Kubernetes on GKE (Video Course) 0

Kubernetes on GKE (Video Course)

Kubernetes on GKE (Video Course) English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 28 Lessons (3h 35m) | 708 MB Learn the fundamentals you need to use the Google Kubernetes engine. Kubernetes is the de facto standard for running scalable workloads on-prem and across all major public clouds. Kubernetes on the Google Cloud Platform (GKE) was the first managed version of this container orchestrator on a major public cloud and remains until today one of the most accessible to beginners. Topics covered include: Getting Started with GKE: Provisioning GKE services on the Google Cloud Platform, setting up...

Threat Intelligence and Threat Hunting, 2nd Edition (Video Course) 0

Threat Intelligence and Threat Hunting, 2nd Edition (Video Course)

Threat Intelligence and Threat Hunting, 2nd Edition (Video Course) English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 53 Lessons (4h 58m) | 1.15 GB Explore key threat intelligence and threat hunting concepts to help you protect your sensitive data. Topics include: Threat-Intelligence and Threat-Hunting Concepts Analyze Indicators of Potentially Malicious Activity Tools or Techniques to Determine Malicious Activity Concepts Related to Attack Methodology Frameworks Utilizing Threat Intelligence to Support Organization Security Analyze Output from Common Vulnerability Assessment Tools Threats and Vulnerabilities Associated with Specialized Technology A cybersecurity professional needs to understand threats, threat actors, and have a...

Secure Operations and Protections, 2nd Edition (Video Course) 0

Secure Operations and Protections, 2nd Edition (Video Course)

Secure Operations and Protections, 2nd Edition (Video Course) English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 45 Lessons (4h 35m) | 1.25 GB Gain an introductory understanding of secure operations and protections concepts. Topics include: System and Network Architecture Concepts Efficiency and Process Improvement Recommended Controls to Mitigate Attacks and Software Vulnerabilities Analyzing Data to Prioritize Vulnerabilities Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With over 4 hours of video training, the Secure Operations and Protections, 2nd Edition (Video Course) explores organizations’ strategies, practices, and...

Practical Doomsday: A User’s Guide to the End of the World 0

Practical Doomsday: A User’s Guide to the End of the World

eBook Details: Paperback: 250 pages Publisher: WOW! eBook (January 11, 2022) Language: English ISBN-10: 1718502125 ISBN-13: 978-1718502123 eBook Description: Practical Doomsday: A User’s Guide to the End of the World: Disasters happen. Be prepared. Here’s how. As a leading security engineer, Michal Zalewksi has spent his career methodically anticipating and planning for cyberattacks. In Practical Doomsday: A User’s Guide to the End of the World, Zalewski applies the same thoughtful, rational approach to preparing for disasters of all kinds. By sharing his research, advice, and a healthy dose of common sense, he’ll help you rest easy knowing you have a plan for...

Practical Social Engineering: A Primer for the Ethical Hacker 0

Practical Social Engineering: A Primer for the Ethical Hacker

eBook Details: Paperback: 230 pages Publisher: WOW! eBook (June 14, 2022) Language: English ISBN-10: 171850098X ISBN-13: 978-1718500983 eBook Description: Practical Social Engineering: A Primer for the Ethical Hacker: A guide to hacking the human element. Even the most advanced security teams can do little to defend against an employee clicking a malicious link, opening an email attachment, or revealing sensitive information in a phone call. Practical Social Engineering: A Primer for the Ethical Hacker will help you better understand the techniques behind these social engineering attacks and how to thwart cyber criminals and malicious actors who use them to take advantage of...