Old Search System: security eps




  • The Basics of Cyber Security 2020

    The Basics of Cyber Security 2020Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz,...


    What you\'ll learn
    Understand the main topics in cyber security
    Understand the common sources of cyber security events
    Protecting yourself from cyber security threats
    The highest cyber threats to institutions
    Data protection and privacy
    Basic knowledge of cyber risk management
    Introduction to Cryptography
    Understand business continuity planning and disaster recovery
    Requirements
    ...


  • Lynda - VMware vSphere 6.5 Security

    Lynda - VMware vSphere 6.5 Security Learn how to administer the critical security components of...


    Table of Contents1. vSphere Security


  • Lynda - VMware NSX: Security

    Lynda - VMware NSX: Security Making sure an organization's software-defined network (SDN) is secure is...


    Table of ContentsIntroduction1. Create an SDDC2. Microsegmentation of Security3. Edge Firewalls and the Distributed Firewall4. Role Based Access Control5. Service ComposerConclusion


  • AWS Administration: Security Fundamentals

    AWS Administration: Security Fundamentals https://www.lynda.com/Amazon-Web-Services-tutorials/AWS-Administration-Security-Fundamentals/2822140-2.html Proper understanding of security services is crucial for any cloud...


    Introduction 1. The AWS Account 2. Identity Security Conclusion


  • Lynda - SharePoint 2013 Security for Users

    Lynda - SharePoint 2013 Security for Users Balancing security and user satisfaction is hard. But...


    Table of ContentsIntroduction1. SharePoint Security Fundamentals2. SharePoint Users and Their Roles3. Accessing Content4. Restricting Access to Content5. Roles and Responsibilities6. Security for Publishing Sites7. Managing SharePoint Security Groups8. Search and SharePoint Security9. Planning WorksheetsConclusion


  • Spring: Spring Security

    Spring: Spring Security https://www.lynda.com/Web-tutorials/Spring-Spring-Security/704153-2.html Developers sometimes struggle to see their apps as attackers do. They...


    Introduction1. Spring Security Concepts2. Securing Web Applications with Spring3. LDAP Authentication4. Leveraging OAuth 2 with Spring Security5. WebFlux SecurityConclusion


  • AWS Administration: Security Operations

    AWS Administration: Security Operations https://www.lynda.com/Amazon-Web-Services-tutorials/AWS-Administration-Security-Operations/2824079-2.html Is your company making a move to the cloud with...


    Introduction 1. Infrastructure Security 2. Data Protection 3. Detective Controls Conclusion


  • Lynda - Web Security: Same-Origin Policies

    Lynda - Web Security: Same-Origin Policies In network communications, knowing where something came from can...


    Table of ContentsIntroduction1. Basics of Same-Origin Policies2. Securing Shared Data with CORS Restrictions3. Securing Sites with a Content Security Policy4. Securing Communication with Transport Security5. Communicating Securely across Browser Windows6. Securing CookiesConclusion


  • Lynda - Security Testing Essential Training

    Lynda - Security Testing Essential Training To provide your organization with confidence, you need to...


    Table of ContentsIntroduction1. Understanding Security Assessments2. Your Testing Environment3. Planning Your Assessment4. Review Techniques5. Identifying Your Targets6. Vulnerability Validation7. Additional ConsiderationsConclusion


  • Lynda - Security Tips Weekly

    Lynda - Security Tips Weekly Security isn't just a concern for the tech savvy among...


    Table of ContentsIntroduction1. Security Tips


  • Lynda - Security Testing: Nmap Security Scanning

    Lynda - Security Testing: Nmap Security Scanning Nmap is a powerful network discovery and security...


    Table of ContentsIntroduction1. Network Scanning2. Installing Nmap3. Scanning with Nmap4. Configuring Nmap Scans5. Fingerprinting Systems and Services6. Scan Output7. Case Studies in ScanningConclusion


  • Lynda - Security Matters (To Everyone)

    Lynda - Security Matters (To Everyone) Security affects everyone who uses the internet and shares...


    Table of Contents1. Security Matters


  • Lynda - SQL Server: Security for Developers

    Lynda - SQL Server: Security for Developers Learn how to protect databases and preserve the...


    Table of ContentsIntroduction1. Roles and Privileges in SQL Server2. SQL Injection3. Securing Your NetworkConclusion


  • Lynda - Spring: Spring Security

    Lynda - Spring: Spring Security Developers sometimes struggle to see their apps as attackers do....


    Table of ContentsIntroduction1. Spring Security Concepts2. Securing Web Applications with Spring3. LDAP Authentication4. Leveraging OAuth 2 with Spring Security5. WebFlux SecurityConclusion


  • Lynda - Windows 7: Networking and Security

    Lynda - Windows 7: Networking and Security Explore Windows 7 networking and security. Join Steve...


    Table of ContentsIntroduction1. Networking2. Windows 7 Security


  • Lynda - Windows 8: Networking and Security

    Lynda - Windows 8: Networking and Security Learn about Windows 8 networking and security. Author...


    Table of ContentsIntroduction1. Networking2. Security


  • Learn Cyber Security From Scratch

    Learn Cyber Security From ScratchVideo: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch...


    What you\'ll learn
    Basics Of Cyber Security
    Launch Cyber Attacks
    Advanced Of Cyber Security
    Network Hacking
    Computer Hacking
    Uses Of Nmap
    Network Scanning
    Sniffing Attack
    Launcging DOS and DDOS Attack
    Social Engineering
    SQL Injection Hacking
    Website Hacking
    Requirements
    Basic Pc or Mac fluency
    Description
    In this comprehensive Cyber Security course you will learn...


  • Lynda - Windows 10: Security

    Lynda - Windows 10: Security Whether you are upgrading or starting afresh with a new...


    Table of ContentsIntroduction1. Authentication and Accounts2. Authorization3. Encryption4. Virus and Malware5. Network Security6. Group Policy7. Remote Desktop8. MiscellaneousConclusion


  • Lynda - Learning Cryptography and Network Security

    Lynda - Learning Cryptography and Network Security Though technology changes rapidly, the need to assure...


    Table of ContentsIntroduction1. Network Security2. Symmetric Encryption3. Asymmetric Encryption and Digital Signatures4. Hash Algorithms, Message Digests, and Authentication5. Secure Sockets Layer (SSL)6. Email Security7. Internet Protocol SecurityConclusion


  • Lynda - Learning Mobile Device Security

    Lynda - Learning Mobile Device Security Mobile devices have become critical to the way we...


    Table of ContentsIntroduction1. Considering the Need for Security2. Securing an Android Device3. Securing an iOS Device4. Security through Mobile Management5. Securing Device HardwareConclusion