top of page

Related Courses

Secure Operations and Protections Online Course

Price: 5.00 USD | Size: 6.12 GB | Duration :3.34  Hours | 58 Video seasons | ★★★★★  4.5

BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | Bonus PDF Guides

 

Secure Operations and Protections Online Course

 

Overview:

 

Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With more than 3 hours of video training, Secure Operations and Protections LiveLessons dives into the methodologies behind how organizations and secure operation centers observe, collect, and secure data. This course provides the learner with an understanding of basic operations and architectures that a Security Operations Center would encounter by examining standard software development life cycles and change control processes.

 

 

 

Topics include:

 

 

Security Solutions for Infrastructure Management

Software Assurance Best Practices

Change Control

Communications Process

Response Coordination Process

Data Criticality Process

 

 

Table of contents

Introduction

Secure Operations and Protections LiveLessons: Introduction

Lesson 1: Security Solutions for Infrastructure Management

Learning objectives

1.1 Cloud vs. On-premises - Part 1

1.2 Cloud vs. On-premises - Part 2

1.3 Asset Management

1.4 Segmentation

1.5 Network Architecture

1.6 Change Management

1.7 Containerization

1.8 Identity and Access Management

1.9 Cloud Access Security Broker (CASB)

1.10 Honeypots and Breach Detection

1.11 Encryption and Certificate Management

Lesson 2: Software Assurance Best Practices

Learning objectives

2.1 SDLC Platforms

2.2 DevSecOps

2.3 Software Assessment Methods

2.4 User Acceptance Training and Stress Test

2.5 Security Regression Training

2.6 Code Review

2.7 Secure Coding Best Practices

2.8 Input Validation

2.9 Output Encoding

2.10 Session Management

2.11 Authentication

2.12 Data Protection

2.13 Paramaterized Queries

Lesson 3: Change Control

Learning objectives

3.1 Change Control

3.2 Allow List

3.3 Blocklist

3.4 Firewall

3.5 Intrusion Prevention System (IPS) Rules

3.6 Data Loss Prevention (DLP)

3.7 Endpoint Detection and Response (EDR)

3.8 Network Access Control (NAC)

3.9 Sinkholing

3.10 Malware Signature Rule Writing

3.11 Sandboxing

3.12 Port Security

Lesson 4: Communications Process

Learning objectives

4.1 What is a Cyber Incident

4.2 Communication Plan

4.3 Trusted Parties

4.4 Regulatory and Legislative Requirements

4.5 Preventing Inadvertent Release of Information

Lesson 5: Response Coordination Process

Learning objectives

5.1 Legal

5.2 Human Resources

5.3 Public Relations

5.4 Senior Leadership

5.5 Regulatory Bodies

Lesson 6: Data Criticality Process

Learning objectives

6.1 Personal Identifiable Information (PII)

6.2 Personal Health Information (PHI)

6.3 Sensitive Personal Information (SPI) and High Value Assets

6.4 Intellectual Property

Summary

Secure Operations and Protections LiveLessons: Summary

Secure Operations and Protections Online Course

SKU: EXT23022022-7
$5.00Price
  • You can Instant Download a PDF file 

    After successful payment, 

    This PDF File Contains Course Download links

    You can Download This Course immediately from the click that Links.  

bottom of page