Video description
Prerequisites: strong system administration experience and some familiarity with security
If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this course, you'll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you'll know how to secure your data and keep it that way.
Table of contents
- Introduction
- Booting
- Services
- Logging And Log Management
- Intrusion Detection And Prevention
- Users And Permissions
- Utilities
- Kernel
- Firewalls
- Conclusion
- Introduction To Cloud Services
-
Securing The Infrastructure
- Introduction
- Framework
- Policy Samples
- Risk Management Introduction
- Risk Assessment
- Risk Management
- Security Program And CIA
- CIA
- Types Of Security
- Sensitive Data
- Data Classification
- AAA
- Bastion Host - Part 1
- Bastion Host - Part 2
- Configuration Control
- Security Training - Part 1
- Security Training - Part 2
- User Provisioning
- Monitoring And Incident Response
- Incident Response Process
- Preparing For Cloud Use
- The Cloud Services Agreement
- Staying Secure In The Cloud
- Wrap Up
- Introduction
- Legal Issues
- Investigations
- Operating Systems
- Image Acquisition
- Network Acquisitions
- Data Spaces
- Data Recovery
- Virtual Machines
- Mobile Forensics
- Malware Forensics
- About Me
- Getting Started
-
Reversing Compiled Windows Applications
- Vulnerabilities - Part 1
- Vulnerabilities - Part 2
- Vulnerabilities - Part 3
- Using Fuzzing - Part 1
- Using Fuzzing - Part 2
- Using Fuzzing - Part 3
- Using Fuzzing - Part 4
- Just Enough Assembly - Part 1
- Just Enough Assembly - Part 2
- Just Enough Assembly - Part 3
- Stack Overflows - Part 1
- Stack Overflows - Part 2
- Stack Overflows - Part 3
- Heap Overflows - Part 1
- Heap Overflows - Part 2
- Heap Overflows - Part 3
- Heap Overflows - Part 4
- Format String Bugs - Part 1
- Format String Bugs - Part 2
- Format String Bugs - Part 3
- Format String Bugs - Part 4
- Section Overflows
- Windows Kernel Flaws
- Decompilers
- Automation - Part 1
- Automation - Part 2
- Reversing Compiled OS X Applications
-
Reversing Compiled Linux Applications
- Where Are The Vulnerabilities?
- Linux Stack Overflows - Part 1
- Linux Stack Overflows - Part 2
- Linux Stack Overflows - Part 3
- Linux Stack Overflows - Part 4
- Linux Stack Overflows - Part 5
- Linux Heap Overflows - Part 1
- Linux Heap Overflows - Part 2
- Linux Heap Overflows - Part 3
- Linux Heap Overflows - Part 4
- Linux Kernel Flaws - Part 1
- Linux Kernel Flaws - Part 2
- Reversing Android Applications
- Finding Other Vulnerabilities
- Simple Exploits
- Exploit Payloads
- Making Exploits Harder To Detect
- Web Exploitation
- ARM Exploitation
- Future Directions
- Introduction
- 802.11
- Securing Your Wireless Network
- Wireless Attack Tools
- Wireless Attacks
- Access Point Attacks
- Bluetooth
- Other Wireless
- Conclusion
Product information
- Title: Network and Cloud Security
- Author(s):
- Release date: December 2015
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781491952764
You might also like
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …
video
CCNP and CCIE Security Core SCOR 350-701
12+ Hours of Video Instruction More than 12 hours of video instruction and remediation organized to …
video
Hands-On Network Scanning with Nmap for Network Security
Do you want to enhance your organization’s network security? Are you worried about what could happen …
book
Network Security, Firewalls, and VPNs, 3rd Edition
Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business …