- Video: Introduction to Information Security: A Course Overview
- Dec 25, 2015
- In this excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou introduces himself and discusses what he will cover in his 5-hour information security video course.
|
- Video: Introduction to Information Security: Why All Tech Personnel Need a Basic Understanding of Security
- Dec 23, 2015
- Security issues directly impact IT, networks, and software development. In this excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou discusses why all technical personnel should have a basic understanding of information security.
|
- 5 Steps to Building and Operating an Effective Security Operations Center (SOC)
- Dec 21, 2015
- Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, provides a high-level overview of the steps involved in creating a security operations center to protect your organization's valuable data assets.
|
- Thinking Security: Firewalls and Intrusion Detection Systems
- Dec 16, 2015
- In this chapter from Thinking Security: Stopping Next Year's Hackers Steven M. Bellovin asks if the general-purpose firewall is still worth its capital, operational, and productivity cost. He also takes a look a intrusion detection systems, intrusion prevention systems, and extrusion detection systems.
|
- Overview of Security Operations Center Technologies
- Dec 15, 2015
- This chapter from Security Operations Center: Building, Operating, and Maintaining your SOC focuses on the technology and services associated with most modern SOC environments, including an overview of best practices for data collection, how data is processed so that it can be used for security analysis, vulnerability management, and some operation recommendations.
|
- Video: Introduction to Information Security: Understand Vulnerabilty Assessments and Pentesting
- Apr 17, 2015
- Vulnerability and pentesting are both effective ways to check the status of your organization's security posture. In this excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou discusses the three basic steps of vulnerability assessments and the proper use of penetration testing.
|
- Video: Introduction to Information Security: Institute Business Continuity / Disaster Recovery
- Apr 3, 2015
- Your business just had an information security incident--now what do you do? In this video excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou discusses the difference between business continuity and disaster recovery plans, how to create them, and when to implement them.
|
- Preface to Security in Computing, 5th Edition
- Mar 11, 2015
- The authors of Security in Computing, 5th Edition discuss the changes they have made to their well-regarded book in the fifth edition.
|
- Phishing: Why Are We (Still) Getting Caught?
- Feb 9, 2015
- Information security expert Randy Nash discusses the history and techniques involved in phishing attacks, looking at some possible reasons why we're still getting caught by obvious phishing attempts.
|
- Introduction to Security in Computing, 5th Edition
- Jan 30, 2015
- The authors of Security in Computing, 5th Edition introduce their book, which is about the security of computers, their data, and the devices and objects to which they relate. In this book you will learn some of the ways computers can fail, or be made to fail, and how to protect against those failures.
|
- Information Security Principles of Success
- Jul 4, 2014
- This chapter introduces these key information security principles and concepts, showing how the best security specialists combine their practical knowledge of computers and networks with general theories about security, technology, and human nature.
|
- Security Program and Policies: Governance and Risk Management
- Apr 16, 2014
- This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.
|
- Network Defense and Countermeasures: Assessing System Security
- Dec 16, 2013
- Before you can begin administering system security, you must have a realistic assessment of the system’s current state of security. This chapter discusses the essential steps that you should follow in assessing a system’s security level.
|
- Secure Your Embedded Systems Now!
- Oct 24, 2013
- John Traenkenschuh explores the somewhat hidden world of embedded computing and its emerging security issues.
|
- The Anatomy of a Digital Investigation
- Oct 8, 2013
- Michael W. Graves discusses the details of a digital investigation, including understanding the scope of the investigation, identifying the stakeholders, and understanding documentation,
|
- Secure Your Android Kindle or Nook Tablet Now!
- Oct 3, 2013
- Tablet security is becoming increasingly important. Are you ready? John Traenkenschuh demonstrates how to secure your Nook HD+ or Kindle Fire HD tablet, using a mix of security tools and settings.
|
- Cisco ASA Access Lists Concepts and Configuration
- Jun 27, 2013
- Sean Wilkins review Cisco’s Adaptive Security Appliance (ASA) implementation of access control lists (ACL or access list). He also covers ASA access list types, what they control, and a basic review of what the configuration syntax is to use them.
|
- Cisco ASA Basic Internet Protocol Inspection
- Jun 27, 2013
- In this article, Sean Wilkins covers some of the common Internet protocol inspection features that can be enabled (or are enabled by default) on the Cisco ASA.
|
- Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World
- Jun 25, 2013
- This chapter examines the relationship between authentication and authorization and how to build policies for each, describing a few common Authentication Policies and Authorization Policies to help you see how to work with these policy constructs.
|
- Cisco NX-OS and Cisco Nexus Switching: Unified Fabric
- Apr 26, 2013
- This chapter shows the basic Nexus 5x00 and Nexus 7000 configurations necessary to provide a Unified access method for LAN data traffic and SAN storage traffic.
|