Enterprise Defense Administrator (eEDA)
Focused View
33:21:18
22 View
01.zip
01-IntroductiontoChangeManagement.txt
02.zip
03-.zip
04-.zip
- 01-Introduction
- 01-Course Introduction.mp403:53
- 02-Security Engineering
- 01-What is Security Engineering.mp412:54
- 02-Perimeter Security.mp425:36
- 03-Network Security.mp426:40
- 04-Endpoint Security.mp423:47
- 03-Change Management
- 01-Introduction to Change Management.mp405:00
- 02-Types of Change & Change Environments.mp418:49
- 03-Change Management Process.mp419:20
- 04-Governance, Risk, and Compliance.mp419:27
- 04-Conclusion
- 01-Course Conclusion.mp400:50
02.zip
02-.zip
02-Introduction to Cyber Security Hardening.txt
03-.zip
04-.zip
05-.zip
06-.zip
- 02.1-Introduction
- 02.1-Course Introduction.mp403:01
- 02.2-Security Hardening Basics
- 02.2.1-Introduction to Security Hardening.mp413:06
- 02.2.2-Guidelines, Baselines, & Frameworks.mp415:10
- 02.3-Network
- 02.3.1-Network Perimeter.mp415:54
- 02.3.2-Securing Network Devices.mp423:06
- 02.4-Windows
- 02.4.1-Windows Servers.mp417:42
- 02.4.2-Active Directory.mp427:26
- 02.4.3-Windows Server Hardening Demo.mp421:23
- 02.4.4-Active Directory Hardening Demo.mp438:53
- 02.5-Other Systems
- 02.5.1-Windows Workstations & Applications.mp426:04
- 02.5.2-Linux Hardening.mp415:40
- 02.5.3-Securing Linux Demo.mp433:54
- 02.5.4-Other Endpoints & Systems.mp421:53
- 02.6-Conclution
- 02.6-Conclusion.mp401:05
01.zip
02-.zip
03-.zip
03-Introduction to Security Sensors & Logging Management.txt
04-.zip
05-.zip
- 3.1-Introduction
- 03.1-Course Introduction.mp404:53
- 3.2-Sensor and Logging Basics
- 03.2.1-Security Sensor Introduction.mp416:43
- 03.2.2-Logging Introduction.mp419:46
- 3.3-Security Sensors
- 03.3.1-Network Sensors.mp418:23
- 03.3.2-Host Sensors.mp417:26
- 3.4-Log Management
- 3.4.1-Centralized Logging.mp424:14
- 3.4.2-SIEM.mp418:44
- 3.4.3-SIEM Demo.mp445:12
- 3.4.4-Logging Formats & Normalization.mp415:19
- 3.4.5-Continuous Monitoring & Alerting.mp418:04
- 3.4.6-Storage Management.mp420:38
- 3.5-Log Analysis & Response
- 3.5.1-Manual Log Review.mp408:03
- 3.5.2-Automated Log Analysis.mp418:05
- 3.5.3-SOAR Introduction.mp413:17
- 3.6-Conclusion
- 3.6.1-Conculsion.mp401:38
01-.zip
02.zip
03-.zip
04-.zip
04-Introduction to Identity & Access Management.txt
- 4.1-Introduction
- 4.1.1-Introduction.mp404:13
- 4.2-IAM Basics
- 4.2.1-Identity & Access Management.mp409:33
- 4.2.2-Authentication, Authorization, & Accountability.mp411:48
- 4.3-Credential Management
- 4.3.1-Authentication Types.mp419:27
- 4.3.2-Password Management.mp424:18
- 4.3.3-Just-in-Time Access.mp410:08
- 4.4-Identity & Authorization
- 4.4.1-Authorization Mechanisms.mp417:28
- 4.4.2-Authentication & Authorization Systems.mp418:14
- 4.4.3-Identity Management.mp418:31
- 4.4.4-Identity & Access Management with Active Directory.mp431:43
- 4.5-Accountability
- 4.5.1-Accounting & Auditing.mp419:07
- 4.5.2-Identity & Access Lifecycle.mp415:59
- 4.6-Conclusion
- 4.6.1-Conclusion.mp401:21
- 1.1-Introduction
- 2.2.1-Introduction.mp405:13
- 1.2-Introduction to Vulnerabilities
- 2.2.1-Vulnerabilities Explained.mp414:25
- 2.2.2-Discovery of Vulnerabilities.mp409:46
- 2.2.3-History of Vulnerabilities & Malware.mp430:20
- 1.3-Vulnerability Scanning
- 2.3.1-Introduction to Vulnerability Scanning.mp414:13
- 2.3.2-Scanning Process.mp426:48
- 2.3.3-Vulnerability Scanners.mp417:27
- 2.3.4-Vulnerability Scanner Demo.mp426:24
- 2.3.5-Inventory Scanning.mp405:53
- 1.4-Vulnerability Scoring
- 2.4.1-Introduction to Vulnerability Scoring.mp408:14
- 2.4.2-Vulnerability Information Resources.mp419:51
- 2.4.3-Score Interpretation.mp414:40
- 1.5-Vulnerability Analytics and Reporting
- 2.5.1-Vulnerability Risk Analysis.mp426:36
- 2.5.2-Vulnerability Reporting.mp426:12
- 2.5.3-Vulnerability Operations Management.mp428:26
- 1.6-Conclusion
- 2.6.1-Conclusion.mp401:28
- 01.1-Introduction
- 01-Course Introduction.mp405:14
- 01.2-Security Basics
- 01-Introduction to Security Management.mp413:53
- 02-GRC Introduction.mp414:20
- 01.3-Governance
- 01-Governance Basics.mp415:06
- 02-Organizational Roles & Responsibilities.mp417:54
- 03-Policies, Procedures, & Standards.mp420:13
- 04-Training & Ethics.mp424:57
- 01.4-Risk Management
- 01-Training & Ethics.mp418:33
- 02-Risk Assessments & Methodologies.mp413:29
- 03-Risk Response, Monitoring, & Reporting.mp416:32
- 01.5-Compliance
- 01-Compliance Basics.mp406:18
- 02-Laws & Regulations.mp415:50
- 03-Privacy & Liability.mp414:41
- 04-Maintaining Compliance.mp417:17
- 01.6-Frameworks
- 01-Introduction to Frameworks.mp408:04
- 02-Risk Management Frameworks.mp410:08
- 03-Security Controls & Programs.mp413:24
- 04-Other Frameworks & Concepts.mp411:20
- 01.7-Conclusion
- 01-Conclusion.mp401:46
- 3.1-Introduction
- 3.1.1-Course Introduction.mp404:06
- 3.2-Overview
- 3.2.1-Perimeter Introduction.mp410:22
- 3.2.2-Network Introduction.mp408:25
- 3.3-Perimeter Security
- 3.3.1-Securing Firewalls.mp425:09
- 3.3.2-Firewall Demo.mp421:46
- 3.3.3-DMZ Security.mp426:12
- 3.3.4-Remote Access.mp419:48
- 3.3.5-DNS Security.mp419:36
- 3.3.6-Other Perimeter Considerations.mp410:53
- 3.4-Internal Network Security
- 3.4.1-Network Segmentation.mp416:48
- 3.4.2-Switches & Routers.mp430:18
- 3.4.3-Wireless Security.mp422:05
- 3.4.4-Logging & Analysis.mp421:41
- 3.4.5-Wireshark Introduction.mp411:31
- 3.4.6-Wireshark Demo.mp419:29
- 3.4.7-Other Internal Network Considerations.mp414:22
- 3.5-Conclusion
- 3.5.1-Course Conclusion.mp401:10
- 3.2.1-Introduction
- 3.2.1-Introduction.mp405:24
- 3.2.2-Secure Architecture Introduction
- 3.2.1-Basic Security Principles.mp415:21
- 3.2.2-What is Secure Architecture.mp414:44
- 3.2.3-Security Principles
- 3.2.3.1-General Principles of Secure Architecture.mp414:19
- 3.2.3.2-Secure Architecture Goals.mp412:58
- 3.2.3.3-Secure the Users.mp416:54
- 3.2.3.4-Secure Infrastructure.mp425:29
- 3.2.4-Designing a Secure Architecture
- 3.2.4.1-Threat Modeling.mp416:51
- 3.2.4.2-Secure Architecture Planning.mp419:49
- 3.2.4.3-Creating a Secure Network.mp421:28
- 3.2.4.4-Logging.mp419:47
- 3.2.4.5-Disaster Recovery.mp419:18
- 3.2.4.6-Documenting the Secure Architecture.mp417:10
- 3.2.5-Conclution
- 3.2.5.1-Conclusion.mp401:25
- 4.1-Introduction
- 01-Course Introduction.mp403:37
- 4.2-Security Operations
- 4.2.1-Documentation.mp414:50
- 4.2.2-Evaluating Existing Networks.mp421:38
- 4.2.3-Creating New Secure Networks.mp419:44
- 4.3-Conclusion
- 4.3.1-Course Conclusion.mp409:08
More details
User Reviews
Rating
average 0
Focused display
Category

INE
View courses INEINE: Expert IT Training for Networking, Cyber Security and Cloud
INE is the trusted global leader in online IT training for networking, cyber security, cloud management, and data science.
- language english
- Training sessions 123
- duration 33:21:18
- Release Date 2024/01/28