TechKnowSurge
Security Operations 13-8: Netflow vs SNMP vs Syslog
1:43
TechKnowSurge
Security Operations 13-7: Logging
5:33
TechKnowSurge
Security Operations 13-6: Polling
4:13
TechKnowSurge
Security Operations 13-5: Scanning and Probing
3:47
TechKnowSurge
Security Operations 13-4: Capturing
6:27
TechKnowSurge
Security Operations 13-3: Monitoring Methods
2:59
TechKnowSurge
Security Operations 13-2: Monitoring Example
9:26
TechKnowSurge
Security Operations 13-1: Monitoring
5:25
TechKnowSurge
Security Operations 13-0: Module Intro
3:11
TechKnowSurge
Security Operations 12-6: Automation
15:26
TechKnowSurge
Security Operations 12-5: Monitoring, Documentation, and Closure
2:39
TechKnowSurge
Security Operations 12-4: Evaluation and Implementation
2:06
TechKnowSurge
Security Operations 12-3: Planning Considerations
8:16
TechKnowSurge
Security Operations 12-2: Change Management
6:48
TechKnowSurge
Security Operations 12-1: Configuration vs Change Management
4:09
TechKnowSurge
Security Operations 12-0: Module Intro
1:44
TechKnowSurge
Security Operations 11-6: Monitoring and Reporting
1:21
TechKnowSurge
Security Operations 11-5: Awareness Testing
4:06
TechKnowSurge
Security Operations 11-4: Delivery
2:04
TechKnowSurge
Security Operations 11-3: Security Training Content
3:19
TechKnowSurge
Security Operations 11-2: Training
5:11
TechKnowSurge
Security Operations 11-1: Awareness
5:51
TechKnowSurge
Security Operations 11-0: Module Intro
1:26
TechKnowSurge
Security Operations 10-16: Physical Access Control
6:25
TechKnowSurge
Security Operations 10-15: Access Control Models
9:29
TechKnowSurge
Security Operations 10-14: Access Control
10:25
TechKnowSurge
Security Operations 10-13: Identity Proofing
1:39
TechKnowSurge
Security Operations 10-12: Federation
4:28
TechKnowSurge
Security Operations 10-11: Single Sign-On (SSO)
5:09
TechKnowSurge
Security Operations 10-10: IAM Policies and Enforcement
6:19
TechKnowSurge
Security Operations 10-9: HOTP and TOTP
7:51
TechKnowSurge
Security Operations 10-8: One-Time Passwords (OTP)
3:25
TechKnowSurge
Security Operations 10-7: Multi Factor Authentication (MFA)
5:40
TechKnowSurge
Security Operations 10-6: Key Storage
2:07
TechKnowSurge
Security Operations 10-5: Privileged Access Management (PAM)
6:17
TechKnowSurge
Security Operations 10-4: Password Manager
7:42
TechKnowSurge
Security Operations 10-3: What Makes a Good Password
21:57
TechKnowSurge
Security Operations 10-2: Authentication, Authorization, and Accounting (AAA)
3:27
TechKnowSurge
Security Operations 10-1: Identity and Access Management (IAM)
4:49
TechKnowSurge
Security Operations 10-0: Module Intro
3:34
TechKnowSurge
Security Operations 9-7: Mandatory Vacations
2:11
TechKnowSurge
Security Operations 9-6: Job Rotation
4:10
TechKnowSurge
Security Operations 9-5: Separation of Duties
5:11
TechKnowSurge
Security Operations 9-4: Need to Know
3:35
TechKnowSurge
Security Operations 9-3: Least Privilege
3:53
TechKnowSurge
Security Operations 9-2: Onboarding and Termination Procedures
4:59
TechKnowSurge
Security Operations 9-1: Personnel Management
11:38
TechKnowSurge
Security Operations 9-0: Module Intro
3:01
TechKnowSurge
Security Operations 8-8: Vendor Monitoring and Termination
4:19
TechKnowSurge
Security Operations 8-7: Agreement Types
10:30
TechKnowSurge
Security Operations 8-6: Vendor Selection
2:28
TechKnowSurge
Security Operations 8-5: Supply Chain Management
4:52
TechKnowSurge
Security Operations 8-4: Cloud Hosting Considerations
5:34
TechKnowSurge
Security Operations 8-3: Vendor Assessment
13:30
TechKnowSurge
Security Operations 8-2: Gathering Requirements
9:06
TechKnowSurge
Security Operations 8-1: Vendor Management
5:25
TechKnowSurge
Security Operations 8-0: Module Intro
5:16
TechKnowSurge
Security Operations 7-15: Data Retention and Retirement
5:29
TechKnowSurge
Security Operations 7-14: Data Loss Prevention
3:34
TechKnowSurge
Security Operations 7-13: Data Loss Detection
3:35
TechKnowSurge
Security Operations 7-12: Data Masking and Obfuscation
10:42
TechKnowSurge
Security Operations 7-11: Steganography
5:37
TechKnowSurge
Security Operations 7-10: Encrypting Data
5:37
TechKnowSurge
Security Operations 7-9: Keeping Data Confidential
7:19
TechKnowSurge
Security Operations 7-8: Data States
3:46
TechKnowSurge
Security Operations 7-7: Data Protection
6:48
TechKnowSurge
Security Operations 7-6: Data Inventory and Data Labeling
2:58
TechKnowSurge
Security Operations 7-5: Data Classifications
4:56
TechKnowSurge
Security Operations 7-4: Personally Identifiable Information (PII)
9:08
TechKnowSurge
Security Operations 7-3: Data Types
3:25
TechKnowSurge
Security Operations 7-2: Compliance, Privacy, and Data Roles
7:31
TechKnowSurge
Security Operations 7-1: Data Management
5:13
TechKnowSurge
Security Operations 7-0: Module Intro
1:56
TechKnowSurge
Security Operations 6-17: Patch Management
8:41
TechKnowSurge
Security Operations 6-16: Validation of Remediation
1:44
TechKnowSurge
Security Operations 6-15: Vulnerability Remediation
7:51
TechKnowSurge
Security Operations 6-14: Action Plan
1:53
TechKnowSurge
Security Operations 6-13: Prioritization and Escalation
2:50
TechKnowSurge
Security Operations 6-12: Vulnerability Analysis and (Re-)Classification
3:10
TechKnowSurge
Security Operations 6-11: Vulnerability Validation
3:26
TechKnowSurge
Security Operations 6-10: Reporting
3:53
TechKnowSurge
Security Operations 6-9: Red Teams and Blue Teams
2:28
TechKnowSurge
Security Operations 6-8: Penetration Testing (Pentesting)
8:16
TechKnowSurge
Security Operations 6-7: Vulnerability Scanner Settings and Considerations
16:18
TechKnowSurge
Security Operations 6-6: Vulnerability Scans
8:11
TechKnowSurge
Security Operations 6-5: Discovering Application Vulnerabilities
5:57
TechKnowSurge
Security Operations 6-4: Discovering Vulnerabilities
7:24
TechKnowSurge
Security Operations 6-3: Common Vulnerability Scoring System (CVSS)
12:09
TechKnowSurge
Security Operations 6-2: Common Vulnerabilities and Exposures (CVE)
3:42
TechKnowSurge
Security Operations 6-1: Vulnerability Management
13:47
TechKnowSurge
Security Operations 6-0: Module Intro
4:42
TechKnowSurge
Security Operations 5-5: Decommissioning and Disposal
7:14
TechKnowSurge
Security Operations 5-4: Monitoring and Asset tracking
4:45
TechKnowSurge
Security Operations 5-3: Assignment and Accounting
2:55
TechKnowSurge
Security Operations 5-2: Acquisition and Procurement
7:57
TechKnowSurge
Security Operations 5-1: Asset Management
10:36
TechKnowSurge
Security Operations 5-0: Module Intro
2:18
TechKnowSurge
Security Operations 4-23: Planning and Prioritization
7:14
TechKnowSurge
Security Operations 4-22: DEMO: ROI Worksheet
3:39
TechKnowSurge
Security Operations 4-21: Calculating Return On Investment (ROI)
9:40