring and Improving the Performance of Machine Learning Models
English | Size: 863.79 MB
Category: CBTs

It’s critical to have “humans in the loop” when automating the deployment of machine learning (ML) models. Why? Because models often perform worse over time.

This course covers the human directed safeguards that prevent poorly performing models from deploying into production and the techniques for evaluating models over time. We’ll use ModelDB to capture the appropriate metrics that help you identify poorly performing models. We’ll review the many factors that affect model performance (i.e., changing users and user preferences, stale data, etc.) and the variables that lose predictive power. We’ll explain how to utilize classification and prediction scoring methods such as precision recall, ROC, and jaccard similarity. [Read more…]

SANS SEC511 Continuous Monitoring and Security Operations (PDF 2016)

SANS SEC511 Continuous Monitoring and Security Operations (PDF 2016)
English | Size: 253.41 MB
Category: E-learning | Networking | Security | others

We continue to underestimate the tenacity of our adversaries! Organizations are investing a significant amount of time and financial and human resources trying to combat cyber threats and prevent cyber attacks, but despite this tremendous effort organizations are still getting compromised. The traditional perimeter-focused, prevention-dominant approach to security architecture has failed to prevent intrusions. No network is impenetrable, a reality that business executives and security professionals alike have to accept. Prevention is crucial, and we can’t lose sight of it as the primary goal. However, a new proactive approach to security is needed to enhance the capabilities of organizations to detect threats that will inevitably slip through their defenses. SEC511: Continuous Monitoring and Security Operations will teach you how to strengthen your skills to undertake that proactive approach.
[Read more…]

SANS SEC511 Continuous Monitoring and Security Operations (2016) PDFs and MP3

SANS SEC511: Continuous Monitoring and Security Operations (2016) PDFs and MP3
English | Size: 818.04 MB
Category: Tutorial

We continue to underestimate the tenacity of our adversaries! Organizations are investing a significant amount of time and financial and human resources trying to combat cyber threats and prevent cyber attacks, but despite this tremendous effort organizations are still getting compromised. The traditional perimeter-focused, prevention-dominant approach to security architecture has failed to prevent intrusions. No network is impenetrable, a reality that business executives and security professionals alike have to accept.
[Read more…]

SANS AUD507 Auditing & Monitoring Networks, Perimeters & Systems (2016) PDFs

SANS AUD507: Auditing & Monitoring Networks, Perimeters & Systems (2016) PDFs
English | Size: 214.96 MB
Category: Network

One of the struggles that IT auditors face today is assisting management to understand the relationship between the technical controls and the risks to the business that these affect. In this course these threats and vulnerabilities are explained based on validated information from real world situations. The instructor will take the time to explain how this can be used to raise the awareness of management and others within the organization to build an understanding of why these controls specifically and auditing in general is important.
[Read more…]

SANS AUD507 Auditing & Monitoring Networks Perimeters & Systems (PDF 2016)

SANS AUD507 Auditing & Monitoring Networks Perimeters & Systems (PDF 2016)
English | Size: 214.96 MB
Category: E-learning | Networking | Security

One of the most significant obstacles facing many auditors today is how exactly to go about auditing the security of an enterprise. What systems really matter? How should the firewall and routers be configured? What settings should be checked on the various systems under scrutiny? Is there a set of processes that can be put into place to allow an auditor to focus on the business processes rather than the security settings? How do we turn this into a continuous monitoring process? All of these questions and more will be answered by the material covered in this course. [Read more…]

Pluralsight – Planning, Configuring, and Monitoring O365 Clients and Device

Pluralsight – Planning, Configuring, and Monitoring O365 Clients and Device
English | Size: 169.41 MB
Category: Tutorial

Office 365 provides a versatile and powerful suite of tools that allows you to access content anywhere, anytime, and from almost any device. In this course, Planning, Configuring, and Monitoring O365 Clients and Devices, you’ll be introduced to different types of products, features, and functionality that’s necessary to manage and deploy a suite of products from Office 365 to your users and devices. First, you’ll explore the two primary deployment options; user-based and IT-based, and what tools you’ll have as an IT Pro to configure, control, and manage the deployment of products like Office 365 ProPlus. [Read more…]