Lynda – CISA Cert Prep 4 IT Operations Maintenance and Service Delivery for IS Auditors

Lynda – CISA Cert Prep: 4 IT Operations Maintenance and Service Delivery for IS Auditors
English | Size: 131.21 MB
Category: E-learning | others

Earning a CISA certification validates your ability to audit, control, and monitor information systems. Our test prep series tackles the exam one domain at a time, helping you acquire all the skills you need to confidently manage IT security audits. CISA Cert Prep: 4 teaches IT operations, maintenance, and service delivery. Get an overview of information system architectures, hardware, software, and networking, as well as details about wireless and cloud-based technology and disaster recovery. Instructor Michael Lester wraps up with an overview of the auditing process for IT networks. [Read more…]

SSCP Cert Prep: 2 Security Operations and Administration (05/2018) | Mike Chapple | LYNDA

SSCP Cert Prep: 2 Security Operations and Administration (05/2018) | Mike Chapple | LYNDA
English | Size: 422.31 MB
Category: Tutorial

The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain. In this installment, Mike covers the objectives of Security Operations and Administration, the second domain, which comprises 17% of the questions on the exam. Topics include the security triad, data security, security controls, and compliance training. Learn about core concepts and the security code of ethics, and find out how to document controls, start asset and change management programs, conduct security awareness and training, implement physical controls, and assess the compliance of your organization. [Read more…]

SANS SEC564 Red Team Operations and Threat Emulation

SANS SEC564: Red Team Operations and Threat Emulation
English | Size: 60.93 MB
Category: CBTs

Red Teaming is the process of using tactics, techniques, and procedures (TTPs) to emulate real-world threats to train and measure the effectiveness of the people, processes, and technology used to defend environments. Built on the fundamentals of penetration testing, Red Teaming uses a comprehensive approach to gain insight into an organization’s overall security to test its ability to detect, respond to, and recover from an attack. When properly conducted, Red Team activities significantly improve an organization’s security controls, help hone defensive capabilities, and measure the effectiveness of security operations. [Read more…]

CISSP Cert Prep: 7 Security Operations (2018) | Mike Chapple | LYNDA

CISSP Cert Prep: 7 Security Operations (2018) | Mike Chapple | LYNDA
English | Size: 301.63 MB
Category: Tutorial

Prepare for the Certified Information Systems Security Professional (CISSP) exam and gain crucial knowledge about best practices in security operations. Mike Chapple walks through each topic in the seventh domain of the CISSP exam. He explains how to conduct and support investigations, find evidence using forensics, and report and document security incidents. In addition, Mike goes into logging and monitoring activities, resource security, and security principles, as well as the importance of incident response and emergency management programs. This course-along with the others in this nine-part series-prepare you for the CISSP exam and provide you with a solid foundation for a career in information security. [Read more…]

Pluralsight | Network Management and Operations | Ross Bagurdes

Pluralsight | Network Management and Operations | Ross Bagurdes
English | Size: 327.60 MB
Category: CBTs

Networking hardware often fails, and requires policies, protocols, and monitoring to keep a data network in optimal shape. This course will teach you the policies and tools engineers use to keep networks up and running

Understanding the vocabulary, protocol operation, and hardware configuration is surprisingly only a small component of maintaining an enterprise data network. In this course, Network Management and Operations, you will learn how data moves through systems and how to reliably and securely keep the network moving data. First, you will learn about different types of network documentation. Next, you will learn about the mechanisms that keep systems working, even when a device fails. Finally, you will explore the tools used to monitor the state of network devices. By the end of this course, you will understand the secure mechanism engineers use to access network hardware, as well as, understand the difference between a hot, cold, and warm data center site.
[Read more…]

Packt – Working with Advanced Docker Operations

Packt – Working with Advanced Docker Operations
English | Size: 1.05 GB
Category: CBTs

Find and build images and successfully run your programs within containers
Discover the fundamentals of Kubernetes – manage containers across a cluster of hosts
Explore Kubernetes and how it can simplify the way you configure your clusters and networks
In Detail [Read more…]

SANS – SEC564 Red Team Operations and Threat Emulation [PDF 2017]

SANS – SEC564: Red Team Operations and Threat Emulation [PDF 2017]
English | Size: 60.93 MB
Category: Security

Red Teaming is the process of using tactics, techniques, and procedures (TTPs) to emulate real-world threats to train and measure the effectiveness of the people, processes, and technology used to defend environments. Built on the fundamentals of penetration testing, Red Teaming uses a comprehensive approach to gain insight into an organization’s overall security to test its ability to detect, respond to, and recover from an attack. When properly conducted, Red Team activities significantly improve an organization’s security controls, help hone defensive capabilities, and measure the effectiveness of security operations. [Read more…]

Packt Publishing – Working with Advanced Docker Operations

Packt Publishing – Working with Advanced Docker Operations
English | Size: 1.05 GB
Category: Programming | Cloud-Comp | Networking | others

Docker has been a game changer when it comes to virtualization. It provides a fast and robust way to deploy application. It makes it easy to build and deploy applications reliable, repeatable and fast.In this video course you will learn how to manage Kubernetes to manage containers across a cluster of hosts.Next it will teach you how to monitor the health of a Docker cluster. Along the way, you will learn how to deploy your application that can be quickly scaled to meet load needs and be upgraded with little or no downtime. Next, we’ll guide you on how to configure the Docker daemon, troubleshooting containers and images. We’ll also teach you how to use continuous integration techniques to automatically build and test Docker images. Moving on, we will discuss use cases for containers. Each use case will highlight a particular problem and how Docker helps to solve it.Finally, you will learn how to use Kubernetes orchestration system, how to monitor your Docker cluster, How to automate your application to build, test and deploy. [Read more…]

Packt Publishing – Working with Advanced Docker Operations

Packt Publishing – Working with Advanced Docker Operations
English | Size: 1.05 GB
Category: Programming | Cloud-Comp | Networking | others

Docker has been a game changer when it comes to virtualization. It provides a fast and robust way to deploy application. It makes it easy to build and deploy applications reliable, repeatable and fast.In this video course you will learn how to manage Kubernetes to manage containers across a cluster of hosts.Next it will teach you how to monitor the health of a Docker cluster. Along the way, you will learn how to deploy your application that can be quickly scaled to meet load needs and be upgraded with little or no downtime. Next, we’ll guide you on how to configure the Docker daemon, troubleshooting containers and images. We’ll also teach you how to use continuous integration techniques to automatically build and test Docker images. Moving on, we will discuss use cases for containers. Each use case will highlight a particular problem and how Docker helps to solve it.Finally, you will learn how to use Kubernetes orchestration system, how to monitor your Docker cluster, How to automate your application to build, test and deploy. [Read more…]

Packt Publishing – ServiceNow IT Operations Management

Packt Publishing – ServiceNow IT Operations Management
English | Size: 431.94 MB
Category: Tutorial

A step-by-step learning guide to help readers implement ServiceNow IT Operations Management for their organizations.

ServiceNow ITOM enables infrastructure and processes to be managed in a highly automated manner. It contains various segments that ensure its applications and enterprise infrastructures are optimized for high performance and helps in creating a lean and agile organization through service level visibility and automation.
[Read more…]