Video description
4+ hours of video instruction
Gain an introductory understanding of secure operations and protections concepts.
Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With over 4 hours of video training, the Secure Operations and Protections, 2nd Edition video course explores organizations' strategies, practices, and technologies to protect their systems, networks, and data, ultimately enhancing their overall security posture. Dive into the essential aspects of secure operations, including network security, system hardening, and incident response planning.
Throughout the video course, expert trainer, author and cybersecurity expert Aamir Lakhani uses hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals. This video course teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations.
Topics include:
- System and Network Architecture Concepts
- Efficiency and Process Improvement
- Recommended Controls to Mitigate Attacks and Software Vulnerabilities
- Analyzing Data to Prioritize Vulnerabilities
About the Instructor:
Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations.
Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. Mr. Lakhani is considered an industry leader for creating detailed security architectures within complex computing environments. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet’s dark security movement. He is the author or contributor of several books, and has appeared on FOX Business News, National Public Radio, and other media outlets as an expert on cybersecurity.
Writing under the pseudonym Dr. Chaos, Mr. Lakhani also operates the popular security social media blog which is hosted at DrChaos.com. In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as “a blogger, InfoSec specialist, super hero…and all around good guy.”
Skill Level:
- Beginner
Learn How To:
- Protect data and secure an organizations operation in their day-to-day business
- Observe, collect, and secure date
- Detect common security encounters and be prepared for them
- Implement processes that allow communication of information in a correct and timely manner
Who Should Take This Course:
- Cybersecurity Professionals
- Anyone interested in learning cyber security fundamentals.
About Pearson Video Training:
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Table of contents
- Introduction
- Lesson 1: Importance of System and Network Architecture Concepts in Security Operations
- Lesson 2: Importance of Efficiency and Process Improvement in Security Operations
-
Lesson 3: Recommend Controls to Mitigate Attacks and Software Vulnerabilities
- Learning objectives
- 3.1 Cross-site scripting
- 3.2 Overflow vulnerabilities
- 3.3 Data poisoning
- 3.4 Broken access control
- 3.5 Cryptographic failures
- 3.6 Injection flaws
- 3.7 Cross-site request forgery
- 3.8 Directory traversal
- 3.9 Insecure design
- 3.10 Security misconfiguration
- 3.11 End-of-life or outdated components
- 3.12 Identification and authentication failures
- 3.13 Server-side request forgery
- 3.14 Remote code execution
- 3.15 Privilege escalation
- 3.16 Local file inclusion (LFI)/remote file inclusion (RFI)
-
Lesson 4: Analyze Data to Prioritize Vulnerabilities
- Learning objectives
- 4.1 Compensating controls
- 4.2 Control types
- 4.3 Patching and configuration management
- 4.4 Maintenance windows
- 4.5 Exceptions
- 4.6 Risk management principles
- 4.7 Policies, governance, and service-level objectives (SLOs)
- 4.8 Prioritization and escalation
- 4.9 Attack surface management
- 4.10 Secure coding best practices
- 4.11 Secure software development life cycle (SDLC)
- 4.12 Threat modeling
- Summary
Product information
- Title: Secure Operations and Protections, 2nd Edition
- Author(s):
- Release date: April 2024
- Publisher(s): Pearson
- ISBN: 0135341671
You might also like
video
Secure Operations and Protections
3+ Hours of Video Instruction 3+ hours of introductory training on understanding secure operations and protections …
video
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
Overview: This master class includes the following courses: Threat Intelligence and Threat Hunting, 2nd Edition System …
video
CISSP Certification and Cybersecurity Closer Look Labs (Video Collection)
Overview: 34+ hours of video instruction Description: Now with all the labs for the SYO-701 exam, …
video
Linux Security Techniques
This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures …