Enterprise Defense Administrator (eEDA) INE
Language: English | Size:19.21 GB
Genre:eLearning
Files Included :
01-Course Introduction.mp4 (41.97 MB)
MP4
01-What is Security Engineering.mp4 (84.85 MB)
MP4
02-Perimeter Security.mp4 (221.23 MB)
MP4
03-Network Security.mp4 (228.85 MB)
MP4
04-Endpoint Security.mp4 (217.52 MB)
MP4
01-Introduction to Change Management.mp4 (40.83 MB)
MP4
02-Types of Change & Change Environments.mp4 (196.44 MB)
MP4
03-Change Management Process.mp4 (245.66 MB)
MP4
04-Governance, Risk, and Compliance.mp4 (209.34 MB)
MP4
01-Course Conclusion.mp4 (18.46 MB)
MP4
02 1-Course Introduction.ts (37.46 MB)
TS
02 2 1-Introduction to Security Hardening.ts (165.72 MB)
TS
02 2 2-Guidelines, Baselines, & Frameworks.ts (203.12 MB)
TS
02 3 1-Network Perimeter.ts (213.48 MB)
TS
02 3 2-Securing Network Devices.ts (309.99 MB)
TS
02 4 1-Windows Servers.ts (231.27 MB)
TS
02 4 2-Active Directory.ts (303.39 MB)
TS
02 4 3-Windows Server Hardening Demo.ts (84.97 MB)
TS
02 4 4-Active Directory Hardening Demo.ts (104.87 MB)
TS
02 5 1-Windows Workstations & Applications.ts (268.5 MB)
TS
02 5 2-Linux Hardening.ts (166.82 MB)
TS
02 5 3-Securing Linux Demo.ts (110.66 MB)
TS
02 5 4-Other Endpoints & Systems.ts (217.91 MB)
TS
02 6-Conclusion.ts (12.05 MB)
TS
03 1-Course Introduction.ts (49.42 MB)
TS
03 2 1-Security Sensor Introduction.ts (137.71 MB)
TS
03 2 2-Logging Introduction.ts (200.54 MB)
TS
03 3 1-Network Sensors.ts (187.67 MB)
TS
03 3 2-Host Sensors.ts (174.85 MB)
TS
3 4 1-Centralized Logging.ts (250.53 MB)
TS
3 4 2-SIEM.ts (162.5 MB)
TS
3 4 3-SIEM Demo.ts (159.61 MB)
TS
3 4 4-Logging Formats & Normalization.ts (144.18 MB)
TS
3 4 5-Continuous Monitoring & Alerting.ts (186.18 MB)
TS
3 4 6-Storage Management.ts (217.24 MB)
TS
3 5 1-Manual Log Review.ts (80.54 MB)
TS
3 5 2-Automated Log Analysis.ts (188.86 MB)
TS
3 5 3-SOAR Introduction.ts (140.07 MB)
TS
3 6 1-Conculsion.ts (40.7 MB)
TS
4 1 1-Introduction.ts (44.91 MB)
TS
4 2 1-Identity & Access Management.ts (104.07 MB)
TS
4 2 2-Authentication, Authorization, & Accountability.ts (129.13 MB)
TS
4 3 1-Authentication Types.ts (211.82 MB)
TS
4 3 2-Password Management.ts (269.81 MB)
TS
4 3 3-Just-in-Time Access.ts (109.95 MB)
TS
4 4 1-Authorization Mechanisms.ts (193.36 MB)
TS
4 4 2-Authentication & Authorization Systems.ts (186.55 MB)
TS
4 4 3-Identity Management.ts (208.38 MB)
TS
4 4 4-Identity & Access Management with Active Directory.ts (113.2 MB)
TS
4 5 1-Accounting & Auditing.ts (209.21 MB)
TS
4 5 2-Identity & Access Lifecycle.ts (176.12 MB)
TS
4 6 1-Conclusion.ts (21.44 MB)
TS
2 2 1-Introduction.ts (27.31 MB)
TS
2 2 1-Vulnerabilities Explained.ts (145.84 MB)
TS
2 2 2-Discovery of Vulnerabilities.ts (87.32 MB)
TS
2 2 3-History of Vulnerabilities & Malware.ts (312.5 MB)
TS
2 3 1-Introduction to Vulnerability Scanning.ts (147.63 MB)
TS
2 3 2-Scanning Process.ts (283.72 MB)
TS
2 3 3-Vulnerability Scanners.ts (170.56 MB)
TS
2 3 4-Vulnerability Scanner Demo.ts (73.97 MB)
TS
2 3 5-Inventory Scanning.ts (22.16 MB)
TS
2 4 1-Introduction to Vulnerability Scoring.ts (78.52 MB)
TS
2 4 2-Vulnerability Information Resources.ts (138.33 MB)
TS
2 4 3-Score Interpretation.ts (148.02 MB)
TS
2 5 1-Vulnerability Risk Analysis.ts (271.53 MB)
TS
2 5 2-Vulnerability Reporting.ts (229.74 MB)
TS
2 5 3-Vulnerability Operations Management.ts (280.54 MB)
TS
2 6 1-Conclusion.ts (22.79 MB)
TS
01-Course Introduction.ts (54.16 MB)
TS
01-Introduction to Security Management.ts (148.46 MB)
TS
02-GRC Introduction.ts (151.73 MB)
TS
01-Governance Basics.ts (159 MB)
TS
02-Organizational Roles & Responsibilities.ts (194.01 MB)
TS
03-Policies, Procedures, & Standards.ts (217.2 MB)
TS
04-Training & Ethics.ts (272.26 MB)
TS
01-Training & Ethics.ts (186.24 MB)
TS
02-Risk Assessments & Methodologies.ts (143.42 MB)
TS
03-Risk Response, Monitoring, & Reporting.ts (177.14 MB)
TS
01-Compliance Basics.ts (66.67 MB)
TS
02-Laws & Regulations.ts (172.65 MB)
TS
03-Privacy & Liability.ts (158.45 MB)
TS
04-Maintaining Compliance.ts (188.34 MB)
TS
01-Introduction to Frameworks.ts (84.28 MB)
TS
02-Risk Management Frameworks.ts (106.54 MB)
TS
03-Security Controls & Programs.ts (147.58 MB)
TS
04-Other Frameworks & Concepts.ts (103.29 MB)
TS
01-Conclusion.ts (45.33 MB)
TS
3 1 1-Course Introduction.ts (49.6 MB)
TS
3 2 1-Perimeter Introduction.ts (122.5 MB)
TS
3 2 2-Network Introduction.ts (99.92 MB)
TS
3 3 1-Securing Firewalls.ts (256.41 MB)
TS
3 3 2-Firewall Demo.ts (68.59 MB)
TS
3 3 3-DMZ Security.ts (290.01 MB)
TS
3 3 4-Remote Access.ts (229.82 MB)
TS
3 3 5-DNS Security.ts (202.15 MB)
TS
3 3 6-Other Perimeter Considerations.ts (124.57 MB)
TS
3 4 1-Network Segmentation.ts (180.44 MB)
TS
3 4 2-Switches & Routers.ts (378.79 MB)
TS
3 4 3-Wireless Security.ts (256.07 MB)
TS
3 4 4-Logging & Analysis.ts (251.34 MB)
TS
3 4 5-Wireshark Introduction.ts (112.7 MB)
TS
3 4 6-Wireshark Demo.ts (107.57 MB)
TS
3 4 7-Other Internal Network Considerations.ts (173.83 MB)
TS
3 5 1-Course Conclusion.ts (30.68 MB)
TS
3 2 1-Introduction.ts (56.56 MB)
TS
3 2 1-Basic Security Principles.ts (157.64 MB)
TS
3 2 2-What is Secure Architecture.ts (150.6 MB)
TS
3 2 3 1-General Principles of Secure Architecture.ts (149.12 MB)
TS
3 2 3 2-Secure Architecture Goals.ts (134.8 MB)
TS
3 2 3 3-Secure the Users.ts (174.69 MB)
TS
3 2 3 4-Secure Infrastructure.ts (264.28 MB)
TS
3 2 4 1-Threat Modeling.ts (172.26 MB)
TS
3 2 4 2-Secure Architecture Planning.ts (206.72 MB)
TS
3 2 4 3-Creating a Secure Network.ts (218.93 MB)
TS
3 2 4 4-Logging.ts (205.5 MB)
TS
3 2 4 5-Disaster Recovery.ts (200.78 MB)
TS
3 2 4 6-Documenting the Secure Architecture.ts (155.59 MB)
TS
3 2 5 1-Conclusion.ts (26.08 MB)
TS
01-Course Introduction.ts (49.55 MB)
TS
4 2 1-Documentation.ts (210.48 MB)
TS
4 2 2-Evaluating Existing Networks.ts (324.02 MB)
TS
4 2 3-Creating New Secure Networks.ts (290.61 MB)
TS
4 3 1-Course Conclusion.ts (126.94 MB)
TS