OREILLY Securing Microservices Protect Sensitive Data in Transit and at Rest-RiDWARE

OREILLY Securing Microservices Protect Sensitive Data in Transit and at Rest-RiDWARE
English | Size: 3.19 GB
Category: Tutorial

Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. [Read more…]

Sans 506 Securing Linux Unix PDF v2017

Sans 506 Securing Linux Unix PDF v2017
English | Size: 214.38 MB
Category: HACKING | Linux | Security

SEC506: Securing Linux/Unix provides in-depth coverage of Linux and Unix security issues that includes specific configuration guidance and practical, real-world examples, tips, and tricks. We examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and applications that commonly run on Linux and Unix. [Read more…]

SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 Ondemand Videos Part 2

SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 Ondemand Videos Part 2
English | Size: 1.27 GB
Category: Tutorial

Hackers know how to use PowerShell for evil. Do you know how to use it for good? In SEC505 you will learn how to use PowerShell to automate Windows security management across an Active Directory enterprise and in the cloud. Don’t just learn PowerShell syntax, learn how to leverage PowerShell as a platform for security. [Read more…]

SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos

SANS SEC505: Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos
English | Size: 3.87 GB
Category: Tutorial

Hackers know how to use PowerShell for evil. Do you know how to use it for good? In SEC505 you will learn how to use PowerShell to automate Windows security management across an Active Directory enterprise and in the cloud. Don’t just learn PowerShell syntax, learn how to leverage PowerShell as a platform for security. [Read more…]

SANS 506 – Securing Linux & UNIX

SANS 506 – Securing Linux & UNIX
English | Size: 10.72 GB
Category: CBTs

[Read more…]

Lynda – Securing Windows Server 2016 – Server Hardening Solutions

Lynda – Securing Windows Server 2016 – Server Hardening Solutions
English | Size: 139.68 MB
Category: Tutorial

Maintaining a secure server environment is one of the most crucial tasks for professionals charged with administering enterprise networks. In this course, learn about server hardening solutions for Windows Server 2016. Ed Liberman explains how to configure file and disk encryption, as well as how to configure patches and updates. Plus, he covers implementing antimalware. [Read more…]

Pluralsight – Securing Windows Server 2016 Virtualization

Pluralsight – Securing Windows Server 2016 Virtualization
English | Size: 367.21 MB
Category: CBTs

Hyper-V is an excellent application that comes in Windows Server 2016 Standard and Enterprise. By default, there isn’t a lot of security unless you add it using the built-in tools that come with the server. However, you need to figure out which tools you should use and how to configure them. In this course, Securing Windows Server 2016 Virtualization, you’ll learn foundational knowledge needed to gain the ability to secure your virtual machines using a variety of tools. First, you will learn how to harden your virtual machine infrastructure. Next, you’ll learn encryption and enterprise firewall skills. Finally, you’ll learn how to avoid giving too many rights to too many people. When you’re finished with this course, you will have the skills and knowledge of securing your virtual machine environment needed to protect your clients. [Read more…]

506 Securing Linux UNIX

506 Securing Linux UNIX
English | Size: 12.41 GB
Category: Tutorial

Experience in-depth coverage of Linux and Unix security issues. Examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and applications that commonly run on Linux and Unix. This course provides specific configuration guidance and practical, real-world examples, tips, and tricks. [Read more…]

[Pluralsight] Securing Windows Server 2016 Virtualization

[Pluralsight] Securing Windows Server 2016 Virtualization
English | Size: 369 MB
Category: CBTs

Hyper-V is an excellent application that comes in Windows Server 2016 Standard and Enterprise. By default, there isn’t a lot of security unless you add it using the built-in tools that come with the server. However, you need to figure out which tools you should use and how to configure them. In this course, Securing Windows Server 2016 Virtualization, you’ll learn foundational knowledge needed to gain the ability to secure your virtual machines using a variety of tools. First, you will learn how to harden your virtual machine infrastructure. Next, you’ll learn encryption and enterprise firewall skills. Finally, you’ll learn how to avoid giving too many rights to too many people. When you’re finished with this course, you will have the skills and knowledge of securing your virtual machine environment needed to protect your clients. [Read more…]

Pluralsight – Securing Cloud DevOps in PaaS, IaaS, and SaaS Settings

Pluralsight – Securing Cloud DevOps in PaaS, IaaS, and SaaS Settings
English | Size: 317.87 MB
Category: Tutorial

The adoption and usage of DevOps tools such as Docker and Kubernetes has more than doubled. Find out why learning DevOps will be a requirement for every cyber security professional in order to compete in the cloud economy. In this course, Securing Cloud DevOps in PaaS, IaaS, and SaaS Settings, you’ll learn how to apply operational security process automation in DevOps driven cloud environments such as AWS. First, you’ll explore how to secure PaaS, SaaS, and IaaS DevOps environments. [Read more…]