BENEFITS
Best Seller
Online Courses
24/7 Support
Lifetime Access
Get Certificate
Offer Curriculum
Available in
days
days
after you enroll
- 1. Overview (4:54)
- 2. Services - Discussion (28:43)
- 3. Segmentation - Discussion (21:10)
- 4. Services & Segmentation - Scenarios (27:22)
- 5. DeperimeterizationZero Trust (17:30)
- 6. Merging of Networks (21:46)
- 7. Software-defined Networking (SDN) (18:38)
- 8. Infrastructure Design - Discussion (25:34)
- 9. Infrastructure Design - Scenarios (22:32)
- 10. Baselines & Templates & Software Assurance (25:41)
- 11. Integrating Enterprise Applications (10:38)
- 12. Security in the Development Lifecycle (25:08)
- 13. Securing Enterprise Architecture (26:23)
- 14. Authentication & Authorization - Discussion (24:11)
- 15. Authentication & Authorization - Scenarios (20:32)
- 16. Secure Cloud & Virtualization (26:05)
- 17. Cryptography & PKI (25:52)
- 18. Impact of Emerging Technologies (27:10)
- 19. Security Architecture - Key Points (14:59)
- 20. Perform Threat Management (24:51)
- 21. Indicators of Compromise & Response (27:35)
- 22. Vulnerability Management Activities (22:21)
- 23. Vulnerability Assessment - Methods & Tools (27:15)
- 24. Analyze Vulnerabilities - Vulnerabilities (26:29)
- 25. Analyze Vulnerabilities - Vulnerable Systems (24:42)
- 26. Analyze Vulnerabilities - Attacks (28:12)
- 27. Use Processes to Reduce Risk (25:13)
- 28. Triage & Incident Response (23:07)
- 29. Forensic Concepts (21:02)
- 30. File Carving & Binary Analysis (27:35)
- 31. Analysis Tools (27:28)
- 32. Live Collection Tools (24:49)
- 33. Security Operations - Key Points (15:57)
- 34. Managed Configurations (27:16)
- 35. Deployment Scenarios (12:57)
- 36. Security Considerations (24:34)
- 37. Hardening Techniques (22:06)
- 38. Processes (25:10)
- 39. Mandatory Access Control (15:04)
- 40. Trustworthy Computing (27:18)
- 41. Compensating Controls (9:35)
- 42. Security Considerations - Embedded (15:58)
- 43. Security Considerations - ICS-SCADA (22:07)
- 44. Security Considerations - Protocols (24:46)
- 45. Security Considerations - Sectors (8:45)
- 46. Cloud Technology - Basics (26:18)
- 47. Cloud Technology - Advanced (26:31)
- 48. PKI - Basics (28:04)
- 49. PKI - Advanced (27:17)
- 50. Hashing & Symmetric Algorithms (27:29)
- 51. Asymmetric Algorithms & Protocols (28:22)
- 52. Troubleshoot Cryptography - Keys (13:26)
- 53. Security Engineering & Cryptography - Key Points (12:23)
- 54. Troubleshoot Cryptography - Misconfigurations (17:37)
- 55. Risk Assessment (26:50)
- 56. Risk Handling Techniques (17:51)
- 57. Risk Types (15:46)
- 58. Risk Management Life Cycle (20:57)
- 59. Risk Tracking (25:20)
- 60. Policies and Security Practices (23:55)
- 61. Shared Responsibility Model - Cloud (15:41)
- 62. Performing Vendor Assessments (19:42)
- 63. Technical Considerations (15:33)
- 64. Data Considerations (25:42)
- 65. Regulations Accreditations & Standards (28:14)
- 66. Legal Considerations (16:48)
- 67. Contract and Agreement Types (14:12)
- 68. Business Impact Analysis (BIA) (25:05)
- 69. Privacy Impact Assessment (10:20)
- 70. Disaster Recovery & Business Continuity Planning (15:23)
- 71. Incident Response Plan (16:29)
- 72. Testing Plans (26:12)
- 73. Governance, Risk & Compliance - Key Points (16:16)
Exclusive Offer