BENEFITS
Best Seller
Online Courses
24/7 Support
Lifetime Access
Get Certificate
Offer Curriculum
Defence in Depth
Available in
days
days
after you enroll
- 1. Introduction to Defence in Depth (1:32)
- 2. How to use Defence in Depth model (5:45)
- 3. DiD OS and LAN Layers (6:39)
- 4. DiD Perimeter and Physical Access Layers (6:06)
- 5. DiD Demonstration (2:48)
- 6. Automated attack targeting a service (5:23)
- 7. Automated user-targeting attack (4:31)
- 9. Introduction to Immutable laws of security - Law #1 (4:35)
- 10. Law #2 (2:56)
- 11. Law #3 (2:23)
- 12. Law #4 (1:52)
- 13. Law #5 (3:28)
- 14. Law #6 (2:07)
- 15. Law #7 (1:11)
- 16. Law #8 (1:43)
- 17. Law #9 (3:57)
- 18. Law #10 (0:48)
- 19. Laws for administrators (5:59)
Disaster Recovery
Available in
days
days
after you enroll
- 1. Introduction to Disaster Recovery (1:33)
- 2. How to reduce losses (5:24)
- 3. Ensuring continous availability (4:08)
- 4. Threat discovery #1 (4:28)
- 5. Threat discovery #2 (3:40)
- 6. Audit users and keep control accounts (5:18)
- 7. High risk users (3:23)
- 8. Collecting and analysing evidence (7:13)
- 9. Forensics example (3:52)
- 10. CONFICKER CASE STUDY (7:11)
Exclusive Offer