Defensive Security Concepts
Focused View
6:13:35
26 View
1. Introduction The Journey into Defensive Security Concepts.mp4
03:03
2. The Importance of Cyber Security in Todays World.mp4
40:32
3. Introduction to Security Terms and Concepts.mp4
21:31
4. Defining Confidentiality, Integrity, and Availability in the CIA Triad.mp4
16:16
5. The Role and Importance of the CIA Triad.mp4
13:34
6. Introduction to Defense-in-Depth Strategy.mp4
24:53
7. Understanding the Principles of Defense-in-Depth Strategy.mp4
09:55
8. Applying Defense-in-Depth Strategy in Real-world Scenarios.mp4
10:36
9. Understanding the Importance of Security Tools.mp4
12:51
10. A Detailed Overview of the Security Toolset Architecture.mp4
22:25
11. Integration and Coordination of Security Tools.mp4
18:36
12. The Importance of Access Control in Cybersecurity.mp4
19:43
13. Understanding DAC, MAC, and RBAC Models.mp4
15:35
14. Implementing and Managing Access Controls.mp4
22:13
15. Understanding the CVSS Framework.mp4
21:53
16. Introduction to CVSS Terms and Scoring System.mp4
06:35
17. Applying CVSS in Vulnerability Management.mp4
03:58
18. The Importance of Data Visibility in Cybersecurity.mp4
17:59
19. Strategies for Data Visibility.mp4
12:55
20. Case Studies of Data Visibility in Action.mp4
05:07
21. Unpacking the 5-tuple Approach for Host Isolation.mp4
06:26
22. Using the 5-tuple Approach.mp4
07:06
23. Overview of Rule-based, Behavioral, and Statistical Detection Methods.mp4
15:24
24. Implementing Different Detection Methods.mp4
10:51
25. Comparing Detection Approaches Rule-based, Behavioral, and Statistical Methods.mp4
10:26
26. Conclusion.mp4
03:12
More details
User Reviews
Rating
average 0
Focused display
Category

INE
View courses INEINE: Expert IT Training for Networking, Cyber Security and Cloud
INE is the trusted global leader in online IT training for networking, cyber security, cloud management, and data science.
- language english
- Training sessions 26
- duration 6:13:35
- Release Date 2024/01/28