Home > Store

Register your product to gain access to bonus material or receive a coupon.

Cybersecurity Prevention and Detection 2nd Edition (Video Collection)

Online Video

Description

  • Copyright 2024
  • Edition: 1st
  • Online Video
  • ISBN-10: 0-13-536587-2
  • ISBN-13: 978-0-13-536587-8

Overview:

This master class includes the following courses:

  • Threat Intelligence and Threat Hunting, 2nd Edition
  • System and Privacy Data Protection
  • Malware and Incident Response
  • Secure Operations and Protections, 2nd Edition

The Threat Intelligence and Threat Hunting, 2nd Edition video course provides learners with the knowledge and skills to fortify systems, protect sensitive data, and ensure compliance with privacy regulations.

System and Privacy Data Protection LiveLessons provides learners with an understanding of how to protect and store existing data, as well as why data confidentiality and business impacts are critical to data protection. In this course, the learner will examine multiple aspects of system privacy and data protection, ranging from basic concepts to tools that are commonly used by data practitioners.

Malware and Incident Response LiveLessons provides learners with an understanding of basic malware analysis and how to respond to incidents as soon as they happen. Learners will also explore the basics of how malware works and how to set up a safe environment to analyze malware in a lab. This course is meant to be an introduction to simple tools and techniques for those new to cyber security.

The Secure Operations and Protections, 2nd Edition video course explores organizations' strategies, practices, and technologies to protect their systems, networks, and data, ultimately enhancing their overall security posture. Dive into the essential aspects of secure operations, including network security, system hardening, and incident response planning.

In all these courses, expert trainer, author, and cybersecurity expert Aamir Lakhani uses hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals. Aamir teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations.

About Pearson Video Training:

Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.

Sample Content

Table of Contents

Threat Intelligence and Threat Hunting, 2nd Edition

Introduction

Lesson 1: Threat-Intelligence and Threat-Hunting Concepts

Lesson 2: Analyze Indicators of Potentially Malicious Activity

Lesson 3: Tools or Techniques to Determine Malicious Activity

Lesson 4: Concepts Related to Attack Methodology Frameworks

Lesson 5: Utilizing Threat Intelligence to Support Organization Security

Lesson 6: Analyze Output from Common Vulnerability Assessment Tools

Lesson 7: Threats and Vulnerabilities Associated with Specialized Technology

Summary

--

System and Privacy Data Protection

Introduction

Lesson 1: Data Privacy and Protection

Lesson 2: Risk Mitigation

Lesson 3: Importance of Policies, Procedures, and Controls

Lesson 4: Analyzing Logs and Impact Analysis

Lesson 5: SIEMs and Query Writing

Lesson 6: E-Mail Analysis

Lesson 7: Automation

Summary

--

Malware and Incident Response

Introduction

Lesson 1: Threat Landscape

Lesson 2: Malware Labs

Lesson 3: Dynamic Analysis

Lesson 4: Malware Packet Analysis

Lesson 5: PE File Identification

Lesson 6: File Persistence

Lesson 7: String Analysis

Summary

--

Secure Operations and Protections, 2nd Edition

Introduction

Lesson 1: Importance of System and Network Architecture Concepts in Security Operations

Lesson 2: Importance of Efficiency and Process Improvement in Security Operations

Lesson 3: Recommend Controls to Mitigate Attacks and Software Vulnerabilities

Lesson 4:  Analyze Data to Prioritize Vulnerabilities

Summary

Updates

Submit Errata

More Information

vceplus-200-125    | boson-200-125    | training-cissp    | actualtests-cissp    | techexams-cissp    | gratisexams-300-075    | pearsonitcertification-210-260    | examsboost-210-260    | examsforall-210-260    | dumps4free-210-260    | reddit-210-260    | cisexams-352-001    | itexamfox-352-001    | passguaranteed-352-001    | passeasily-352-001    | freeccnastudyguide-200-120    | gocertify-200-120    | passcerty-200-120    | certifyguide-70-980    | dumpscollection-70-980    | examcollection-70-534    | cbtnuggets-210-065    | examfiles-400-051    | passitdump-400-051    | pearsonitcertification-70-462    | anderseide-70-347    | thomas-70-533    | research-1V0-605    | topix-102-400    | certdepot-EX200    | pearsonit-640-916    | itproguru-70-533    | reddit-100-105    | channel9-70-346    | anderseide-70-346    | theiia-IIA-CIA-PART3    | certificationHP-hp0-s41    | pearsonitcertification-640-916    | anderMicrosoft-70-534    | cathMicrosoft-70-462    | examcollection-cca-500    | techexams-gcih    | mslearn-70-346    | measureup-70-486    | pass4sure-hp0-s41    | iiba-640-916    | itsecurity-sscp    | cbtnuggets-300-320    | blogged-70-486    | pass4sure-IIA-CIA-PART1    | cbtnuggets-100-101    | developerhandbook-70-486    | lpicisco-101    | mylearn-1V0-605    | tomsitpro-cism    | gnosis-101    | channel9Mic-70-534    | ipass-IIA-CIA-PART1    | forcerts-70-417    | tests-sy0-401    | ipasstheciaexam-IIA-CIA-PART3    | mostcisco-300-135    | buildazure-70-533    | cloudera-cca-500    | pdf4cert-2v0-621    | f5cisco-101    | gocertify-1z0-062    | quora-640-916    | micrcosoft-70-480    | brain2pass-70-417    | examcompass-sy0-401    | global-EX200    | iassc-ICGB    | vceplus-300-115    | quizlet-810-403    | cbtnuggets-70-697    | educationOracle-1Z0-434    | channel9-70-534    | officialcerts-400-051    | examsboost-IIA-CIA-PART1    | networktut-300-135    | teststarter-300-206    | pluralsight-70-486    | coding-70-486    | freeccna-100-101    | digitaltut-300-101    | iiba-CBAP    | virtuallymikebrown-640-916    | isaca-cism    | whizlabs-pmp    | techexams-70-980    | ciscopress-300-115    | techtarget-cism    | pearsonitcertification-300-070    | testking-2v0-621    | isacaNew-cism    | simplilearn-pmi-rmp    | simplilearn-pmp    | educationOracle-1z0-809    | education-1z0-809    | teachertube-1Z0-434    | villanovau-CBAP    | quora-300-206    | certifyguide-300-208    | cbtnuggets-100-105    | flydumps-70-417    | gratisexams-1V0-605    | ituonline-1z0-062    | techexams-cas-002    | simplilearn-70-534    | pluralsight-70-697    | theiia-IIA-CIA-PART1    | itexamtips-400-051    | pearsonitcertification-EX200    | pluralsight-70-480    | learn-hp0-s42    | giac-gpen    | mindhub-102-400    | coursesmsu-CBAP    | examsforall-2v0-621    | developerhandbook-70-487    | root-EX200    | coderanch-1z0-809    | getfreedumps-1z0-062    | comptia-cas-002    | quora-1z0-809    | boson-300-135    | killtest-2v0-621    | learncia-IIA-CIA-PART3    | computer-gcih    | universitycloudera-cca-500    | itexamrun-70-410    | certificationHPv2-hp0-s41    | certskills-100-105    | skipitnow-70-417    | gocertify-sy0-401    | prep4sure-70-417    | simplilearn-cisa    |
http://www.pmsas.pr.gov.br/wp-content/    | http://www.pmsas.pr.gov.br/wp-content/    |