26. Security Logging and Monitoring-Security Metrics and Baselines (GuardDuty, Systems Manager)

HadoopExam Learning Resources

26. Security Logging and Monitoring-Security Metrics and Baselines (GuardDuty, Systems Manager)

5 months ago - 1:54

What is Insufficient Logging and Monitoring  #InsufficientLogging #shorts

Vooki Infosec

What is Insufficient Logging and Monitoring #InsufficientLogging #shorts

1 year ago - 0:53

CCT 252: Logging and Monitoring Security Activities for the CISSP (Domain 7.2)

CISSP Cyber Training - Shon Gerber

CCT 252: Logging and Monitoring Security Activities for the CISSP (Domain 7.2)

1 month ago - 44:46

OWASP TOP 10 -2017: Insufficient Logging and Monitoring #OWASPTop10Logging #OWASPInsufficientLogging

Vooki Infosec

OWASP TOP 10 -2017: Insufficient Logging and Monitoring #OWASPTop10Logging #OWASPInsufficientLogging

1 year ago - 4:56

ISC2 Certified in Cybersecurity (CC) Training - Summary of Domain 5 Security Operations)

CyberKazim

ISC2 Certified in Cybersecurity (CC) Training - Summary of Domain 5 Security Operations)

9 days ago - 44:11

CISSP 109 Security Operations  Security Information and Event Management (CISSP IT-Tutorial)

sumon infosec

CISSP 109 Security Operations Security Information and Event Management (CISSP IT-Tutorial)

5 years ago - 2:07

OWASP TOP 10 - 2017:  XML External Entities XXE  #owasp #OWASPXXE

Vooki Infosec

OWASP TOP 10 - 2017: XML External Entities XXE #owasp #OWASPXXE

1 year ago - 4:32

What are the OWASP Top 10 - 2017 Vulnerabilities ?

Vooki Infosec

What are the OWASP Top 10 - 2017 Vulnerabilities ?

1 year ago - 2:16

Checkpoint Firewall | CCSA R81.10 | Suspicious Activity Monitoring (SAM) Rules | LAB

Nettech Cloud

Checkpoint Firewall | CCSA R81.10 | Suspicious Activity Monitoring (SAM) Rules | LAB

2 years ago - 22:03

CISSP Domain 7:  Security Operations  (CISSP IT-Tutorial)

sumon infosec

CISSP Domain 7: Security Operations (CISSP IT-Tutorial)

5 years ago - 49:21

Webinar: Docker and Container Compliance | ControlCase

ControlCase: IT Certification and Compliance

Webinar: Docker and Container Compliance | ControlCase

5 years ago - 27:58

Webinar: Docker and Container Compliance | ControlCase

ControlCase: IT Certification and Compliance

Webinar: Docker and Container Compliance | ControlCase

5 years ago - 38:51

how to actually secure your api 5 steps

CodeTube

how to actually secure your api 5 steps

7 months ago - 14:13

CC Revised Practice Questions And Answers | All Domains | 800+ Score

EverlastCyber™

CC Revised Practice Questions And Answers | All Domains | 800+ Score

10 months ago - 42:04

OWASP TOP 10 (TryHackMe: Updated!)

Hacker Thoughts

OWASP TOP 10 (TryHackMe: Updated!)

2 years ago - 53:22

8 web application security best practices

CodeLink

8 web application security best practices

5 months ago - 6:12

Protecting Your AWS Environment from Ransomware- AWS Online Tech Talks

AWS Developers

Protecting Your AWS Environment from Ransomware- AWS Online Tech Talks

2 years ago - 40:41

Security Architecture and Engineering - Part 1

Audit Control Governance Risk and Compliance

Security Architecture and Engineering - Part 1

4 days ago - 32:02

Security Architecture and Engineering - Part 2 [Trusted Computing Concepts]

Audit Control Governance Risk and Compliance

Security Architecture and Engineering - Part 2 [Trusted Computing Concepts]

4 days ago - 19:40

Webinar: Choosing the Right Cloud Architecture for Your Firm

Business Architecture Info

Webinar: Choosing the Right Cloud Architecture for Your Firm

1 year ago - 1:12:56

Desktop Application Penetration Testing | OWASP Top 10 for Desktop Application Security |PentestHint

PentestHint - The Tech Fellow

Desktop Application Penetration Testing | OWASP Top 10 for Desktop Application Security |PentestHint

2 years ago - 15:53

Accelerating Cloud Adoption Securely in the Public Sector

HashiCorp

Accelerating Cloud Adoption Securely in the Public Sector

4 years ago - 1:13:57

The Best Kubernetes Distributions #kubernetes #devops #shorts

DevOps Tips and Tricks

The Best Kubernetes Distributions #kubernetes #devops #shorts

1 year ago - 0:59

IPsec VPN Troubleshooting |  Scenario Based | Checkpoint and Palo Alto Firewall | VPN Debug Log

Nettech Cloud

IPsec VPN Troubleshooting | Scenario Based | Checkpoint and Palo Alto Firewall | VPN Debug Log

2 years ago - 1:05:52

Understanding the Key Differences Between Kubernetes and Docker

vlogize

Understanding the Key Differences Between Kubernetes and Docker

4 months ago - 2:04

Checkpoint Firewall Troubleshooting - R81.20 | Practical Demo

Nettech Cloud

Checkpoint Firewall Troubleshooting - R81.20 | Practical Demo

7 months ago - 34:46

Checkpoint Firewall | CCSA R81.10 | Identity Awareness and LDAP Integration (LAB DEMO)

Nettech Cloud

Checkpoint Firewall | CCSA R81.10 | Identity Awareness and LDAP Integration (LAB DEMO)

1 year ago - 52:06

Google Threat Intelligence Use Case: Scan Your Externally Exposed Infrastructure for Vulnerabilities

Mandiant & Google Cloud Security

Google Threat Intelligence Use Case: Scan Your Externally Exposed Infrastructure for Vulnerabilities

1 day ago - 1:30

Way to CISSP - Zaw Lin Htun part 1

VarCamp

Way to CISSP - Zaw Lin Htun part 1

2 years ago - 1:03:12

A09 Security Logging and Monitoring Failures : OWASP Top 10

VISTA InfoSec

A09 Security Logging and Monitoring Failures : OWASP Top 10

1 year ago - 16:28

Checkpoint Firewall CCSA R81.10 | HTTPS Inspection (PART 1) | SSL Handshake

Nettech Cloud

Checkpoint Firewall CCSA R81.10 | HTTPS Inspection (PART 1) | SSL Handshake

2 years ago - 48:02

AWS re:Invent 2017: Getting to Yes – Minimal Viable Cloud with Maximum Security (FSV306)

Amazon Web Services

AWS re:Invent 2017: Getting to Yes – Minimal Viable Cloud with Maximum Security (FSV306)

7 years ago - 38:26

Security Architecture and Engineering - Part 10 [Zero Trust and Modern Security Paradigms]

Audit Control Governance Risk and Compliance

Security Architecture and Engineering - Part 10 [Zero Trust and Modern Security Paradigms]

4 days ago - 17:53

Security Architecture and Engineering - Part 12 [AI and Machine Learning in Security Architecture]

Audit Control Governance Risk and Compliance

Security Architecture and Engineering - Part 12 [AI and Machine Learning in Security Architecture]

4 days ago - 20:15

HLD CheatSheet of Questions to ask|High Level System Design Interview|Extensive list of Quess to ask

Keerti Purswani

HLD CheatSheet of Questions to ask|High Level System Design Interview|Extensive list of Quess to ask

3 years ago - 13:15

KubeFlow’s Serverless Component: 10x Faster, a 1/10 of the Effort - Orit Nissan-Messing, Iguazio

CNCF [Cloud Native Computing Foundation]

KubeFlow’s Serverless Component: 10x Faster, a 1/10 of the Effort - Orit Nissan-Messing, Iguazio

5 years ago - 34:06

Government Warns 16 BILLION Credentials LEAKED Online!

LearnLore Tech

Government Warns 16 BILLION Credentials LEAKED Online!

8 hours ago - 0:25

Enterprise Linux Security Episode 119 - A Clean Hack

Learn Linux TV

Enterprise Linux Security Episode 119 - A Clean Hack

Streamed 1 day ago - 46:04

CXO Panel | Securing India The CERTIn Way | Nullcon Goa 2022

nullcon

CXO Panel | Securing India The CERTIn Way | Nullcon Goa 2022

2 years ago - 48:36

Security Logging And Monitoring Failures ⚙🗝 | #9 OWASP TOP 10 | @OWASPGLOBAL

Surendra Pandar

Security Logging And Monitoring Failures ⚙🗝 | #9 OWASP TOP 10 | @OWASPGLOBAL

3 years ago - 5:22

How SnortML Uses Machine Learning to Stop Zero-Day Attacks

Cisco Talos Intelligence Group

How SnortML Uses Machine Learning to Stop Zero-Day Attacks

2 days ago - 1:45

Checkpoint Firewall CCSA R81 | HTTPS Inspection (PART 2) | LAB DEMO

Nettech Cloud

Checkpoint Firewall CCSA R81 | HTTPS Inspection (PART 2) | LAB DEMO

2 years ago - 32:33

Security Operation (IF4026) ITERA Menggunakan NotebookLM Mahasiswa Teknik Informatika ITERA

Brammm

Security Operation (IF4026) ITERA Menggunakan NotebookLM Mahasiswa Teknik Informatika ITERA

2 months ago - 14:59

The Rules of Cybersecurity Have Changed Forever

Cloud Security Podcast

The Rules of Cybersecurity Have Changed Forever

1 day ago - 0:21

CC 5.1 - Data Security

Waleed El-Naggar

CC 5.1 - Data Security

1 year ago - 23:32

How a Weak Password Destroyed 700 Jobs| Ransomware Attack #cybersecurity #onlinesafety

Systweak Software

How a Weak Password Destroyed 700 Jobs| Ransomware Attack #cybersecurity #onlinesafety

1 day ago - 2:31

The Security Mistake That Almost No One Notices

Xact Cybersecurity

The Security Mistake That Almost No One Notices

5 days ago - 0:25

Cybercriminal Investigations: Hacked Surveillance Used to Target Informants | TSG Ep. 887 | C Block

Techstrong TV

Cybercriminal Investigations: Hacked Surveillance Used to Target Informants | TSG Ep. 887 | C Block

2 days ago - 8:36

Checkpoint Firewall CLUSTER XL | Load Sharing and HA Mode | Live Class Recording

Nettech Cloud

Checkpoint Firewall CLUSTER XL | Load Sharing and HA Mode | Live Class Recording

8 months ago - 1:20:41

الحلقه السادسه عشر من كورس certified cyber security

Hacker Masters

الحلقه السادسه عشر من كورس certified cyber security

1 year ago - 21:29

Dévouvrez les 7 éléments constitutifs de la cybersécurité pour un poste électrique sécurisé

Siemens Knowledge Hub

Dévouvrez les 7 éléments constitutifs de la cybersécurité pour un poste électrique sécurisé

3 years ago - 3:31

Introdução à segurança de aplicações e GeneXus

GeneXus Training

Introdução à segurança de aplicações e GeneXus

5 years ago - 13:54

Warehouse security 24/7 that really makes the difference

Arrow Trans Corp

Warehouse security 24/7 that really makes the difference

10 days ago - 0:22

Facebook Feed System Design- How to Design Social Media- Facebook/Twitter System Design

Sanat's Javascript Mastermind

Facebook Feed System Design- How to Design Social Media- Facebook/Twitter System Design

9 months ago - 31:36

What Does a Firewall Do? | Blocking Unauthorized Access Explained #TechQuiz #Cybersecurity #Firewall

TECHLOGICS

What Does a Firewall Do? | Blocking Unauthorized Access Explained #TechQuiz #Cybersecurity #Firewall

8 days ago - 1:03