Curated Video
Ansible for the Absolute Beginner - Demo Project
This video presents a demonstration of the project. This clip is from the chapter "Advanced Topics" of the series "Ansible for the Absolute Beginner - Hands-On – DevOps".This section covers some advanced topics.
Packt
CompTIA A+ Certification 220-1001: The Total Course - Dealing with Threats
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This episode covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Firewalls
This video explains how to use firewall to protect the network. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn how to...
Curated Video
AZ-204 Developing for Microsoft Azure Exam Prep - Updating the Structured Query Language (SQL) Database Firewall
This video demonstrates how to update the SQL database firewall. This clip is from the chapter "AZ-204 Structured Query Language (SQL) Database" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section introduces you...
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Amazon Web Services (AWS) Security Groups Overview
This video provides an overview of security groups in AWS and explains how they are different from the traditional concept. This clip is from the chapter "Solutions Architect Chapter 3 - Virtual Private Cloud (VPC)" of the series "AWS...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 7 Ask Me Anything (AMA)
Some wireless networking attacks involve deception. In this episode, Mike describes how there are variations of Evil Twin attacks including through DNS. This clip is from the chapter "Securing Wireless LANs" of the series "CompTIA...
Curated Video
AZ-204 Developing for Microsoft Azure Exam Prep - Testing a Structured Query Language (SQL) Database
This video explains how to test an SQL database. This clip is from the chapter "AZ-204 Structured Query Language (SQL) Database" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section introduces you to AZ-204 SQL...
Curated Video
CompTIA A+ Certification 220-1001: The Total Course - Firewalls and Servers
In this episode, Mike begins the discussion of Application-layer protocols. Starting with a review of the interaction between IP packets and servers, the episode analyzes the functions of local and server-based firewalls. This clip is...
Curated Video
Learning Splunk - Hands-On Lab: Tables – Displaying Search Results
Understanding the use of tables in a hands-on activity. • Explore your firewall and authentication logs, and identify useful fields • Create tables using your data • Save these searches as reports to be used later This clip is from the...
Curated Video
Python for Everybody: The Ultimate Python 3 Bootcamp - Installing 3rd Party Packages
Python has one of the largest 3rd party ecosystems in the world. If you need something special, chances are someone has made an open source package already. Might as well use their code! This clip is from the chapter "Advanced Python" of...
Curated Video
Learning Splunk - Normalizing Data Using the Splunk Common Information Model (CIM)
Understanding the common information model (CIM). This is one of the most effective mechanisms for getting the most out of Splunk and working with all different types of data in a consistent way. • Understand why data normalization is...
Curated Video
Learning Splunk - How is Data Stored – Index
Exploring indexes or how data is stored in Splunk. • Understand what an index is • Understand why different indexes are used • Understand how indexes are stored in Splunk This clip is from the chapter "Splunk Terminology" of the series...
Curated Video
The Art of Doing - Python Network Applications with Sockets - Adjusting Host Firewall for LAN Communication
In this video, you will learn how to adjust host firewall for LAN communication. This clip is from the chapter "Connecting to the Outside World" of the series "The Art of Doing - Python Network Applications with Sockets".In this section,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Hypervisors and Virtual Machines
Hypervisors are servers configured to host virtual machine guests. This episode will discuss Type 1 and Type 2 hypervisors as well as hardening. This clip is from the chapter "Securing Public Servers" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Threat Analysis and Mitigating Actions
Stepping through how attackers manage to compromise a system or exfiltrate data helps harden environments to prevent future incidents. This episode covers the Cyber Kill Chain, the Mitre ATT&CK Framework, the Diamond Model of Intrusion...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering
Tricking people into doing something or divulging sensitive information – this is social engineering. This episode discusses a pretext, or believable story, that often goes along with this type of activity. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Data Backup
Backing data up provides availability in the event of data deletion, corruption, or encryption through ransomware. This episode discusses backup settings such as compression and encryption, as well as full, differential, and incremental...
Financial Times
China's internet crackdown
Beijing is plugging the last holes in its 'Great Firewall' internet censorship apparatus, hampering global groups’ ability to operate in the country.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Physical Security
This episode covers physical security controls such as door lock types and bollards, as well as encryption of data at rest. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CISSP®- Key Goal Indicators (KGIs), Key Performance Indicators (KPIs), and Key Risk Indicators (KRIs)
This video explains the concept of KGIs, KPIs, and KRIs. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Getty Images
businessman hand working on tablet with digital business strategy
businessman hand working on tablet with digital business strategy
Getty Images
businessman hand working on tablet with digital business strategy
businessman hand working on tablet with digital business strategy
Getty Images
Zoom in UTP cables, blinking LED lights and RJ 45 on working Ethernet switches
Zoom in UTP cables, blinking LED lights and RJ 45 on working Ethernet switches