FileMood

Download [ CourseWikia.com ] Oreilly - Secure Operations and Protections, 2nd Edition

CourseWikia com Oreilly Secure Operations and Protections 2nd Edition

Name

[ CourseWikia.com ] Oreilly - Secure Operations and Protections, 2nd Edition

 DOWNLOAD Copy Link

Total Size

1.3 GB

Total Files

92

Last Seen

2024-12-21 00:44

Hash

878D9423C340EEE69E4A1A864DFA808D4B4AE78E

/

Get Bonus Downloads Here.url

0.2 KB

/~Get Your Files Here !/

Bonus Resources.txt

0.4 KB

/Introduction/

001. Secure Operations and Protections Introduction.en.srt

1.1 KB

001. Secure Operations and Protections Introduction.mp4

3.5 MB

/.../Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/

001. Learning objectives.en.srt

1.2 KB

001. Learning objectives.mp4

4.2 MB

002. 1.1 Log ingestion Part 1.en.srt

50.0 KB

002. 1.1 Log ingestion Part 1.mp4

106.0 MB

003. 1.2 Log ingestion Part 2.en.srt

56.1 KB

003. 1.2 Log ingestion Part 2.mp4

117.9 MB

004. 1.3 Operating system (OS) concepts.en.srt

22.7 KB

004. 1.3 Operating system (OS) concepts.mp4

52.0 MB

005. 1.4 Infrastructure concepts.en.srt

23.9 KB

005. 1.4 Infrastructure concepts.mp4

89.3 MB

006. 1.5 Network architecture.en.srt

23.4 KB

006. 1.5 Network architecture.mp4

50.1 MB

007. 1.6 Identity and access management.en.srt

43.0 KB

007. 1.6 Identity and access management.mp4

120.3 MB

008. 1.7 Encryption.en.srt

34.6 KB

008. 1.7 Encryption.mp4

76.0 MB

009. 1.8 Sensitive data protection.en.srt

8.9 KB

009. 1.8 Sensitive data protection.mp4

22.0 MB

/.../Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/

001. Learning objectives.en.srt

0.7 KB

001. Learning objectives.mp4

2.7 MB

002. 2.1 Standardize processes.en.srt

13.0 KB

002. 2.1 Standardize processes.mp4

34.3 MB

003. 2.2 Streamline operations.en.srt

7.1 KB

003. 2.2 Streamline operations.mp4

19.2 MB

004. 2.3 Technology and tool integration.en.srt

22.9 KB

004. 2.3 Technology and tool integration.mp4

87.1 MB

/.../Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/

001. Learning objectives.en.srt

1.2 KB

001. Learning objectives.mp4

4.4 MB

002. 3.1 Cross-site scripting.en.srt

4.2 KB

002. 3.1 Cross-site scripting.mp4

12.4 MB

003. 3.2 Overflow vulnerabilities.en.srt

5.9 KB

003. 3.2 Overflow vulnerabilities.mp4

17.9 MB

004. 3.3 Data poisoning.en.srt

6.5 KB

004. 3.3 Data poisoning.mp4

16.9 MB

005. 3.4 Broken access control.en.srt

6.5 KB

005. 3.4 Broken access control.mp4

17.2 MB

006. 3.5 Cryptographic failures.en.srt

8.1 KB

006. 3.5 Cryptographic failures.mp4

23.8 MB

007. 3.6 Injection flaws.en.srt

6.1 KB

007. 3.6 Injection flaws.mp4

17.5 MB

008. 3.7 Cross-site request forgery.en.srt

6.2 KB

008. 3.7 Cross-site request forgery.mp4

18.1 MB

009. 3.8 Directory traversal.en.srt

7.7 KB

009. 3.8 Directory traversal.mp4

20.3 MB

010. 3.9 Insecure design.en.srt

5.0 KB

010. 3.9 Insecure design.mp4

15.5 MB

011. 3.10 Security misconfiguration.en.srt

2.5 KB

011. 3.10 Security misconfiguration.mp4

6.6 MB

012. 3.11 End-of-life or outdated components.en.srt

5.5 KB

012. 3.11 End-of-life or outdated components.mp4

14.4 MB

013. 3.12 Identification and authentication failures.en.srt

9.6 KB

013. 3.12 Identification and authentication failures.mp4

27.4 MB

014. 3.13 Server-side request forgery.en.srt

3.7 KB

014. 3.13 Server-side request forgery.mp4

12.2 MB

015. 3.14 Remote code execution.en.srt

6.9 KB

015. 3.14 Remote code execution.mp4

20.3 MB

016. 3.15 Privilege escalation.en.srt

9.8 KB

016. 3.15 Privilege escalation.mp4

26.3 MB

017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).en.srt

4.2 KB

017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).mp4

11.9 MB

/.../Lesson 4 Analyze Data to Prioritize Vulnerabilities/

001. Learning objectives.en.srt

0.6 KB

001. Learning objectives.mp4

2.7 MB

002. 4.1 Compensating controls.en.srt

2.9 KB

002. 4.1 Compensating controls.mp4

7.5 MB

003. 4.2 Control types.en.srt

11.0 KB

003. 4.2 Control types.mp4

24.1 MB

004. 4.3 Patching and configuration management.en.srt

7.5 KB

004. 4.3 Patching and configuration management.mp4

15.5 MB

005. 4.4 Maintenance windows.en.srt

7.4 KB

005. 4.4 Maintenance windows.mp4

20.6 MB

006. 4.5 Exceptions.en.srt

7.6 KB

006. 4.5 Exceptions.mp4

15.3 MB

007. 4.6 Risk management principles.en.srt

13.4 KB

007. 4.6 Risk management principles.mp4

33.1 MB

008. 4.7 Policies, governance, and service-level objectives (SLOs).en.srt

3.7 KB

008. 4.7 Policies, governance, and service-level objectives (SLOs).mp4

9.4 MB

009. 4.8 Prioritization and escalation.en.srt

4.6 KB

009. 4.8 Prioritization and escalation.mp4

11.1 MB

010. 4.9 Attack surface management.en.srt

6.7 KB

010. 4.9 Attack surface management.mp4

24.6 MB

011. 4.10 Secure coding best practices.en.srt

16.7 KB

011. 4.10 Secure coding best practices.mp4

39.2 MB

012. 4.11 Secure software development life cycle (SDLC).en.srt

15.5 KB

012. 4.11 Secure software development life cycle (SDLC).mp4

33.3 MB

013. 4.12 Threat modeling.en.srt

17.9 KB

013. 4.12 Threat modeling.mp4

43.6 MB

/Summary/

001. Secure Operations and Protections Summary.en.srt

0.4 KB

001. Secure Operations and Protections Summary.mp4

1.4 MB

 

Total files 92


Copyright © 2024 FileMood.com