Home » Tag cloud » Security
Category: Tutorial
Ccie Security V4 0 Livelessons
CCIE Security v4.0 LiveLessons
mov | Video: AVC 1280 x 720 | Audio: AAC 44 KHz 2ch | Duration: 04:09:57 | 3.24 GB
Genre: eLearning | Language: English


Download Now
Read More
Category: Tutorial
Packt - Hands-on Linux Host Security for SysAdmins

Packt - Hands-on Linux Host Security for SysAdmins
English | Size: 325.58 MB
Category: E-learning | Linux | Security

Everyday we learn about new cyber attacks against large organizations, which are coming to the realization that nothing is safe in the modern world. In this course, Linux Host Security, you will gain the the skills needed to start your Linux server down and protect your precious data and resources. First, you will learn to tune the Linux Kernel using the procfs and sysctl. Next, you will discover how much traceability you lose when you have not installed the Linux Audit System. Finally, you will explore how to deploy the Integrated Identity Management tool, FreeIPA Server on CentOS 7. When you're done with this course, you will have the skills and knowledge of Linux Security that you need to harden your Linux Servers.
Download Now
Read More
Category: Tutorial
[/center]
[center]Cloud Security: Introduction to Certified Cloud Security Professional (CCSP)
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour 17M | 96 MB
Genre: eLearning | Language: English

Download Now
Read More
Category: Tutorial
[/center]
[center]Cloud Security Considerations for Government and the Military
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour 42M | 197 MB
Genre: eLearning | Language: English

Download Now
Read More
Category: Tutorial
[/center]
[center]Cloud Security Considerations for General Industry
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 187 MB
Genre: eLearning | Language: English

Download Now
Read More
Category: Tutorial
[/center]
[center]DevSecOps: Continuous Application Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 45M | 108 MB
Genre: eLearning | Language: English

Download Now
Read More
Category: Tutorial
[/center]
[center]Basic security measures for working on the Internet
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 1.88 GB
Duration: 1.5 hours | Genre: eLearning | Language: English

Threat classification and reasons... Practice on Internet Data Protection...

Download Now
Read More
Category: Tutorial
[/center]
[center]Azure Storage Security Guide
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 491 MB
Duration: 1 hours | Genre: eLearning | Language: English

End-to-End Storage Security in WeiRuan-->WeiRuan Azure

Download Now
Read More
Category: Tutorial
Linkedin - Learning Web Security User Authentication and Access Control-QUASAR

Linkedin - Learning Web Security User Authentication and Access Control-QUASAR
English | Size: 142.55 MB
Category: Tutorial

User authentication plays a central role in almost everything we do online. From apps to hardware and websites, user accounts and logins are everywhere. Authentication is critical for verifying a user's identity online and for confirming permissions so individuals can perform privileged actions. In this course instructor Kevin Skoglund teaches you how authentication works how to implement it correctly when building web applications walks you through some of the most common attacks, and shows you how to protect your site. He also demonstrates how to secure your own passwords and digital identity so you can work securely. This course is ideal for all developers, particularly those who are interested in authentication and security
Download Now
Read More
Category: Tutorial
Linkedin - Learning Security Outsourcing Vendor Selection and Management

Linkedin - Learning Security Outsourcing Vendor Selection and Management-RiDWARE
English | Size: 217.71 MB
Category: Tutorial

Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience
Download Now
Read More