PluralSight – Closing The Cybersecurity Talent Gap

PluralSight – Closing The Cybersecurity Talent Gap-NOLEDGE
English | Size: 292.91 MB
Category: Tutorial


BSides Huntsville | Closing the Cybersecurity Talent Gap | Ben McGee
Ever wonder how much your skills are worth to an employer? Are you ready to make the big bucks in the cyber security industry? The cyber threats of tomorrow demand that highly skilled workers be ready and able to solve complex problems and mitigate complex issues. The huge demand for cyber security professionals outweighs the current supply, thus it continues to favor technical professionals who are eager to learn and are enthusiastic about working in the cyber security field. Do you already have a cyber security skillset and want to know if your skillset is in demand? Are you looking to dive into the field of cyber security and need to know what skills and training are necessary to enter into this career field? What are the salary expectations for professionals in the cyber security field? Once you join the field, what skills and additional training do you need to stay on top of the pay scale? Join cyber security expert Ben McGee of CyberProtex for a discussion of these issues as he lays out the details for best preparing yourself for a career in cyber security and how to move up the career chain once there.

Lynda – Risk Management for IT and Cybersecurity Managers

Lynda – Risk Management for IT and Cybersecurity Managers-APoLLo
English | Size: 519.26 MB
Category: CBTs


Curious about why leaders at your organization decided not to fund your project? In this course, get an inside look at how cybersecurity and information technology (IT) managers use a preliminary risk analysis to determine which projects to pass on and which ones to support with funding. Instructor Jason Dion goes over the terms used by executives and managers when discussing risk management, including what it means to mitigate, transfer, avoid, and accept risk. He also digs into the two methods you can use to calculate risk: qualitative and quantitative risk measurement. To lend these concepts a real-world context, Jason dives into a case study. Upon wrapping up this course, you’ll have the knowledge you need to build a more compelling business case for your projects.

Cybersecurity Attacks – Red Team Strategies

Cybersecurity Attacks – Red Team Strategies
English | Size: 192.67 MB
Category: Security

Learn about the foundational tactics, techniques and procedures to elevate your red teaming skills and enhance the overall security posture of your organization by leveraging homefield advantage.

Packt – Cybersecurity Attack and Defense Strategies 2 Ed

Cybersecurity Attack and Defense Strategies 2 Ed
English | Size: 237.22 MB
Category: Security

Learn
The importance of having a solid foundation for your security posture
Use cyber security kill chain to understand the attack strategy
Boost your organization’s cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence