Companies Home Search Profile

Secure Operations and Protections

Focused View

3:34:16

106 View
  • 1 - Secure Operations and Protections LiveLessons - Introduction.mp4
    01:22
  • 2 - Learning objectives.mp4
    00:29
  • 3 - 1.1 Cloud vs. On-premises - Part 1.mp4
    06:04
  • 4 - 1.2 Cloud vs. On-premises - Part 2.mp4
    13:51
  • 5 - 1.3 Asset Management.mp4
    05:42
  • 6 - 1.4 Segmentation.mp4
    02:39
  • 7 - 1.5 Network Architecture.mp4
    13:09
  • 8 - 1.6 Change Management.mp4
    01:58
  • 9 - 1.7 Containerization.mp4
    01:22
  • 10 - 1.8 Identity and Access Management.mp4
    08:47
  • 11 - 1.9 Cloud Access Security Broker (CASB).mp4
    07:02
  • 12 - 1.10 Honeypots and Breach Detection.mp4
    10:23
  • 13 - 1.11 Encryption and Certificate Management.mp4
    01:11
  • 14 - Learning objectives.mp4
    00:27
  • 15 - 2.1 SDLC Platforms.mp4
    02:21
  • 16 - 2.2 DevSecOps.mp4
    08:28
  • 17 - 2.3 Software Assessment Methods.mp4
    02:32
  • 18 - 2.4 User Acceptance Training and Stress Test.mp4
    03:47
  • 19 - 2.5 Security Regression Training.mp4
    02:07
  • 20 - 2.6 Code Review.mp4
    01:06
  • 21 - 2.7 Secure Coding Best Practices.mp4
    04:06
  • 22 - 2.8 Input Validation.mp4
    01:23
  • 23 - 2.9 Output Encoding.mp4
    02:13
  • 24 - 2.10 Session Management.mp4
    02:02
  • 25 - 2.11 Authentication.mp4
    02:07
  • 26 - 2.12 Data Protection.mp4
    01:41
  • 27 - 2.13 Paramaterized Queries.mp4
    01:49
  • 28 - Learning objectives.mp4
    00:24
  • 29 - 3.1 Change Control.mp4
    09:03
  • 30 - 3.2 Allow List.mp4
    02:11
  • 31 - 3.3 Blocklist.mp4
    02:47
  • 32 - 3.4 Firewall.mp4
    07:16
  • 33 - 3.5 Intrusion Prevention System (IPS) Rules.mp4
    03:09
  • 34 - 3.6 Data Loss Prevention (DLP).mp4
    03:04
  • 35 - 3.7 Endpoint Detection and Response (EDR).mp4
    03:06
  • 36 - 3.8 Network Access Control (NAC).mp4
    02:33
  • 37 - 3.9 Sinkholing.mp4
    03:24
  • 38 - 3.10 Malware Signature Rule Writing.mp4
    04:05
  • 39 - 3.11 Sandboxing.mp4
    01:41
  • 40 - 3.12 Port Security.mp4
    03:24
  • 41 - Learning objectives.mp4
    00:34
  • 42 - 4.1 What is a Cyber Incident.mp4
    15:41
  • 43 - 4.2 Communication Plan.mp4
    02:05
  • 44 - 4.3 Trusted Parties.mp4
    13:51
  • 45 - 4.4 Regulatory and Legislative Requirements.mp4
    02:46
  • 46 - 4.5 Preventing Inadvertent Release of Information.mp4
    05:34
  • 47 - Learning objectives.mp4
    00:31
  • 48 - 5.1 Legal.mp4
    03:46
  • 49 - 5.2 Human Resources.mp4
    01:58
  • 50 - 5.3 Public Relations.mp4
    01:37
  • 51 - 5.4 Senior Leadership.mp4
    01:34
  • 52 - 5.5 Regulatory Bodies.mp4
    01:09
  • 53 - Learning objectives.mp4
    00:27
  • 54 - 6.1 Personal Identifiable Information (PII).mp4
    01:26
  • 55 - 6.2 Personal Health Information (PHI).mp4
    01:41
  • 56 - 6.3 Sensitive Personal Information (SPI) and High Value Assets.mp4
    01:09
  • 57 - 6.4 Intellectual Property.mp4
    01:40
  • 58 - Secure Operations and Protections LiveLessons - Summary.mp4
    00:32
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 58
    • duration 3:34:16
    • Release Date 2023/11/04