VMware vRealize Operations Manager 7.5

VMware vRealize Operations Manager 7.5
English | Size: 10.24 GB
Category: VMware | others

The vRealize Operations Manager 7.5 release focuses on ease of use, faster time to value, and extensibility to your environment through new and enhanced integrations. Alongside the existing pillars of performance, capacity, configuration, and compliance, this release also brings in new features around application-aware monitoring and troubleshooting, which helps you manage your multi-cloud environments, hosting both traditional and modern applications.
[Read more…]

PLURALSIGHT SECURITY OPERATIONS

PLURALSIGHT SECURITY OPERATIONS
English | Size: 170.58 MB
Category: Tutorial

All the elements of a security program come down to the need to have a secure operations process. In this course Security Operations, you will explore the core requirements of implementing the processes to manage an operational security team. First, you will learn about operations functions, then about incident management and business continuity. Next, you will discover change management and secure configurations. Finally, you will explore the topics of backups and media management. By the end of this course you will have the knowledge needed to implement an information security management program and to be a skilled information security manager [Read more…]

Livelessons-Linux Web Operations Complete Video Course

Livelessons-Linux Web Operations Complete Video Course
English | Size: 8.12 GB
Category: Tutorial

Linux is a Unix-like operating system that is largely compatible with the Pazix standard. From a technical point of view, Linux is the only name for the operating system’s core, not its entirety. The nucleus first published in 1991 by Linus Torvalds. But this is commonly referred to as operating systems that come from the Linux compilation (as the core of the operating system) with open source and open source software. While the Free Software Foundation called the GNU / Linux operating system the same, but as usual, it’s called Linux. This dichotomy has led to the naming of GNU / Linux. Linux supports a variety of hardware, including Linux Watch, cell phones, tablets, routers, and game consoles to desktop computers, large computers and supercomputers. [Read more…]

Lynda – CISA Cert Prep 4 IT Operations Maintenance and Service Delivery for IS Auditors

Lynda – CISA Cert Prep: 4 IT Operations Maintenance and Service Delivery for IS Auditors
English | Size: 131.21 MB
Category: E-learning | others

Earning a CISA certification validates your ability to audit, control, and monitor information systems. Our test prep series tackles the exam one domain at a time, helping you acquire all the skills you need to confidently manage IT security audits. CISA Cert Prep: 4 teaches IT operations, maintenance, and service delivery. Get an overview of information system architectures, hardware, software, and networking, as well as details about wireless and cloud-based technology and disaster recovery. Instructor Michael Lester wraps up with an overview of the auditing process for IT networks. [Read more…]

SSCP Cert Prep: 2 Security Operations and Administration (05/2018) | Mike Chapple | LYNDA

SSCP Cert Prep: 2 Security Operations and Administration (05/2018) | Mike Chapple | LYNDA
English | Size: 422.31 MB
Category: Tutorial

The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain. In this installment, Mike covers the objectives of Security Operations and Administration, the second domain, which comprises 17% of the questions on the exam. Topics include the security triad, data security, security controls, and compliance training. Learn about core concepts and the security code of ethics, and find out how to document controls, start asset and change management programs, conduct security awareness and training, implement physical controls, and assess the compliance of your organization. [Read more…]

SANS SEC564 Red Team Operations and Threat Emulation

SANS SEC564: Red Team Operations and Threat Emulation
English | Size: 60.93 MB
Category: CBTs

Red Teaming is the process of using tactics, techniques, and procedures (TTPs) to emulate real-world threats to train and measure the effectiveness of the people, processes, and technology used to defend environments. Built on the fundamentals of penetration testing, Red Teaming uses a comprehensive approach to gain insight into an organization’s overall security to test its ability to detect, respond to, and recover from an attack. When properly conducted, Red Team activities significantly improve an organization’s security controls, help hone defensive capabilities, and measure the effectiveness of security operations. [Read more…]

CISSP Cert Prep: 7 Security Operations (2018) | Mike Chapple | LYNDA

CISSP Cert Prep: 7 Security Operations (2018) | Mike Chapple | LYNDA
English | Size: 301.63 MB
Category: Tutorial

Prepare for the Certified Information Systems Security Professional (CISSP) exam and gain crucial knowledge about best practices in security operations. Mike Chapple walks through each topic in the seventh domain of the CISSP exam. He explains how to conduct and support investigations, find evidence using forensics, and report and document security incidents. In addition, Mike goes into logging and monitoring activities, resource security, and security principles, as well as the importance of incident response and emergency management programs. This course-along with the others in this nine-part series-prepare you for the CISSP exam and provide you with a solid foundation for a career in information security. [Read more…]

Packt – Working with Advanced Docker Operations

Packt – Working with Advanced Docker Operations
English | Size: 1.05 GB
Category: CBTs

Find and build images and successfully run your programs within containers
Discover the fundamentals of Kubernetes – manage containers across a cluster of hosts
Explore Kubernetes and how it can simplify the way you configure your clusters and networks
In Detail [Read more…]

SANS – SEC564 Red Team Operations and Threat Emulation [PDF 2017]

SANS – SEC564: Red Team Operations and Threat Emulation [PDF 2017]
English | Size: 60.93 MB
Category: Security

Red Teaming is the process of using tactics, techniques, and procedures (TTPs) to emulate real-world threats to train and measure the effectiveness of the people, processes, and technology used to defend environments. Built on the fundamentals of penetration testing, Red Teaming uses a comprehensive approach to gain insight into an organization’s overall security to test its ability to detect, respond to, and recover from an attack. When properly conducted, Red Team activities significantly improve an organization’s security controls, help hone defensive capabilities, and measure the effectiveness of security operations. [Read more…]

Packt Publishing – Working with Advanced Docker Operations

Packt Publishing – Working with Advanced Docker Operations
English | Size: 1.05 GB
Category: Programming | Cloud-Comp | Networking | others

Docker has been a game changer when it comes to virtualization. It provides a fast and robust way to deploy application. It makes it easy to build and deploy applications reliable, repeatable and fast.In this video course you will learn how to manage Kubernetes to manage containers across a cluster of hosts.Next it will teach you how to monitor the health of a Docker cluster. Along the way, you will learn how to deploy your application that can be quickly scaled to meet load needs and be upgraded with little or no downtime. Next, we’ll guide you on how to configure the Docker daemon, troubleshooting containers and images. We’ll also teach you how to use continuous integration techniques to automatically build and test Docker images. Moving on, we will discuss use cases for containers. Each use case will highlight a particular problem and how Docker helps to solve it.Finally, you will learn how to use Kubernetes orchestration system, how to monitor your Docker cluster, How to automate your application to build, test and deploy. [Read more…]

Skip to toolbar