SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Video accessible from your Account page after purchase.
Register your product to gain access to bonus material or receive a coupon.
4+ hours of video instruction
Gain an introductory understanding of secure operations and protections concepts.
Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With over 4 hours of video training, the Secure Operations and Protections, 2nd Edition video course explores organizations' strategies, practices, and technologies to protect their systems, networks, and data, ultimately enhancing their overall security posture. Dive into the essential aspects of secure operations, including network security, system hardening, and incident response planning.
Throughout the video course, expert trainer, author and cybersecurity expert Aamir Lakhani uses hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals. This video course teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations.
Topics include:
Skill Level:
Learn How To:
Who Should Take This Course:
About Pearson Video Training:
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Video Lessons are available for download for offline viewing within the streaming format. Look for the green arrow in each lesson.
Lesson 1: Importance of System and Network Architecture Concepts in Security Operation
1.1 Log ingestionPart 1
1.2 Log ingestionPart 2
1.3 Operating system (OS) concepts
1.4 Infrastructure concepts
1.5 Network architecture
1.6 Identity and access management
1.7 Encryption
1.8 Sensitive data protection
Lesson 2: Importance of Efficiency and Process Improvement in Security Operations
2.1 Standardize processes
2.2 Streamline operations
2.3 Technology and tool integration
Lesson 3: Recommend Controls to Mitigate Attacks and Software Vulnerabilities
3.1 Cross-site scripting
3.2 Overflow vulnerabilities
3.3 Data poisoning
3.4 Broken access control
3.5 Cryptographic failures
3.6 Injection flaws
3.7 Cross-site request forgery
3.8 Directory traversal
3.9 Insecure design
3.10 Security misconfiguration
3.11 End-of-life or outdated components
3.12 Identification and authentication failures
3.13 Server-side request forgery
3.14 Remote code execution
3.15 Privilege escalation
3.16 Local file inclusion (LFI)/remote file inclusion (RFI)
Lesson 4: Analyze Data to Prioritize Vulnerabilities
4.1 Compensating controls
4.2 Control types
4.3 Patching and configuration management
4.4 Maintenance windows
4.5 Exceptions
4.6 Risk management principles
4.7 Policies, governance, and service-level objectives (SLOs)
4.8 Prioritization and escalation
4.9 Attack surface management
4.10 Secure coding best practices
4.11 Secure software development life cycle (SDLC)
4.12 Threat modeling