Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Mastering Hack Recovery & Security Certification Program
Defence in Depth
1. Introduction to Defence in Depth (1:32)
2. How to use Defence in Depth model (5:45)
3. DiD OS and LAN Layers (6:39)
4. DiD Perimeter and Physical Access Layers (6:06)
5. DiD Demonstration (2:48)
6. Automated attack targeting a service (5:23)
7. Automated user-targeting attack (4:31)
9. Introduction to Immutable laws of security - Law #1 (4:35)
10. Law #2 (2:56)
11. Law #3 (2:23)
12. Law #4 (1:52)
13. Law #5 (3:28)
14. Law #6 (2:07)
15. Law #7 (1:11)
16. Law #8 (1:43)
17. Law #9 (3:57)
18. Law #10 (0:48)
19. Laws for administrators (5:59)
Disaster Recovery
1. Introduction to Disaster Recovery (1:33)
2. How to reduce losses (5:24)
3. Ensuring continous availability (4:08)
4. Threat discovery #1 (4:28)
5. Threat discovery #2 (3:40)
6. Audit users and keep control accounts (5:18)
7. High risk users (3:23)
8. Collecting and analysing evidence (7:13)
9. Forensics example (3:52)
10. CONFICKER CASE STUDY (7:11)
Teach online with
14. Law #6
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock