Training Series
-
Training: Cloud Security Monitoring and Threat Detection in AWS
In this talk, Shaun McCullough SANS Certified Instructor and author of the brand new class SEC541: Cloud Monitoring and Threat…
Read More » -
Training: Maturing your Threat Detection and Incident Response in AWS Cloud
To continuously mature your Threat Detection and Incident Response in AWS you need a well thought out strategy that aligns…
Read More » -
Training: Moving Operations to the Cloud
When an organization moves an application or service from one environment to another without stopping to redesign the application, this…
Read More » -
Training: Multicloud Security Assessment and Defense
Overview SEC510 provides cloud security practitioners, analysts, and researchers an in-depth understanding of the inner workings of cloud Platform-as-a-Service (PaaS)…
Read More » -
Webinar: National Cybersecurity Strategies – Implementation and Monitoring
The International Telecommunication Union (ITU) organized an online discussion on the lifecycle development and implementation of a National Cybersecurity Strategy.…
Read More » -
A day in the life of Cyber Security Analyst
Ever wondered what is a day in the life of a Cyber Security Analyst really like? Cyber attackers have been…
Read More » -
Cyber Security for beginners |Introduction to Cybersecurity
In this course you will learn about cyber security, specifically on the definition of #cybersecurity, technology behind cyber security and…
Read More » -
Introduction To Cyber Security
This Cyber Security training for beginners video covers all the basics that a beginner needs to know to get started…
Read More » -
ការគំរាមគំហែងទៅលើ Industrial Control System
Register for the 2018 SANS ICS Security Summit & Training: http://www.sans.org/u/yzD Industrial Control System (in)security is hiding in plain sight.…
Read More » -
ស្វែងយល់អំពី Zero-Trust Networks
The Blue Team Summit features presentations and panel discussions covering actionable techniques, new tools, and innovative methods that help cyber…
Read More » -
CISM – Full Learning Course with Exam
នៅក្នុងវគ្គសិក្សានេះ អ្នកនឹងរៀនអំពីប្រធានបទមួយចំនួនទាក់ទងទៅនឹងការគ្រប់គ្រងសន្តិសុខព័ត៌មានប្រកបដោយប្រសិទ្ធិភាព ដែលក្នុងនោះមានដូចជា៖ Effective information security governance Information security concepts and technologies Information security manager Scope and charter of information…
Read More » -
Auditor: ព័ត៌មានសំខាន់ៗដែលត្រូវការពារ
ក្នុងនាមជាអ្នកធ្វើសវនកម្ម ឬវិភាគនូវហានិភ័យនានានៅក្នុងប្រព័ន្ធព័ត៌មាន តើទិន្នន័យ (data) ណាខ្លះដែលត្រូវធ្វើការត្រួតពិនិត្យការពារឲ្យបានម៉ត់ចត់ ហើយត្រូវចាត់ទុកថាគឺជាថាគឺជាទិន្នន័យសំខាន់នោះ? បើតាមការពន្យល់បង្ហាញនៅក្នុងវីដេអូដែលបានបង្ហោះនៅក្នុងវេបសាយ YouTube បានឲ្យដឹងថា ធាតុចំបងសំខាន់ៗដែលពាក់ព័ន្ធទៅនឹងទិន្នន័យសំងាត់ (confidential data) គឺមានដូចជា: ១.ការគ្រប់គ្រងទៅលើឧបករណ៍រក្សាទុកទិន្នន័យចល័ត (removable storage management): ដោយរួមមានឧបករណ៍ Plug-and-Play, USB,…
Read More » -
បញ្ជីព្រឹត្តិការណ៍សន្តិសុខព័ត៌មានប្រចាំឆ្នាំ២០១៥ (វិដេអូ)
បញ្ជីព្រឹត្តិការណ៍សន្តិសុខព័ត៌មានប្រចាំឆ្នាំ២០១៥ (វិដេអូ) Chaos Communication Congress 2015 (32C3) Hamburg, Germany Dec 27-30, 2015 No Con Name 2015 [Spanish] Barcelona, Spain Dec…
Read More » Introduction to Ethical Hacking and How to Get Started as an Ethical Hacker
Learn how to become an ethical hacker using Kal Linux! This tutorial uses high definition (HD) screen capture to show…
Read More »Complete Free Hacking Course: Go from Beginner to Expert Hacker Today!
Everything you need to get started as a hacker and take your hacking skills to an expert level is included…
Read More »