INE CCNP Security Course

INE CCNP Security Course
English | Size: 4.69 GB
Category: Tutorial

CCNP Security Course

2018-03-29: I N F O:

This recorded Bootcamp-style course includes almost 20 hours of instruction in the key technologies involved in CCNP Security covering technology overviews, configuration, verification, and troubleshooting. [Read more…]

PLURALSIGHT SOFTWARE DEVELOPMENT SECURITY

PLURALSIGHT SOFTWARE DEVELOPMENT SECURITY
English | Size: 301.09 MB
Category: Tutorial

Most companies have a well-oiled machine with the sole purpose to create, release, and maintain functional software. Still, the growing concerns and risks related with insecure software have brought increased attention to the need to mix security into the development process. In this course, Secure Software Development, you will gain an understanding of the Software Development Life Cycle (SDLC) and the security implications that can arise to ensure that the software your organization uses is well written and secure through its lifespan. First, you will learn about the different options when it comes to following a SDLC. Next, you will delve into the 5 phases that software runs through as it is being developed. Last, you will dive into how vulnerabilities creep into your environment in ways you may have not considered. By the end of this course, you will be able to apply a proper SDLC and ensure that additional attack vectors aren’t created by mistake (or on purpose) to expose your resources and networks. [Read more…]

LINKEDIN LEARNING MICROSOFT AZURE SECURITY CENTER SECURING CLOUD RESOURCES

LINKEDIN LEARNING MICROSOFT AZURE SECURITY CENTER SECURING CLOUD RESOURCES
English | Size: 223.66 MB
Category: Tutorial

Microsoft Azure Security Center was designed to help you monitor security across hybrid cloud workflows, as well as detect-and quickly react to-threats. In this course, instructor Martynas Valkunas helps you deepen your understanding of how Microsoft Azure Security Center can help you keep your cloud resources safe from attackers. Martynas details how to work with the Azure Security Center console and fully utilize its functionality, as well as how to set up resources and leverage advanced cloud defense capabilities. He also shares a variety of cloud security best practices, providing recommendations for Azure data security, SQL security, network security, and more. [Read more…]

LINKEDIN LEARNING SECURITY TIPS WEEKLY UPDATE 20190311

LINKEDIN LEARNING SECURITY TIPS WEEKLY UPDATE 20190311
English | Size: 259.71 MB
Category: Tutorial

Security isn’t just a concern for the tech savvy among us. It matters to everyone with a digital footprint. In this weekly series, instructor Scott Simpson shares practical tips that can help anyone broaden their knowledge of security-no technical pedigree required. Scott dives into topics ranging from password managers to phishing emails, sharing strategies and tools that can help you become more aware of your own security and how to keep your information safe. Tune in every Monday for a brand-new tip.

Note: Because this is an ongoing series, viewers will not receive a certificate of completion. [Read more…]

LINKEDIN LEARNING SECURITY TIPS WEEKLY UPDATE 20190304

LINKEDIN LEARNING SECURITY TIPS WEEKLY UPDATE 20190304
English | Size: 255.39 MB
Category: Tutorial

Security isn’t just a concern for the tech savvy among us. It matters to everyone with a digital footprint. In this weekly series, instructor Scott Simpson shares practical tips that can help anyone broaden their knowledge of security-no technical pedigree required. Scott dives into topics ranging from password managers to phishing emails, sharing strategies and tools that can help you become more aware of your own security and how to keep your information safe. Tune in every Monday for a brand-new tip.

Note: Because this is an ongoing series, viewers will not receive a certificate of completion.
[Read more…]

LEARNING SECURITY TESTING VULNERABILITY MANAGEMENT WITH NESSUS

LEARNING SECURITY TESTING VULNERABILITY MANAGEMENT WITH NESSUS
English | Size: 235.70 MB
Category: Tutorial

It only takes one misconfigured device or missing patch for hackers to infiltrate your network. Fix the flaws in your systems before attackers can find them with Nessus, the network vulnerability scanner popular among cybersecurity analysts, sys admins, and network engineers. Using Nessus, you can scan servers, endpoints, and other network devices and check them against a database of thousands of known vulnerabilities. In this course, instructor Mike Chapple teaches you how to install Nessus, configure scans, and interpret the output. He explains how to create a vulnerability management program as well as a remediation workflow that will help you detect, understand, and resolve vulnerabilities before they are exploited. [Read more…]

INE CCNP Security Course

INE CCNP Security Course
English | Size: 4.69 GB
Category: Tutorial

CCNP Security Course

2018-03-29: I N F O:

This recorded Bootcamp-style course includes almost 20 hours of instruction in the key technologies involved in CCNP Security covering technology overviews, configuration, verification, and troubleshooting. [Read more…]

Cyber Security – Endpoint protection

Cyber Security – Endpoint protection
English | Size: 2.83 GB
Category: CBTs

Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of laptops, tablets, mobile phones and other wireless devices to corporate networks creates attack paths for security threats.[1][2] Endpoint security attempts to ensure that such devices follow a definite level of compliance to standards.[3]
[Read more…]

Become an IT Security Specialist (complete path)

Become an IT Security Specialist (complete path)
English | Size: 2.87 GB
Category: CBTs

Learn the core concepts needed to secure your organization’s network as an IT security specialist. In this learning path, you’ll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response.
[Read more…]

The Absolute Beginners Guide to Cyber Security 2019 – Part 2

The Absolute Beginners Guide to Cyber Security 2019 – Part 2
English | Size: 5.03 GB
Category: CBTs

Take your basic knowledge of cyber security to a whole new level with this exciting course that promises to be educational, informative and fun filled.

Build upon a basic foundation in Cyber Security with a strong focus on the following core topics.

Networking [Read more…]

Skip to toolbar