PS – Deploying, Administering, and Securing Palo Alto Firewalls

PS – Deploying, Administering, and Securing Palo Alto Firewalls
English | Size: 358.46 MB
Category: Programming | E-learning | Networking | others

Now, more than ever before, there are more sophisticated threats geared towards enterprise networks and disrupting their day-to-day business, requiring a comprehensive solution to mitigate and prevent these attacks. In this course, Deploying, Administering, and Securing Palo Alto Firewalls, you will gain the ability to protect your network using Palo Alto’s Next Generation Firewall. First, you will learn how firewalls have evolved over the years to combat ever changing threats, and how Palo Alto is leading the way. Next, you will discover how to deploy the firewall out-of-the-box and configure administrative and back-end settings. Lastly, you will explore how to setup routing, create security zones, addresses, applications and service objects, and how to tie it all together into a security policy to shape your network’s traffic. When you are finished with this course, you will have the skills and knowledge of a Network Security Engineer needed to administer Palo Alto’s Next Generation Firewall. [Read more…]

Pluralsight – Securing Docker Containers

Pluralsight – Securing Docker Containers
English | Size: 498.97 MB
Category: Tutorial

Docker containers are a mainstream mechanism for application delivery, and securing the container workload is vital. This course will give you the knowledge and techniques you need for securing containerized software applications. [Read more…]

SANS SEC 506 Securing LinuxUnix

SANS SEC 506: Securing Linux/Unix
English | Size: 214.38 MB
Category: CBTS

SEC506: Securing Linux/Unix provides in-depth coverage of Linux and Unix security issues that includes specific configuration guidance and practical, real-world examples, tips, and tricks. We examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and applications that commonly run on Linux and Unix. [Read more…]

Oreilly – Securing Microservices Protect Sensitive Data in Transit and at Rest

Oreilly – Securing Microservices Protect Sensitive Data in Transit and at Rest
English | Size: 0.99 GB
Category: CBTs

Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. If done well, microservice architectures can be significantly more secure than other types of software, but if approached in a naive fashion, you can end up with a less secure, more compromised system. This video provides the sophisticated knowledge you need to create secure architectures from the ground up. The course works best for participants who understand what microservices are and who have some experience working with distributed systems. [Read more…]

OREILLY Securing Microservices Protect Sensitive Data in Transit and at Rest-RiDWARE

OREILLY Securing Microservices Protect Sensitive Data in Transit and at Rest-RiDWARE
English | Size: 3.19 GB
Category: Tutorial

Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. [Read more…]

Sans 506 Securing Linux Unix PDF v2017

Sans 506 Securing Linux Unix PDF v2017
English | Size: 214.38 MB
Category: HACKING | Linux | Security

SEC506: Securing Linux/Unix provides in-depth coverage of Linux and Unix security issues that includes specific configuration guidance and practical, real-world examples, tips, and tricks. We examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and applications that commonly run on Linux and Unix. [Read more…]

SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 Ondemand Videos Part 2

SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 Ondemand Videos Part 2
English | Size: 1.27 GB
Category: Tutorial

Hackers know how to use PowerShell for evil. Do you know how to use it for good? In SEC505 you will learn how to use PowerShell to automate Windows security management across an Active Directory enterprise and in the cloud. Don’t just learn PowerShell syntax, learn how to leverage PowerShell as a platform for security. [Read more…]

SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos

SANS SEC505: Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos
English | Size: 3.87 GB
Category: Tutorial

Hackers know how to use PowerShell for evil. Do you know how to use it for good? In SEC505 you will learn how to use PowerShell to automate Windows security management across an Active Directory enterprise and in the cloud. Don’t just learn PowerShell syntax, learn how to leverage PowerShell as a platform for security. [Read more…]

SANS 506 – Securing Linux & UNIX

SANS 506 – Securing Linux & UNIX
English | Size: 10.72 GB
Category: CBTs

[Read more…]

Lynda – Securing Windows Server 2016 – Server Hardening Solutions

Lynda – Securing Windows Server 2016 – Server Hardening Solutions
English | Size: 139.68 MB
Category: Tutorial

Maintaining a secure server environment is one of the most crucial tasks for professionals charged with administering enterprise networks. In this course, learn about server hardening solutions for Windows Server 2016. Ed Liberman explains how to configure file and disk encryption, as well as how to configure patches and updates. Plus, he covers implementing antimalware. [Read more…]