In this video you will learn about plans, policies & common documentation.
In this video you are going to learn about various hardening & security policies such as: password policy, security policies, data loss prevention, remote access...
In this video you are going to learn about various aspects of high availability such as: high availability measurement; MTTR, MTBF, RTO, & RPO; fault-tolerant...
In this video you will learn the core security concepts pertaining to confidentiality, integrity, & availability.
In this video you will learn about threats, vulnerabilities & exploits; least privilege; role-based access; zero trust; and defense in depth.
In this video you will learn about various aspects related to authentication methods, risk management, and security information & event management (SIEM).
In this video you will learn about various technology-based attacks such as: denial of service, distributed denial of service, on-path attack, DNS poisoning, VLAN hopping,...
In this video you will learn about various human, environmental & other miscellaneous attacks such as: phishing, tailgating, piggybacking, shoulder surfing, packet capture, confidentiality attacks,...
In this video you will learn about best practices for network hardening techniques in addition to wireless security & IoT considerations.
In this video you will learn about VPNs, IPsec with Internet Key Exchange version 1, authentication header & encapsulating security payloads, setting up & tearing...