PluralSight – Security Event Triage Leveraging Existing Security Device Alerts

PluralSight – Security Event Triage Leveraging Existing Security Device Alerts-JGTiSO
English | Size: 167.70 MB
Category: Tutorial

Identifying suspicious network activity can prevent serious security breaches. By monitoring centralized device logs you can catch potential security problems in a timely manner.

Udemy – Wireshark in 60 minutes – Video Course

Udemy – Wireshark in 60 minutes – video course
English | Size: 155.02 MB
Category: Tutorial

Wireshark tutorial – learn one of the most important tool every programmer and network admin should know.

Wireshark is the most powerful network analysis tool every coder should know. After you learn it it’ll become one of the most important application in your toolbox.

Linkedin Learning – Security for the SMB Implementing the NIST Framework

Linkedin Learning – Security for the SMB Implementing the NIST Framework-ZH
English | Size: 210.54 MB
Category: Tutorial

Cybersecurity incidents impact organizations of all sizes, in all sectors. Small and medium businesses (SMBs) may not have the same infrastructure or resources for security, but face the same risks. In this course, Ron Woerner explains how to secure SMB assets, systems, and networks, leveraging the five functions of the National Institute of Standards and Technology (NIST) Cybersecurity Framework identify, protect, detect, respond, and recover as a scaffold for creating a robust cybersecurity program. Learn how to identify your assets and necessary levels of access, set up defenses such as firewalls and encryption monitor your systems, create an effective incident response plan and use backups and cloud services to ensure you can recover and resume operations as quickly as possible