Pluralsight – Building a CyberSecurity Home Lab Environment

Pluralsight – Building a CyberSecurity Home Lab Environment
English | Size: 374.61 MB
Category: Security


As a cybersecurity professional, it is imperative that you establish a “laboratory” for you to practice your skills and test new vulnerabilities. Just as with any discipline, before you take your skills to the real world you need to practice, practice, and then practice some more. The time to learn a new tool or “try something out” isn’t during an engagement.

Lynda – Cybersecurity with Cloud Computing

Lynda – Cybersecurity with Cloud Computing-APoLLo
English | Size: 333.46 MB
Category: Tutorial


More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He introduces concepts such as software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) and the different deployment models available. He then reviews offerings from Microsoft Azure, Amazon Web Services, and Google Apps. Malcolm also shows the Security as a Service (SecaaS) capability of each platform, which can be used to identify unauthorized access and put cloud security defenses like encryption, logging, and monitoring into place.

Cybersecurity with Cloud Computing

Cybersecurity with Cloud Computing
English | Size: 331.7 MB
Category: Cloud-Comp | Security


More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He introduces concepts such as software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) and the different deployment models available. He then reviews offerings from Microsoft Azure, Amazon Web Services, and Google Apps. Malcolm also shows the Security as a Service (SecaaS) capability of each platform, which can be used to identify unauthorized access and put cloud security defenses like encryption, logging, and monitoring into place.

PluralSight – Closing The Cybersecurity Talent Gap

PluralSight – Closing The Cybersecurity Talent Gap-NOLEDGE
English | Size: 292.91 MB
Category: Tutorial


BSides Huntsville | Closing the Cybersecurity Talent Gap | Ben McGee
Ever wonder how much your skills are worth to an employer? Are you ready to make the big bucks in the cyber security industry? The cyber threats of tomorrow demand that highly skilled workers be ready and able to solve complex problems and mitigate complex issues. The huge demand for cyber security professionals outweighs the current supply, thus it continues to favor technical professionals who are eager to learn and are enthusiastic about working in the cyber security field. Do you already have a cyber security skillset and want to know if your skillset is in demand? Are you looking to dive into the field of cyber security and need to know what skills and training are necessary to enter into this career field? What are the salary expectations for professionals in the cyber security field? Once you join the field, what skills and additional training do you need to stay on top of the pay scale? Join cyber security expert Ben McGee of CyberProtex for a discussion of these issues as he lays out the details for best preparing yourself for a career in cyber security and how to move up the career chain once there.

Lynda – Risk Management for IT and Cybersecurity Managers

Lynda – Risk Management for IT and Cybersecurity Managers-APoLLo
English | Size: 519.26 MB
Category: CBTs


Curious about why leaders at your organization decided not to fund your project? In this course, get an inside look at how cybersecurity and information technology (IT) managers use a preliminary risk analysis to determine which projects to pass on and which ones to support with funding. Instructor Jason Dion goes over the terms used by executives and managers when discussing risk management, including what it means to mitigate, transfer, avoid, and accept risk. He also digs into the two methods you can use to calculate risk: qualitative and quantitative risk measurement. To lend these concepts a real-world context, Jason dives into a case study. Upon wrapping up this course, you’ll have the knowledge you need to build a more compelling business case for your projects.