- Why Should You Consider Passing the SCYBER Exam?
- Jan 5, 2016
- Modern organizations rely on specialists to keep cyber criminals at bay. How can you demonstrate that you have the necessary skills to gain a desirable job in a security-related position? Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains the value of achieving the Cisco SCYBER certification, which is designed around responding to cyber attacks.
|
- Video: Oracle Certified Associate, Java SE 7 Programmer Exam (1Z0 803): Course Introduction
- Mar 27, 2015
- In this video excerpt from Oracle Certified Associate, Java SE 7 Programmer Exam (1Z0-803) Complete Video Course, Java instructor, architect, and programmer Simon Roberts introduces the course, what he covers in the course, how the course is structured, and his teaching approach.
|
- Security Program and Policies: Governance and Risk Management
- Apr 16, 2014
- This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.
|
- CISSP Exam Cram: Security Architecture and Models
- Feb 4, 2013
- This chapter introduces the trusted computer base and the ways in which systems can be evaluated to assess the level of security to help you prepare for the CISSP exam.
|
- Hands-on Guide to the Red Hat Exams: System Logging, Monitoring, and Automation
- Apr 28, 2011
- This chapter covers working with Syslog, monitoring system performance, and automation with cron and at.
|
- SCEA for Java EE Exam Prep: Web Tier Technologies
- Mar 29, 2010
- In preparation for the SCEA for Java EE exam, this chapter covers the area of presentation in the JEE platform and focuses on presentation technologies designed to render in a standards-compliant HTML browser.
|
- Tips to Secure Your Small Business Wi-Fi Network
- Jul 21, 2009
- Eric Geier presents twelve critical tips to consider when securing a small business wireless network.
|
- Tips to Secure Your Home Wi-Fi Network
- Jul 10, 2009
- Eric Geier points out important steps beyond encryption to secure your home Wi-Fi network.
|
- Network Security Inside and Out: An Interview with Arvind Durai and Ray Blair
- Jul 1, 2009
- Arvind Durai and Ray Blair talk about the current landscape for enterprise security.
|
- CISSP Exam Cram: Business Continuity and Disaster Recovery Planning
- Jun 8, 2009
- This chapter covers the steps that make up the business continuity plan process to pass the business continuity and disaster recovery domain portion of the CISSP exam.
|
- CISSP Practice Questions: Application Security
- Jun 8, 2009
- This chapter provides sample questions (with answers and explanations) to help you prepare for the CISSP exam.
|
- CompTIA Security+ Infrastructure Basics
- Jun 8, 2009
- This chapter discusses the concepts of identifying and mitigating network infrastructure threats and alerts you to the most common attacks.
|
- Network Security Using Cisco IOS IPS
- Jun 8, 2009
- This chapter describes the functions and operations of IDS and IPS systems.
|
- Understanding Cisco Secure Firewall Services Module 4.x Routing and Feature Enhancements
- Jun 4, 2009
- This chapter discusses the key additions to the Cisco Secure Firewall Services Module (FWSM) 4.x code.
|
- Online Security: A Quest to Be One Step Ahead of the Bad Guys
- May 29, 2009
- Linda Leung interviews security expert Jamey Heary about network security and the world of "white hats" versus "black hats."
|
- Controlling Access and Configuring System Messaging in Solaris 10
- May 22, 2009
- This chapter covers two main topics: Role-Based Access Control (RBAC) and system messaging (syslog) as they relate to the CX-310-202 exam.
|
- Solaris 10 System Administration Exam Prep: Managing System Processes
- Oct 7, 2008
- Bill Calkins explains how to view processes, understand the effects signals have on processes, and how to manage processes.
|
- MCTS 70-640 Exam Cram: Group Policy and Active Directory Security
- Sep 30, 2008
- Learn to use Group Policy to create and enforce a secure computing environment.
|
- VoIP Threat Taxonomy
- Sep 24, 2008
- This chapter categorizes the main threats against VoIP service and explains their impact and possible methods of protection.
|
- Security Features on Switches
- Jul 4, 2008
- This chapter describes Layer 2 security basics and security features on switches available to combat network security threats.
|