Created by
0.00 Star (0)
0 Hours
11 Lesson
$51.99
Cyber Security is scary.
It's our job as IT managers, admins, developers of one kind or another, or even security management professionals to ensure that our applications and services are running smoothly. And that includes maintaining safe and reliable connectivity for our teams and end users. But no matter how many best-practices and automated monitoring solutions we adopt, there'll always be another threat trying to ruin your day.
You know you and your team should be doing a better job incorporating security into everything you do, but there are just so many threats out there and just so much to know. Where should you even begin?
In this short introduction to cyber security course, you'll learn about the core principles driving modern security management operations. We'll talk about general cyber security awareness and how to perform comprehensive risk assessments for your infrastructure, develop protocols for risk control, and build effective plans for incident management and recovery.
When you're done, you won't have any specific new skills for using log analysis, penetration testing, or vulnerability assessment tools. Instead I'll give you a big picture view of what processes you'll need to adopt so that you'll know which tools are right for you, and so you can be confident you're not leaving anything out.
No pre-requisite knowledge or skills are needed for this course
An understanding that cyber security is hard, but also a desire to improve your security management profile
IT project managers looking to plan more secure deployments
System administrators looking to improve the security of their infrastructure
Application developers and admins responsible for infrastructure health
Individuals exploring a career in cyber security management
Identify the greatest cyber security threats to your IT systems
Understand the principles involved with applying risk controls to your security management
Develop a full cyber security incident management plan
Perform a risk assessment that's specific to your infrastructure
Understand the principles involved with incorporating external and internal security audits
Create a security management-focused incident recovery playbook
Introduction
1 Lessons
0H 1M
1m 21s
Implementing Cyber Security Tools and Methodologies
1 Lessons
0H 5M
Identifying the Modern Threat Environment
2 Lessons
0H 15M
Understanding Incident Prevention
3 Lessons
0H 18M
Preparing for Incident Response and Recovery
2 Lessons
0H 10M
4m 6s
6m 45s
Utilizing Resources and Opportunities
2 Lessons
0H 8M
6m 12s
2m 22s
Dragon Zap Instructor
David Clinton is an AWS solutions architect and Linux server administrator. He has written about and published training content (including books with Wiley/Sybex, Bootstrap IT, and Manning, and online courses on Udemy and Pluralsight) for many cutting edge technology subjects including Linux systems, Cloud Computing (in particular Amazon's AWS), container technologies like Kubernetes, data analytics, and DevOps tools. More than 60,000 of his books are currently in circulation and his video courses have been viewed by more than a half a million students...just like you!
$51.99
65% off
5 days and 11 hours at this price
Full Lifetime Access
30 Days Money Back Guarantee
Free Exercises File
Watch online or offline
Certificate of Completion
Metla Sudha Sekhar
Metla Sudha Sekhar
Daniel McCarthy