Defensive Security Concepts
Language: English | Size:5.46 GB
Genre:eLearning
Files Included :
1 Introduction The Journey into Defensive Security Concepts.mp4 (19.91 MB)
MP4
10 A Detailed Overview of the Security Toolset Architecture.mp4 (402.58 MB)
MP4
11 Integration and Coordination of Security Tools.mp4 (392.06 MB)
MP4
12 The Importance of Access Control in Cybersecurity.mp4 (404.33 MB)
MP4
13 Understanding DAC, MAC, and RBAC Models.mp4 (255.65 MB)
MP4
14 Implementing and Managing Access Controls.mp4 (300.87 MB)
MP4
15 Understanding the CVSS Framework.mp4 (313.54 MB)
MP4
16 Introduction to CVSS Terms and Scoring System.mp4 (102.32 MB)
MP4
17 Applying CVSS in Vulnerability Management.mp4 (47.41 MB)
MP4
18 The Importance of Data Visibility in Cybersecurity.mp4 (167.28 MB)
MP4
19 Strategies for Data Visibility.mp4 (140.66 MB)
MP4
2 The Importance of Cyber Security in Today's World.mp4 (697.83 MB)
MP4
20 Case Studies of Data Visibility in Action.mp4 (67.7 MB)
MP4
21 Unpacking the 5-tuple Approach for Host Isolation.mp4 (72.69 MB)
MP4
22 Using the 5-tuple Approach.mp4 (86.06 MB)
MP4
23 Overview of Rule-based, Behavioral, and Statistical Detection Methods.mp4 (165.05 MB)
MP4
24 Implementing Different Detection Methods.mp4 (204.1 MB)
MP4
25 Comparing Detection Approaches Rule-based, Behavioral, and Statistical Methods.mp4 (111.96 MB)
MP4
26 Conclusion.mp4 (20.05 MB)
MP4
3 Introduction to Security Terms and Concepts.mp4 (409.98 MB)
MP4
4 Defining Confidentiality, Integrity, and Availability in the CIA Triad.mp4 (146.7 MB)
MP4
5 The Role and Importance of the CIA Triad.mp4 (249.68 MB)
MP4
6 Introduction to Defense-in-Depth Strategy.mp4 (390.77 MB)
MP4
7 Understanding the Principles of Defense-in-Depth Strategy.mp4 (131.56 MB)
MP4
8 Applying Defense-in-Depth Strategy in Real-world Scenarios.mp4 (228.59 MB)
MP4
9 Understanding the Importance of Security Tools.mp4 (61.07 MB)
MP4