Inhalt: Cybersecurity isn't solely within your IT department's purview. If you own a smartphone, work on a computer, or use the internet, then you're exposed to a variety of security risks on a daily basis. In this course, instructor Caroline Wong details what these threats are and what you can do about them-both to protect yourself and your organization. In a series of engaging scenarios, Caroline shines a spotlight on some of the most common security risks you'll encounter in your personal and work life, as well as how to mitigate them. Learn how to identify and avoid phishing, malware, and social engineering attacks. Plus, get best practices for protecting your accounts, company intellectual property, and online activity. Umfang: 00:55:29.00
Inhalt: In most areas of business, specifics matter. This is especially true in the area of cybersecurity. If you're a cybersecurity professional, you'll have a very short career if the best answer you can come up with to security questions is "I think everything is pretty secure." You need metrics and hard data to effectively communicate the value of your security programs and activities. In this course, Caroline Wong gives you a tried-and-true approach for customizing metrics that you can use to communicate the objectives and progress of your team's cybersecurity initiatives. Caroline starts with an overview of the value of metrics, then covers the different ways you communicate cybersecurity topics to different groups like executives, business leaders, and engineers. She also covers risk management objectives, and finishes the course by going over examples of a number of important cybersecurity metrics. Umfang: 00:46:56
Inhalt: It seems like there is a security-related incident in the news every day. What makes systems-and the software that runs them-vulnerable to attack? The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand and improve software security. The OWASP Top 10 list describes the ten biggest vulnerabilities. In this course, application security expert Caroline Wong provides an overview of the 2017 OWASP Top 10, presenting information about each vulnerability category, its prevalence, and its impact. Though aimed at IT security professionals and developers, anyone who uses web applications will benefit from an understanding of these risks. Note: More information about the OWASP Top 10 list can be found on the Cobalt website. Umfang: 00:43:57.00
Inhalt: The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand and improve software security. The OWASP Top 10 list describes the ten biggest software vulnerabilities. In this course, application security expert Caroline Wong provides an overview of the top two: injection and broken authentication attacks. Find out how injection and broken authentication work and see real-life examples of the attacks and their impact on companies and consumers. Plus, get prevention techniques to avoid putting your applications and users at risk. Umfang: 00:37:42.00
Inhalt: The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance software security. The OWASP Top 10 list describes the ten biggest vulnerabilities. In this course, Caroline Wong takes a deep dive into the third and fourth categories of security vulnerabilities in the OWASP Top 10-sensitive data exposure and XML external entities (XXE). Caroline covers how sensitive data exposure and XXE attacks work, providing real-world examples that demonstrate how they affect companies and consumers alike. She also shares techniques that can help you prevent these types of attacks. Umfang: 00:27:03.00
Inhalt: Security-related incidents pose major threats to organizations of all sizes, as well as the customers they serve. The Open Web Application Security Project (OWASP) was formed to educate the public about some of the most common security vulnerabilities. OWASP also provides a list-the OWASP top ten-that highlights the most critical security risks out there. In this course, Caroline Wong explores broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10. Caroline explains how these threats work and provides real-life examples of how they can impact companies and consumers. Plus, she provides techniques that can help you prevent broken access control and security misconfiguration from impacting your organization. Umfang: 00:27:41.00
Inhalt: Recent changes in application architecture and technology have sparked new opportunities and ways of working. But with these new advancements come new risks. The Open Web Application Security Project (OWASP) Top 10 list describes the ten biggest vulnerabilities that today's software developers and organizations face. In this course, Caroline Wong takes a deep dive into the seventh and eighth categories of security vulnerabilities in the OWASP Top 10-cross-site scripting (XSS) and insecure deserialization. Caroline covers how XSS and insecure deserialization work, providing real-world examples that demonstrate how they affect companies and consumers alike. She also shares techniques that can help you prevent these types of attacks. Umfang: 00:26:31.00
Inhalt: The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance software security. The OWASP Top 10 list describes the ten biggest vulnerabilities. In this course, Caroline Wong takes a deep dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring. Caroline covers how these threats work, providing real-world examples that demonstrate how insufficient logging and monitoring and using components with known vulnerabilities can affect companies and consumers alike. She also shares techniques that can help you prevent attacks stemming from these issues. Umfang: 00:27:02.00
Programm Findus Internet-OPAC findus.pl V20.235/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 08.05.2024, 18:40 Uhr. 904 Zugriffe im Mai 2024. Insgesamt 511.134 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral