Secure Operations and Protections LiveLessons

Secure Operations and Protections LiveLessons

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 58 Lessons (3h 34m) | 3.70 GB

Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With more than 3 hours of video training, Secure Operations and Protections LiveLessons dives into the methodologies behind how organizations and secure operation centers observe, collect, and secure data. This course provides the learner with an understanding of basic operations and architectures that a Security Operations Center would encounter by examining standard software development life cycles and change control processes.

Secure Operations and Protections LiveLessons is taught by expert trainer, author and cybersecurity expert Aamir Lakhani. Using hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals, this video course teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations.

Topics include:

  • Security Solutions for Infrastructure Management
  • Software Assurance Best Practices
  • Change Control
  • Communications Process
  • Response Coordination Process
  • Data Criticality Process

Learn How To:

  • Protect data and secure an organizations operations in their day-to-day business
  • Observe, collect, and secure date
  • Detect common security encounters and be prepared for them
  • Implement processes that allow communication of information in a correct and timely manner
Table of Contents

1 Secure Operations and Protections LiveLessons – Introduction
2 Learning objectives
3 Cloud vs. On-premises – Part 1
4 Cloud vs. On-premises – Part 2
5 Asset Management
6 Segmentation
7 Network Architecture
8 Change Management
9 Containerization
10 Identity and Access Management
11 Cloud Access Security Broker (CASB)
12 Honeypots and Breach Detection
13 Encryption and Certificate Management
14 Learning objectives
15 SDLC Platforms
16 DevSecOps
17 Software Assessment Methods
18 User Acceptance Training and Stress Test
19 Security Regression Training
20 Code Review
21 Secure Coding Best Practices
22 Input Validation
23 Output Encoding
24 Session Management
25 Authentication
26 Data Protection
27 Paramaterized Queries
28 Learning objectives
29 Change Control
30 Allow List
31 Blocklist
32 Firewall
33 Intrusion Prevention System (IPS) Rules
34 Data Loss Prevention (DLP)
35 Endpoint Detection and Response (EDR)
36 Network Access Control (NAC)
37 Sinkholing
38 Malware Signature Rule Writing
39 Sandboxing
40 Port Security
41 Learning objectives
42 What is a Cyber Incident
43 Communication Plan
44 Trusted Parties
45 Regulatory and Legislative Requirements
46 Preventing Inadvertent Release of Information
47 Learning objectives
48 Legal
49 Human Resources
50 Public Relations
51 Senior Leadership
52 Regulatory Bodies
53 Learning objectives
54 Personal Identifiable Information (PII)
55 Personal Health Information (PHI)
56 Sensitive Personal Information (SPI) and High Value Assets
57 Intellectual Property
58 Secure Operations and Protections LiveLessons – Summary

Homepage