Video description
3+ Hours of Video Instruction
3+ hours of introductory training on understanding secure operations and protections concepts.
Overview:
Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With more than 3 hours of video training, Secure Operations and Protections LiveLessons dives into the methodologies behind how organizations and secure operation centers observe, collect, and secure data. This course provides the learner with an understanding of basic operations and architectures that a Security Operations Center would encounter by examining standard software development life cycles and change control processes.
Secure Operations and Protections LiveLessons is taught by expert trainer, author and cybersecurity expert Aamir Lakhani. Using hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals, this video course teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations.
Topics include:
- Security Solutions for Infrastructure Management
- Software Assurance Best Practices
- Change Control
- Communications Process
- Response Coordination Process
- Data Criticality Process
Skill Level:
Learn How To:
- Protect data and secure an organizations operations in their day-to-day business
- Observe, collect, and secure date
- Detect common security encounters and be prepared for them
- Implement processes that allow communication of information in a correct and timely manner
Who Should Take This Course:
- Cybersecurity Professionals
- Anyone interested in learning cyber security fundamental
Course Requirements:
- There is no required prerequisite
About Pearson Video Training:
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Video Lessons are available for download for offline viewing within the streaming format. Look for the green arrow in each lesson.
Table of Contents
Introduction
Secure Operations and Protections LiveLessons: Introduction
Lesson 1: Security Solutions for Infrastructure Management
Learning objectives
1.1 Cloud vs. On-premises - Part 1
1.2 Cloud vs. On-premises - Part 2
1.3 Asset Management
1.4 Segmentation
1.5 Network Architecture
1.6 Change Management
1.7 Containerization
1.8 Identity and Access Management
1.9 Cloud Access Security Broker (CASB)
1.10 Honeypots and Breach Detection
1.11 Encryption and Certificate Management
Lesson 2: Software Assurance Best Practices
Learning objectives
2.1 SDLC Platforms
2.2 DevSecOps
2.3 Software Assessment Methods
2.4 User Acceptance Training and Stress Test
2.5 Security Regression Training
2.6 Code Review
2.7 Secure Coding Best Practices
2.8 Input Validation
2.9 Output Encoding
2.10 Session Management
2.11 Authentication
2.12 Data Protection
2.13 Paramaterized Queries
Lesson 3: Change Control
Learning objectives
3.1 Change Control
3.2 Allow List
3.3 Blocklist
3.4 Firewall
3.5 Intrusion Prevention System (IPS) Rules
3.6 Data Loss Prevention (DLP)
3.7 Endpoint Detection and Response (EDR)
3.8 Network Access Control (NAC)
3.9 Sinkholing
3.10 Malware Signature Rule Writing
3.11 Sandboxing
3.12 Port Security
Lesson 4: Communications Process
Learning objectives
4.1 What is a Cyber Incident
4.2 Communication Plan
4.3 Trusted Parties
4.4 Regulatory and Legislative Requirements
4.5 Preventing Inadvertent Release of Information
Lesson 5: Response Coordination Process
Learning objectives
5.1 Legal
5.2 Human Resources
5.3 Public Relations
5.4 Senior Leadership
5.5 Regulatory Bodies
Lesson 6: Data Criticality Process
Learning objectives
6.1 Personal Identifiable Information (PII)
6.2 Personal Health Information (PHI)
6.3 Sensitive Personal Information (SPI) and High Value Assets
6.4 Intellectual Property
Summary
Secure Operations and Protections LiveLessons: Summary