Companies Home Search Profile

Introduction to Cyber Security

Focused View

Bootstrap IT,David Clinton

58:03

96 View
  • 1. Introducing the Cyber Security Problem.mp4
    05:05
  • 1. Understanding the Scary Stuff.mp4
    08:30
  • 2. Building a Risk Assessment.mp4
    06:44
  • 1. Applying Risk Controls to Your Systems.mp4
    07:05
  • 2. Controlling Your Network Exposure.mp4
    04:25
  • 3. Incorporating Audits Into Your Workflow.mp4
    06:49
  • 1. Incident Management.mp4
    04:06
  • 2. Plans and Playbooks.mp4
    06:45
  • 1. Taking Your Next Steps.mp4
    06:12
  • 2. Course Review.mp4
    02:22
  • 3. Course Exercises.html
  • 4. Test Yourself.html
  • Description


    A framework for planning the successful implementation of cybersecurity best practices into your apps and infrastructure

    What You'll Learn?


    • Identify the greatest threats to your IT systems
    • Perform a risk assessment that's specific to your infrastructure
    • Understand the principles involved with applying risk controls to your systems
    • Understand the principles involved with incorporating external and internal security audits
    • Develop a full incident management plan
    • Create an incident recovery playbook

    Who is this for?


  • IT project managers looking to plan more secure deployments
  • System administrators looking to improve the security of their infrastructure
  • Application developers and admins responsible for infrastructure health
  • Individuals exploring a career in cyber security
  • More details


    Description

    Security is scary.

    It's our job as IT managers, admins, developers of one kind or another, or even security professionals to ensure that our applications and services are running smoothly. And that includes maintaining safe and reliable connectivity for our teams and end users. But no matter how many best-practices and automated monitoring solutions we adopt, there'll always be another threat trying to ruin your day.

    You know you and your team should be doing a better job incorporating security into everything you do, but there are just so many threats out there and just so much to know. Where should you even begin?

    In this short course, you'll learn about the core principles driving modern cyber security operations. We'll talk about how to perform comprehensive risk assessments for your infrastructure, develop protocols for risk control, and build effective plans for incident management and recovery.

    When you're done, you won't have any specific new skills using log analysis, penetration testing, or vulnerability assessment tools. Instead I'll give you a big picture view of what processes you'll need to adopt so that you'll know which tools are right for you, and so you can be confident you're not leaving anything out.

    Who this course is for:

    • IT project managers looking to plan more secure deployments
    • System administrators looking to improve the security of their infrastructure
    • Application developers and admins responsible for infrastructure health
    • Individuals exploring a career in cyber security

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Bootstrap IT
    Bootstrap IT
    Instructor's Courses
    For most people, watching an instructor doing something – or even reading an excellent guide – is not the best way to learn a complex set of skills. Those might be critically important elements of your quest for excellence in some technical field, but unless you dive in and work through real-world problems on your own, you’ll never truly master the material.Our technology books, Udemy and Pluralsight video courses, and other content present you with all the background and information you’ll need to get started. But more significantly, they are designed to push you as quickly as possible out “into the field” where you can earn effective hands-on experience (and money!) using the real tools of your trade.
    David Clinton
    David Clinton
    Instructor's Courses
    David Clinton is an AWS solutions architect and Linux server administrator. He has written about and published training content (including books with Wiley/Sybex, Bootstrap IT, and Manning, and online courses on Udemy and Pluralsight) for many cutting edge technology subjects including Linux systems, Cloud Computing (in particular Amazon's AWS), container technologies like Kubernetes, data analytics, and DevOps tools. More than 60,000 of his books are currently in circulation and his video courses have been viewed by more than a half a million students...just like you!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 10
    • duration 58:03
    • Release Date 2022/12/24