|  

Secure Operations and Protections, 2nd Edition --> [ CourseWikia ]



Size :1.26 GB
Peers : Seeders : 0      Leechers : 0
Added : 6 months ago » by FreeCourseWeb » in Other
Language : English
Last Updated :6 months ago
Info_Hash :878D9423C340EEE69E4A1A864DFA808D4B4AE78E

Torrent File Contents

Secure Operations and Protections, 2nd Edition --> [ CourseWikia ]
  Get Bonus Downloads Here.url
  -  181 Bytes

  ~Get Your Files Here !/Bonus Resources.txt
  -  386 Bytes

  ~Get Your Files Here !/Introduction/001. Secure Operations and Protections Introduction.en.srt
  -  1.07 KB

  ~Get Your Files Here !/Introduction/001. Secure Operations and Protections Introduction.mp4
  -  3.34 MB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/001. Learning objectives.en.srt
  -  1.18 KB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/001. Learning objectives.mp4
  -  3.99 MB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.en.srt
  -  48.79 KB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4
  -  101.11 MB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.en.srt
  -  54.81 KB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4
  -  112.42 MB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.en.srt
  -  22.15 KB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4
  -  49.64 MB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.en.srt
  -  23.32 KB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4
  -  85.14 MB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.en.srt
  -  22.86 KB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4
  -  47.8 MB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.en.srt
  -  42 KB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4
  -  114.75 MB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.en.srt
  -  33.83 KB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4
  -  72.5 MB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/009. 1.8 Sensitive data protection.en.srt
  -  8.72 KB

  ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/009. 1.8 Sensitive data protection.mp4
  -  20.97 MB

  ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/001. Learning objectives.en.srt
  -  736 Bytes

  ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/001. Learning objectives.mp4
  -  2.56 MB

  ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/002. 2.1 Standardize processes.en.srt
  -  12.68 KB

  ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/002. 2.1 Standardize processes.mp4
  -  32.75 MB

  ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/003. 2.2 Streamline operations.en.srt
  -  6.92 KB

  ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/003. 2.2 Streamline operations.mp4
  -  18.28 MB

  ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.en.srt
  -  22.37 KB

  ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4
  -  83.1 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/001. Learning objectives.en.srt
  -  1.14 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/001. Learning objectives.mp4
  -  4.23 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/002. 3.1 Cross-site scripting.en.srt
  -  4.13 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/002. 3.1 Cross-site scripting.mp4
  -  11.82 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/003. 3.2 Overflow vulnerabilities.en.srt
  -  5.75 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/003. 3.2 Overflow vulnerabilities.mp4
  -  17.11 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/004. 3.3 Data poisoning.en.srt
  -  6.33 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/004. 3.3 Data poisoning.mp4
  -  16.08 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/005. 3.4 Broken access control.en.srt
  -  6.39 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/005. 3.4 Broken access control.mp4
  -  16.44 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/006. 3.5 Cryptographic failures.en.srt
  -  7.91 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/006. 3.5 Cryptographic failures.mp4
  -  22.66 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/007. 3.6 Injection flaws.en.srt
  -  5.99 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/007. 3.6 Injection flaws.mp4
  -  16.69 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/008. 3.7 Cross-site request forgery.en.srt
  -  6.07 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/008. 3.7 Cross-site request forgery.mp4
  -  17.28 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/009. 3.8 Directory traversal.en.srt
  -  7.54 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/009. 3.8 Directory traversal.mp4
  -  19.35 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/010. 3.9 Insecure design.en.srt
  -  4.84 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/010. 3.9 Insecure design.mp4
  -  14.77 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/011. 3.10 Security misconfiguration.en.srt
  -  2.45 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/011. 3.10 Security misconfiguration.mp4
  -  6.33 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/012. 3.11 End-of-life or outdated components.en.srt
  -  5.41 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/012. 3.11 End-of-life or outdated components.mp4
  -  13.75 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/013. 3.12 Identification and authentication failures.en.srt
  -  9.38 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/013. 3.12 Identification and authentication failures.mp4
  -  26.14 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/014. 3.13 Server-side request forgery.en.srt
  -  3.62 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/014. 3.13 Server-side request forgery.mp4
  -  11.66 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/015. 3.14 Remote code execution.en.srt
  -  6.77 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/015. 3.14 Remote code execution.mp4
  -  19.36 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/016. 3.15 Privilege escalation.en.srt
  -  9.54 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/016. 3.15 Privilege escalation.mp4
  -  25.06 MB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).en.srt
  -  4.15 KB

  ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).mp4
  -  11.37 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/001. Learning objectives.en.srt
  -  571 Bytes

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/001. Learning objectives.mp4
  -  2.54 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/002. 4.1 Compensating controls.en.srt
  -  2.88 KB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/002. 4.1 Compensating controls.mp4
  -  7.18 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/003. 4.2 Control types.en.srt
  -  10.73 KB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/003. 4.2 Control types.mp4
  -  23.02 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/004. 4.3 Patching and configuration management.en.srt
  -  7.36 KB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/004. 4.3 Patching and configuration management.mp4
  -  14.8 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/005. 4.4 Maintenance windows.en.srt
  -  7.24 KB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/005. 4.4 Maintenance windows.mp4
  -  19.69 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/006. 4.5 Exceptions.en.srt
  -  7.41 KB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/006. 4.5 Exceptions.mp4
  -  14.64 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/007. 4.6 Risk management principles.en.srt
  -  13.12 KB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/007. 4.6 Risk management principles.mp4
  -  31.59 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/008. 4.7 Policies, governance, and service-level objectives (SLOs).en.srt
  -  3.64 KB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/008. 4.7 Policies, governance, and service-level objectives (SLOs).mp4
  -  8.92 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/009. 4.8 Prioritization and escalation.en.srt
  -  4.46 KB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/009. 4.8 Prioritization and escalation.mp4
  -  10.63 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/010. 4.9 Attack surface management.en.srt
  -  6.57 KB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/010. 4.9 Attack surface management.mp4
  -  23.43 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/011. 4.10 Secure coding best practices.en.srt
  -  16.29 KB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/011. 4.10 Secure coding best practices.mp4
  -  37.37 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/012. 4.11 Secure software development life cycle (SDLC).en.srt
  -  15.09 KB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/012. 4.11 Secure software development life cycle (SDLC).mp4
  -  31.73 MB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.en.srt
  -  17.43 KB

  ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4
  -  41.61 MB

  ~Get Your Files Here !/Summary/001. Secure Operations and Protections Summary.en.srt
  -  433 Bytes

  ~Get Your Files Here !/Summary/001. Secure Operations and Protections Summary.mp4
  -  1.29 MB



Torrent Description

[ CourseWikia.com ] Secure Operations and Protections, 2nd Edition

If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com

Image error

Released 4/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 4h 35m | Size: 1.25 GB

Gain an introductory understanding of secure operations and protections concepts

Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With over 4 hours of video training, the Secure Operations and Protections, 2nd Edition video course explores organizations' strategies, practices, and technologies to protect their systems, networks, and data, ultimately enhancing their overall security posture. Dive into the essential aspects of secure operations, including network security, system hardening, and incident response planning.

Throughout the video course, expert trainer, author and cybersecurity expert Aamir Lakhani uses hands-on s, in-depth discussions and lightboard work to teach cyber security fundamentals. This video course teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations.

If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com

Get More Tutorials and Support Us -->> https://DevCourseWeb.com

We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...

Image error

Image error