INE-Advanced Malware Protection

INE-Advanced Malware Protection
English | Size: 384.58 MB
Category: Cisco | Networking | Security


This episode of the INE’s CCIE Security v5 Technology series focuses on Advanced Malware Protection (AMP) – an optional feature designed for continuous file monitoring, sandboxing and real-time malware blocking. By completing this course, you will know how to use and integrate AMP with web, email and firepower threat defense security appliances. [Read more…]

Packt General Data Protection Regulation Foundation GDPR F

Packt General Data Protection Regulation Foundation GDPR F
English | Size: 1.33 GB
Category: Tutorial

GDPR Foundation training enables you to learn the basic elements to implement and manage a compliance framework with regard to the protection of personal data. During this training course, you will understand fundamental privacy principles and become familiar with the role of the Data Protection Officer.
[Read more…]

Cyber Security – Endpoint protection

Cyber Security – Endpoint protection
English | Size: 2.83 GB
Category: CBTs

Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of laptops, tablets, mobile phones and other wireless devices to corporate networks creates attack paths for security threats.[1][2] Endpoint security attempts to ensure that such devices follow a definite level of compliance to standards.[3]
[Read more…]

Network Foundation Protection Management Plane

Network Foundation Protection Management Plane
English | Size: 3.25 GB
Category: Tutorial

Network Foundation Protection is a security framework that provides strategies to protect three functional areas of a device: Management Plane, Control Plane, and Data Plane. In this course we will focus on the Management Plane functionality and we will look at ways to protect and secure management access to network devices. We will compare the pros and cons of using an in-band vs an out-of-band management network and we will learn how to use network management protocols such as SNMP, NTP, SCP, RADIUS, TACACS+, Telnet, SSH, HTTP, and HTTPS to name a few. We will also learn the difference between the Cisco ACS and ISE servers and configure TACACS+ on ISE and an IOS device to provide with AAA for device administration. As a bonus, we will look at commonly used tools that can help you determine Cisco product vulnerabilities, best recommended software, and how to search bugs. [Read more…]

Pluralsight – Design a Data Protection Strategy with Microsoft Azure

Pluralsight – Design a Data Protection Strategy with Microsoft Azure
English | Size: 253.63 MB
Category: Cloud-Comp | E-learning | Microsoft | others

This course explores the key aspects and solutions related to designing a data protection strategy for your organization using Azure services.

Understanding all the aspects of data protection and addressing can be complex. In this course, Design a Data Protection Strategy with Microsoft Azure, you will learn the foundational knowledge necessary to design a data protection strategy using Azure services. First, you will learn key considerations related to data protection. Next, you will discover encryption options for all stages of the data lifecycle. Finally, you will explore how to add performance and availability requirements for data in Microsoft cloud services. When you’re finished with this course, you will have the skills and knowledge of data protection needed to design a strategy for your organization’s data in Microsoft Azure. [Read more…]

Packt – Cybersecurity Methods of Protection Blue Team Activity Oct2018

Packt – Cybersecurity Methods of Protection_Blue Team Activity Oct2018
English | Size: 1.2 GB
Category: Tutorial

Cyber threats and attacks are becoming more common, sophisticated, and damaging. The Alliance is faced with an evolving complex threat environment. State and non-state actors can use cyber attacks in the context of military operations.
[Read more…]

INE – Implementing vSphere Data Protection Replication

INE – Implementing vSphere Data Protection Replication
English | Size: 395.6 MB
Category: Cloud-Comp | E-learning | Networking | VMware

In this course you will learn about the benefits, the architecture, the requirements and limitations of vSphere Data Protection. We will cover the deployment and configuration of vSphere Data Protection. This is followed by demonstration of the creation of backup jobs, backup data replication and application backup configurations. You will then learn about restoring virtual machines, performing File Level Restore and how to perform vSphere Data Protection Emergency Restore. Next, youíll learn about the benefits and the architecture of vSphere Replication. We will also cover the deployment and configuration of the vSphere Replication Appliance, as well as the setting of a Disaster Recovery site to act as a vSphere Replication target. Finally, you will learn how to configure replications and how to recover virtual machines. [Read more…]

INE – Implementing vSphere Data Protection Replication

INE – Implementing vSphere Data Protection Replication
English | Size: 395.6 MB
Category: Cloud-Comp | E-learning | Networking | VMware

In this course you will learn about the benefits, the architecture, the requirements and limitations of vSphere Data Protection. We will cover the deployment and configuration of vSphere Data Protection. This is followed by demonstration of the creation of backup jobs, backup data replication and application backup configurations. You will then learn about restoring virtual machines, performing File Level Restore and how to perform vSphere Data Protection Emergency Restore. Next, youíll learn about the benefits and the architecture of vSphere Replication. We will also cover the deployment and configuration of the vSphere Replication Appliance, as well as the setting of a Disaster Recovery site to act as a vSphere Replication target. Finally, you will learn how to configure replications and how to recover virtual machines. [Read more…]

ITPRO TV – General Data Protection Regulation (GDPR)

ITPRO TV – General Data Protection Regulation (GDPR)
English | Size: 3.13 GB
Category: Tutorial

In April of 2016, the European Commission published a data protection package to reform, modernize and harmonize European data protection law. The cornerstone of the package is the General Data Protection Regulation (GDPR) which will replace the 1995 Data Protection Directive and, in the UK, the Data Protection Act 1998. This overview highlights the key themes of the General Data Protection Regulation (GDPR) to help organizations understand the new legal framework in the EU. It is for those who have day-to-day responsibility for data protection. [Read more…]

Lynda – Cybersecurity Awareness – The Protection and Destruction of Portable Data

Lynda – Cybersecurity Awareness – The Protection and Destruction of Portable Data
English | Size: 101.50 MB
Category: CBTs

Our valued, portable data assets benefit from intentional scrutiny and governance guidelines about how each should be preserved, protected, and destroyed. This course is for anyone who has data assets that are not contained in a locked file cabinet. It may also have relevance to those who have hard copy documents, but who have not considered how those documents should be managed. Here, learn about the different states of data, and how individuals and organizations can protect their portable data that’s at risk. Upon completing this course, you’ll have the knowledge you need to design and implement your own data management plan [Read more…]

Skip to toolbar