Security Operations 13-8: Netflow vs SNMP vs Syslog
TechKnowSurge
Security Operations 13-8: Netflow vs SNMP vs Syslog
1:43
Security Operations 13-7: Logging
TechKnowSurge
Security Operations 13-7: Logging
5:33
Security Operations 13-6: Polling
TechKnowSurge
Security Operations 13-6: Polling
4:13
Security Operations 13-5: Scanning and Probing
TechKnowSurge
Security Operations 13-5: Scanning and Probing
3:47
Security Operations 13-4: Capturing
TechKnowSurge
Security Operations 13-4: Capturing
6:27
Security Operations 13-3: Monitoring Methods
TechKnowSurge
Security Operations 13-3: Monitoring Methods
2:59
Security Operations 13-2: Monitoring Example
TechKnowSurge
Security Operations 13-2: Monitoring Example
9:26
Security Operations 13-1: Monitoring
TechKnowSurge
Security Operations 13-1: Monitoring
5:25
Security Operations 13-0: Module Intro
TechKnowSurge
Security Operations 13-0: Module Intro
3:11
Security Operations 12-6: Automation
TechKnowSurge
Security Operations 12-6: Automation
15:26
Security Operations 12-5: Monitoring, Documentation, and Closure
TechKnowSurge
Security Operations 12-5: Monitoring, Documentation, and Closure
2:39
Security Operations 12-4: Evaluation and Implementation
TechKnowSurge
Security Operations 12-4: Evaluation and Implementation
2:06
Security Operations 12-3: Planning Considerations
TechKnowSurge
Security Operations 12-3: Planning Considerations
8:16
Security Operations 12-2: Change Management
TechKnowSurge
Security Operations 12-2: Change Management
6:48
Security Operations 12-1: Configuration vs Change Management
TechKnowSurge
Security Operations 12-1: Configuration vs Change Management
4:09
Security Operations 12-0: Module Intro
TechKnowSurge
Security Operations 12-0: Module Intro
1:44
Security Operations 11-6: Monitoring and Reporting
TechKnowSurge
Security Operations 11-6: Monitoring and Reporting
1:21
Security Operations 11-5: Awareness Testing
TechKnowSurge
Security Operations 11-5: Awareness Testing
4:06
Security Operations 11-4: Delivery
TechKnowSurge
Security Operations 11-4: Delivery
2:04
Security Operations 11-3: Security Training Content
TechKnowSurge
Security Operations 11-3: Security Training Content
3:19
Security Operations 11-2: Training
TechKnowSurge
Security Operations 11-2: Training
5:11
Security Operations 11-1: Awareness
TechKnowSurge
Security Operations 11-1: Awareness
5:51
Security Operations 11-0: Module Intro
TechKnowSurge
Security Operations 11-0: Module Intro
1:26
Security Operations 10-16: Physical Access Control
TechKnowSurge
Security Operations 10-16: Physical Access Control
6:25
Security Operations 10-15: Access Control Models
TechKnowSurge
Security Operations 10-15: Access Control Models
9:29
Security Operations 10-14: Access Control
TechKnowSurge
Security Operations 10-14: Access Control
10:25
Security Operations 10-13: Identity Proofing
TechKnowSurge
Security Operations 10-13: Identity Proofing
1:39
Security Operations 10-12: Federation
TechKnowSurge
Security Operations 10-12: Federation
4:28
Security Operations 10-11: Single Sign-On (SSO)
TechKnowSurge
Security Operations 10-11: Single Sign-On (SSO)
5:09
Security Operations 10-10: IAM Policies and Enforcement
TechKnowSurge
Security Operations 10-10: IAM Policies and Enforcement
6:19
Security Operations 10-9: HOTP and TOTP
TechKnowSurge
Security Operations 10-9: HOTP and TOTP
7:51
Security Operations 10-8: One-Time Passwords (OTP)
TechKnowSurge
Security Operations 10-8: One-Time Passwords (OTP)
3:25
Security Operations 10-7: Multi Factor Authentication (MFA)
TechKnowSurge
Security Operations 10-7: Multi Factor Authentication (MFA)
5:40
Security Operations 10-6: Key Storage
TechKnowSurge
Security Operations 10-6: Key Storage
2:07
Security Operations 10-5: Privileged Access Management (PAM)
TechKnowSurge
Security Operations 10-5: Privileged Access Management (PAM)
6:17
Security Operations 10-4: Password Manager
TechKnowSurge
Security Operations 10-4: Password Manager
7:42
Security Operations 10-3: What Makes a Good Password
TechKnowSurge
Security Operations 10-3: What Makes a Good Password
21:57
Security Operations 10-2: Authentication, Authorization, and Accounting (AAA)
TechKnowSurge
Security Operations 10-2: Authentication, Authorization, and Accounting (AAA)
3:27
Security Operations 10-1: Identity and Access Management (IAM)
TechKnowSurge
Security Operations 10-1: Identity and Access Management (IAM)
4:49
Security Operations 10-0: Module Intro
TechKnowSurge
Security Operations 10-0: Module Intro
3:34
Security Operations 9-7: Mandatory Vacations
TechKnowSurge
Security Operations 9-7: Mandatory Vacations
2:11
Security Operations 9-6: Job Rotation
TechKnowSurge
Security Operations 9-6: Job Rotation
4:10
Security Operations 9-5: Separation of Duties
TechKnowSurge
Security Operations 9-5: Separation of Duties
5:11
Security Operations 9-4: Need to Know
TechKnowSurge
Security Operations 9-4: Need to Know
3:35
Security Operations 9-3: Least Privilege
TechKnowSurge
Security Operations 9-3: Least Privilege
3:53
Security Operations 9-2: Onboarding and Termination Procedures
TechKnowSurge
Security Operations 9-2: Onboarding and Termination Procedures
4:59
Security Operations 9-1: Personnel Management
TechKnowSurge
Security Operations 9-1: Personnel Management
11:38
Security Operations 9-0: Module Intro
TechKnowSurge
Security Operations 9-0: Module Intro
3:01
Security Operations 8-8: Vendor Monitoring and Termination
TechKnowSurge
Security Operations 8-8: Vendor Monitoring and Termination
4:19
Security Operations 8-7: Agreement Types
TechKnowSurge
Security Operations 8-7: Agreement Types
10:30
Security Operations 8-6: Vendor Selection
TechKnowSurge
Security Operations 8-6: Vendor Selection
2:28
Security Operations 8-5: Supply Chain Management
TechKnowSurge
Security Operations 8-5: Supply Chain Management
4:52
Security Operations 8-4: Cloud Hosting Considerations
TechKnowSurge
Security Operations 8-4: Cloud Hosting Considerations
5:34
Security Operations 8-3: Vendor Assessment
TechKnowSurge
Security Operations 8-3: Vendor Assessment
13:30
Security Operations 8-2: Gathering Requirements
TechKnowSurge
Security Operations 8-2: Gathering Requirements
9:06
Security Operations 8-1: Vendor Management
TechKnowSurge
Security Operations 8-1: Vendor Management
5:25
Security Operations 8-0: Module Intro
TechKnowSurge
Security Operations 8-0: Module Intro
5:16
Security Operations 7-15: Data Retention and Retirement
TechKnowSurge
Security Operations 7-15: Data Retention and Retirement
5:29
Security Operations 7-14: Data Loss Prevention
TechKnowSurge
Security Operations 7-14: Data Loss Prevention
3:34
Security Operations 7-13: Data Loss Detection
TechKnowSurge
Security Operations 7-13: Data Loss Detection
3:35
Security Operations 7-12: Data Masking and Obfuscation
TechKnowSurge
Security Operations 7-12: Data Masking and Obfuscation
10:42
Security Operations 7-11: Steganography
TechKnowSurge
Security Operations 7-11: Steganography
5:37
Security Operations 7-10: Encrypting Data
TechKnowSurge
Security Operations 7-10: Encrypting Data
5:37
Security Operations 7-9: Keeping Data Confidential
TechKnowSurge
Security Operations 7-9: Keeping Data Confidential
7:19
Security Operations 7-8: Data States
TechKnowSurge
Security Operations 7-8: Data States
3:46
Security Operations 7-7: Data Protection
TechKnowSurge
Security Operations 7-7: Data Protection
6:48
Security Operations 7-6: Data Inventory and Data Labeling
TechKnowSurge
Security Operations 7-6: Data Inventory and Data Labeling
2:58
Security Operations 7-5: Data Classifications
TechKnowSurge
Security Operations 7-5: Data Classifications
4:56
Security Operations 7-4: Personally Identifiable Information (PII)
TechKnowSurge
Security Operations 7-4: Personally Identifiable Information (PII)
9:08
Security Operations 7-3: Data Types
TechKnowSurge
Security Operations 7-3: Data Types
3:25
Security Operations 7-2: Compliance, Privacy, and Data Roles
TechKnowSurge
Security Operations 7-2: Compliance, Privacy, and Data Roles
7:31
Security Operations 7-1: Data Management
TechKnowSurge
Security Operations 7-1: Data Management
5:13
Security Operations 7-0: Module Intro
TechKnowSurge
Security Operations 7-0: Module Intro
1:56
Security Operations 6-17: Patch Management
TechKnowSurge
Security Operations 6-17: Patch Management
8:41
Security Operations 6-16: Validation of Remediation
TechKnowSurge
Security Operations 6-16: Validation of Remediation
1:44
Security Operations 6-15: Vulnerability Remediation
TechKnowSurge
Security Operations 6-15: Vulnerability Remediation
7:51
Security Operations 6-14: Action Plan
TechKnowSurge
Security Operations 6-14: Action Plan
1:53
Security Operations 6-13: Prioritization and Escalation
TechKnowSurge
Security Operations 6-13: Prioritization and Escalation
2:50
Security Operations 6-12: Vulnerability Analysis and (Re-)Classification
TechKnowSurge
Security Operations 6-12: Vulnerability Analysis and (Re-)Classification
3:10
Security Operations 6-11: Vulnerability Validation
TechKnowSurge
Security Operations 6-11: Vulnerability Validation
3:26
Security Operations 6-10: Reporting
TechKnowSurge
Security Operations 6-10: Reporting
3:53
Security Operations 6-9: Red Teams and Blue Teams
TechKnowSurge
Security Operations 6-9: Red Teams and Blue Teams
2:28
Security Operations 6-8: Penetration Testing (Pentesting)
TechKnowSurge
Security Operations 6-8: Penetration Testing (Pentesting)
8:16
Security Operations 6-7: Vulnerability Scanner Settings and Considerations
TechKnowSurge
Security Operations 6-7: Vulnerability Scanner Settings and Considerations
16:18
Security Operations 6-6: Vulnerability Scans
TechKnowSurge
Security Operations 6-6: Vulnerability Scans
8:11
Security Operations 6-5: Discovering Application Vulnerabilities
TechKnowSurge
Security Operations 6-5: Discovering Application Vulnerabilities
5:57
Security Operations 6-4: Discovering Vulnerabilities
TechKnowSurge
Security Operations 6-4: Discovering Vulnerabilities
7:24
Security Operations 6-3: Common Vulnerability Scoring System (CVSS)
TechKnowSurge
Security Operations 6-3: Common Vulnerability Scoring System (CVSS)
12:09
Security Operations 6-2: Common Vulnerabilities and Exposures (CVE)
TechKnowSurge
Security Operations 6-2: Common Vulnerabilities and Exposures (CVE)
3:42
Security Operations 6-1: Vulnerability Management
TechKnowSurge
Security Operations 6-1: Vulnerability Management
13:47
Security Operations 6-0: Module Intro
TechKnowSurge
Security Operations 6-0: Module Intro
4:42
Security Operations 5-5: Decommissioning and Disposal
TechKnowSurge
Security Operations 5-5: Decommissioning and Disposal
7:14
Security Operations 5-4: Monitoring and Asset tracking
TechKnowSurge
Security Operations 5-4: Monitoring and Asset tracking
4:45
Security Operations 5-3: Assignment and Accounting
TechKnowSurge
Security Operations 5-3: Assignment and Accounting
2:55
Security Operations 5-2: Acquisition and Procurement
TechKnowSurge
Security Operations 5-2: Acquisition and Procurement
7:57
Security Operations 5-1: Asset Management
TechKnowSurge
Security Operations 5-1: Asset Management
10:36
Security Operations 5-0: Module Intro
TechKnowSurge
Security Operations 5-0: Module Intro
2:18
Security Operations 4-23: Planning and Prioritization
TechKnowSurge
Security Operations 4-23: Planning and Prioritization
7:14
Security Operations 4-22: DEMO: ROI Worksheet
TechKnowSurge
Security Operations 4-22: DEMO: ROI Worksheet
3:39
Security Operations 4-21: Calculating Return On Investment (ROI)
TechKnowSurge
Security Operations 4-21: Calculating Return On Investment (ROI)
9:40