Companies Home Search Profile

Enterprise Defense Administrator (eEDA)

Focused View

33:21:18

22 View
  • 01.zip
  • 01-IntroductiontoChangeManagement.txt
  • 02.zip
  • 03-.zip
  • 04-.zip
    • 01-Introduction
    • 01-Course Introduction.mp4
      03:53
      02-Security Engineering
    • 01-What is Security Engineering.mp4
      12:54
    • 02-Perimeter Security.mp4
      25:36
    • 03-Network Security.mp4
      26:40
    • 04-Endpoint Security.mp4
      23:47
      03-Change Management
    • 01-Introduction to Change Management.mp4
      05:00
    • 02-Types of Change & Change Environments.mp4
      18:49
    • 03-Change Management Process.mp4
      19:20
    • 04-Governance, Risk, and Compliance.mp4
      19:27
      04-Conclusion
    • 01-Course Conclusion.mp4
      00:50
  • 02.zip
  • 02-.zip
  • 02-Introduction to Cyber Security Hardening.txt
  • 03-.zip
  • 04-.zip
  • 05-.zip
  • 06-.zip
    • 02.1-Introduction
    • 02.1-Course Introduction.mp4
      03:01
      02.2-Security Hardening Basics
    • 02.2.1-Introduction to Security Hardening.mp4
      13:06
    • 02.2.2-Guidelines, Baselines, & Frameworks.mp4
      15:10
      02.3-Network
    • 02.3.1-Network Perimeter.mp4
      15:54
    • 02.3.2-Securing Network Devices.mp4
      23:06
      02.4-Windows
    • 02.4.1-Windows Servers.mp4
      17:42
    • 02.4.2-Active Directory.mp4
      27:26
    • 02.4.3-Windows Server Hardening Demo.mp4
      21:23
    • 02.4.4-Active Directory Hardening Demo.mp4
      38:53
      02.5-Other Systems
    • 02.5.1-Windows Workstations & Applications.mp4
      26:04
    • 02.5.2-Linux Hardening.mp4
      15:40
    • 02.5.3-Securing Linux Demo.mp4
      33:54
    • 02.5.4-Other Endpoints & Systems.mp4
      21:53
      02.6-Conclution
    • 02.6-Conclusion.mp4
      01:05
  • 01.zip
  • 02-.zip
  • 03-.zip
  • 03-Introduction to Security Sensors & Logging Management.txt
  • 04-.zip
  • 05-.zip
    • 3.1-Introduction
    • 03.1-Course Introduction.mp4
      04:53
      3.2-Sensor and Logging Basics
    • 03.2.1-Security Sensor Introduction.mp4
      16:43
    • 03.2.2-Logging Introduction.mp4
      19:46
      3.3-Security Sensors
    • 03.3.1-Network Sensors.mp4
      18:23
    • 03.3.2-Host Sensors.mp4
      17:26
      3.4-Log Management
    • 3.4.1-Centralized Logging.mp4
      24:14
    • 3.4.2-SIEM.mp4
      18:44
    • 3.4.3-SIEM Demo.mp4
      45:12
    • 3.4.4-Logging Formats & Normalization.mp4
      15:19
    • 3.4.5-Continuous Monitoring & Alerting.mp4
      18:04
    • 3.4.6-Storage Management.mp4
      20:38
      3.5-Log Analysis & Response
    • 3.5.1-Manual Log Review.mp4
      08:03
    • 3.5.2-Automated Log Analysis.mp4
      18:05
    • 3.5.3-SOAR Introduction.mp4
      13:17
      3.6-Conclusion
    • 3.6.1-Conculsion.mp4
      01:38
  • 01-.zip
  • 02.zip
  • 03-.zip
  • 04-.zip
  • 04-Introduction to Identity & Access Management.txt
    • 4.1-Introduction
    • 4.1.1-Introduction.mp4
      04:13
      4.2-IAM Basics
    • 4.2.1-Identity & Access Management.mp4
      09:33
    • 4.2.2-Authentication, Authorization, & Accountability.mp4
      11:48
      4.3-Credential Management
    • 4.3.1-Authentication Types.mp4
      19:27
    • 4.3.2-Password Management.mp4
      24:18
    • 4.3.3-Just-in-Time Access.mp4
      10:08
      4.4-Identity & Authorization
    • 4.4.1-Authorization Mechanisms.mp4
      17:28
    • 4.4.2-Authentication & Authorization Systems.mp4
      18:14
    • 4.4.3-Identity Management.mp4
      18:31
    • 4.4.4-Identity & Access Management with Active Directory.mp4
      31:43
      4.5-Accountability
    • 4.5.1-Accounting & Auditing.mp4
      19:07
    • 4.5.2-Identity & Access Lifecycle.mp4
      15:59
      4.6-Conclusion
    • 4.6.1-Conclusion.mp4
      01:21
      1.1-Introduction
    • 2.2.1-Introduction.mp4
      05:13
      1.2-Introduction to Vulnerabilities
    • 2.2.1-Vulnerabilities Explained.mp4
      14:25
    • 2.2.2-Discovery of Vulnerabilities.mp4
      09:46
    • 2.2.3-History of Vulnerabilities & Malware.mp4
      30:20
      1.3-Vulnerability Scanning
    • 2.3.1-Introduction to Vulnerability Scanning.mp4
      14:13
    • 2.3.2-Scanning Process.mp4
      26:48
    • 2.3.3-Vulnerability Scanners.mp4
      17:27
    • 2.3.4-Vulnerability Scanner Demo.mp4
      26:24
    • 2.3.5-Inventory Scanning.mp4
      05:53
      1.4-Vulnerability Scoring
    • 2.4.1-Introduction to Vulnerability Scoring.mp4
      08:14
    • 2.4.2-Vulnerability Information Resources.mp4
      19:51
    • 2.4.3-Score Interpretation.mp4
      14:40
      1.5-Vulnerability Analytics and Reporting
    • 2.5.1-Vulnerability Risk Analysis.mp4
      26:36
    • 2.5.2-Vulnerability Reporting.mp4
      26:12
    • 2.5.3-Vulnerability Operations Management.mp4
      28:26
      1.6-Conclusion
    • 2.6.1-Conclusion.mp4
      01:28
      01.1-Introduction
    • 01-Course Introduction.mp4
      05:14
      01.2-Security Basics
    • 01-Introduction to Security Management.mp4
      13:53
    • 02-GRC Introduction.mp4
      14:20
      01.3-Governance
    • 01-Governance Basics.mp4
      15:06
    • 02-Organizational Roles & Responsibilities.mp4
      17:54
    • 03-Policies, Procedures, & Standards.mp4
      20:13
    • 04-Training & Ethics.mp4
      24:57
      01.4-Risk Management
    • 01-Training & Ethics.mp4
      18:33
    • 02-Risk Assessments & Methodologies.mp4
      13:29
    • 03-Risk Response, Monitoring, & Reporting.mp4
      16:32
      01.5-Compliance
    • 01-Compliance Basics.mp4
      06:18
    • 02-Laws & Regulations.mp4
      15:50
    • 03-Privacy & Liability.mp4
      14:41
    • 04-Maintaining Compliance.mp4
      17:17
      01.6-Frameworks
    • 01-Introduction to Frameworks.mp4
      08:04
    • 02-Risk Management Frameworks.mp4
      10:08
    • 03-Security Controls & Programs.mp4
      13:24
    • 04-Other Frameworks & Concepts.mp4
      11:20
      01.7-Conclusion
    • 01-Conclusion.mp4
      01:46
      3.1-Introduction
    • 3.1.1-Course Introduction.mp4
      04:06
      3.2-Overview
    • 3.2.1-Perimeter Introduction.mp4
      10:22
    • 3.2.2-Network Introduction.mp4
      08:25
      3.3-Perimeter Security
    • 3.3.1-Securing Firewalls.mp4
      25:09
    • 3.3.2-Firewall Demo.mp4
      21:46
    • 3.3.3-DMZ Security.mp4
      26:12
    • 3.3.4-Remote Access.mp4
      19:48
    • 3.3.5-DNS Security.mp4
      19:36
    • 3.3.6-Other Perimeter Considerations.mp4
      10:53
      3.4-Internal Network Security
    • 3.4.1-Network Segmentation.mp4
      16:48
    • 3.4.2-Switches & Routers.mp4
      30:18
    • 3.4.3-Wireless Security.mp4
      22:05
    • 3.4.4-Logging & Analysis.mp4
      21:41
    • 3.4.5-Wireshark Introduction.mp4
      11:31
    • 3.4.6-Wireshark Demo.mp4
      19:29
    • 3.4.7-Other Internal Network Considerations.mp4
      14:22
      3.5-Conclusion
    • 3.5.1-Course Conclusion.mp4
      01:10
      3.2.1-Introduction
    • 3.2.1-Introduction.mp4
      05:24
      3.2.2-Secure Architecture Introduction
    • 3.2.1-Basic Security Principles.mp4
      15:21
    • 3.2.2-What is Secure Architecture.mp4
      14:44
      3.2.3-Security Principles
    • 3.2.3.1-General Principles of Secure Architecture.mp4
      14:19
    • 3.2.3.2-Secure Architecture Goals.mp4
      12:58
    • 3.2.3.3-Secure the Users.mp4
      16:54
    • 3.2.3.4-Secure Infrastructure.mp4
      25:29
      3.2.4-Designing a Secure Architecture
    • 3.2.4.1-Threat Modeling.mp4
      16:51
    • 3.2.4.2-Secure Architecture Planning.mp4
      19:49
    • 3.2.4.3-Creating a Secure Network.mp4
      21:28
    • 3.2.4.4-Logging.mp4
      19:47
    • 3.2.4.5-Disaster Recovery.mp4
      19:18
    • 3.2.4.6-Documenting the Secure Architecture.mp4
      17:10
      3.2.5-Conclution
    • 3.2.5.1-Conclusion.mp4
      01:25
      4.1-Introduction
    • 01-Course Introduction.mp4
      03:37
      4.2-Security Operations
    • 4.2.1-Documentation.mp4
      14:50
    • 4.2.2-Evaluating Existing Networks.mp4
      21:38
    • 4.2.3-Creating New Secure Networks.mp4
      19:44
      4.3-Conclusion
    • 4.3.1-Course Conclusion.mp4
      09:08

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    INE: Expert IT Training for Networking, Cyber Security and Cloud INE is the trusted global leader in online IT training for networking, cyber security, cloud management, and data science.
    • language english
    • Training sessions 123
    • duration 33:21:18
    • Release Date 2024/01/28