Enterprise Security Policies, Practices, and Procedures
- Type:
- Other > Other
- Files:
- 39
- Size:
- 246.42 MiB (258392546 Bytes)
- Uploaded:
- 2017-04-28 13:39:23 GMT
- By:
- sumi
- Seeders:
- 1
- Leechers:
- 1
- Comments
- 0
- Info Hash: AF08228A9BA2619935B0E02D98716B64B35B14BD
(Problems with magnets links are fixed by upgrading your torrent client!)
Most companies are "reactive" instead of "proactive" when it comes to securing their networks, resources, and data. In this course, Enterprise Security: Policies, Practices, and Procedures, you will learn how to get ahead of the bad guys by looking at your infrastructure in a different manner. First, you will get a better understanding of the landscape and how fast it is changing. Next, you will delve into industry standards, frameworks, policies, and how these can affect your environment. Finally, you will learn about what tools to use and the need for penetrationBy the end of this course, you will know how to keep up with the changes and continue to maintain a high level of security in your environment
01. Course Overview/01. Course Overview.mp4 | 4.07 MiB |
02. Security Data Analytics What's Going On/01. Series Introductionoverview.mp4 | 10.57 MiB |
02. Security Data Analytics What's Going On/02. Module Overview.mp4 | 1.36 MiB |
02. Security Data Analytics What's Going On/03. Teaching an Old Dog New Tricks.mp4 | 15.16 MiB |
02. Security Data Analytics What's Going On/04. Trend Analysis.mp4 | 8.65 MiB |
02. Security Data Analytics What's Going On/05. Data Aggregation and Correlation.mp4 | 4.69 MiB |
02. Security Data Analytics What's Going On/06. Historical Analysis.mp4 | 16.9 MiB |
02. Security Data Analytics What's Going On/07. Summary.mp4 | 1.78 MiB |
03. Defense in Depth This Is Where It Begins/01 Introduction and Overview.mp4 | 1.34 MiB |
03. Defense in Depth This Is Where It Begins/02. What Is Defense in Depth.mp4 | 16.89 MiB |
03. Defense in Depth This Is Where It Begins/04. Level 2 Processes.mp4 | 3.54 MiB |
03. Defense in Depth This Is Where It Begins/05. Level 3 Technologies.mp4 | 3.45 MiB |
03. Defense in Depth This Is Where It Begins/06. Level 4 The Network.mp4 | 3.99 MiB |
03. Defense in Depth This Is Where It Begins/07. Summary.mp4 | 2.4 MiB |
04. Defense in Depth What Tools Can You Use/01. Introduction and Overview.mp4 | 2.07 MiB |
04. Defense in Depth What Tools Can You Use/02. Let's Break It Down!.mp4 | 9.9 MiB |
04. Defense in Depth What Tools Can You Use/03. IPSHIPS.mp4 | 13.15 MiB |
04. Defense in Depth What Tools Can You Use/04. Firewalls Softwarehardware.mp4 | 4.11 MiB |
04. Defense in Depth What Tools Can You Use/05. Anti-virusanti-malware.mp4 | 1.9 MiB |
04. Defense in Depth What Tools Can You Use/06. EMET.mp4 | 12.21 MiB |
04. Defense in Depth What Tools Can You Use/07. Web Proxies & WAFs.mp4 | 7.59 MiB |
04. Defense in Depth What Tools Can You Use/08. A New Hope.mp4 | 13.07 MiB |
04. Defense in Depth What Tools Can You Use/09. Summary.mp4 | 2.44 MiB |
05. Defense in Depth Drill, Test, Rinse, Repeat/01. Introduction and Overview.mp4 | 1.13 MiB |
05. Defense in Depth Drill, Test, Rinse, Repeat/02. Why Penetration Tests.mp4 | 6.61 MiB |
05. Defense in Depth Drill, Test, Rinse, Repeat/03. Rules Are Rules.mp4 | 9.95 MiB |
05. Defense in Depth Drill, Test, Rinse, Repeat/04. Reverse Engineering.mp4 | 4.07 MiB |
05. Defense in Depth Drill, Test, Rinse, Repeat/05. Teams Involved.mp4 | 4.7 MiB |
05. Defense in Depth Drill, Test, Rinse, Repeat/06. Risk Evaluation.mp4 | 7.39 MiB |
05. Defense in Depth Drill, Test, Rinse, Repeat/07. Summary.mp4 | 1.95 MiB |
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/01. Introduction and Overview.mp4 | 1.09 MiB |
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/02. Frameworks.mp4 | 6.8 MiB |
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/03. Policies.mp4 | 12.2 MiB |
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/04. Controls.mp4 | 6.62 MiB |
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/05. Procedures.mp4 | 7.15 MiB |
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/06. Quality Controls & Verification.mp4 | 5.87 MiB |
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/07. Module & Course Summary.mp4 | 1.39 MiB |
enterprise-security-policies-practices-procedures.zip | 8.24 MiB |
Torrent Downloaded From Katcr.co - Kickasstorrents.txt | 52 B |