PluralSight – Security Event Triage Leveraging Existing Security Device Alerts

PluralSight – Security Event Triage Leveraging Existing Security Device Alerts-JGTiSO
English | Size: 167.70 MB
Category: Tutorial

Identifying suspicious network activity can prevent serious security breaches. By monitoring centralized device logs you can catch potential security problems in a timely manner.

Cloud Academy – Azure Active Directory Security

Cloud Academy – Azure Active Directory Security-STM
English | Size: 314.47 MB
Category: Tutorial

Azure Active Directory Security
Azure Active Directory, commonly referred to as Azure AD is Microsoft s Identity and Access Management service in the Cloud. It manages users, groups, and applications along with their access to other applications and resources running in the cloud. This is exactly what we have with traditional on-premises Active Directory. Azure AD runs as a cloud service and thus can be thought of as Identity and Access Management as a Service. This course is an introduction to Azure AD security and covers topics related to securing users, groups, devices and applications as well as cover hybrid identity infrastructure solutions and much more!

Cloud Academy – AWS Big Data Security Encryption

Cloud Academy – AWS Big Data Security Encryption-STM
English | Size: 802.37 MB
Category: Tutorial

Configuring HDFS Transparent Encryption in Amazon EMR
Using SSL to encrypt a connection a Database
Oracle Native Network Encryption (NNE)
Encrypt and decrypt Amazon Kinesis Records using AWS KMS
Configuring Redshift to use CloudHSM

Linkedin Learning – Security for the SMB Implementing the NIST Framework

Linkedin Learning – Security for the SMB Implementing the NIST Framework-ZH
English | Size: 210.54 MB
Category: Tutorial

Cybersecurity incidents impact organizations of all sizes, in all sectors. Small and medium businesses (SMBs) may not have the same infrastructure or resources for security, but face the same risks. In this course, Ron Woerner explains how to secure SMB assets, systems, and networks, leveraging the five functions of the National Institute of Standards and Technology (NIST) Cybersecurity Framework identify, protect, detect, respond, and recover as a scaffold for creating a robust cybersecurity program. Learn how to identify your assets and necessary levels of access, set up defenses such as firewalls and encryption monitor your systems, create an effective incident response plan and use backups and cloud services to ensure you can recover and resume operations as quickly as possible

PluralSight – Security Leadership Through Effective Communication

PluralSight – Security Leadership Through Effective Communication-JGTiSO
English | Size: 150.17 MB
Category: Tutorial

If you are interested in learning the skills necessary to become a more effective communicator and security leader, then you will benefit from the skills and tactics learned in this course.