Inhalt: Earning the CompTIA Cybersecurity Analyst (CySA+) certification shows potential employers that you understand how to tackle cybersecurity threats using a behavioral analytics-based approach. This course-the second installment in the CySA+ (CS0-002) Cert Prep series-will provide you with a foundational understanding of key vulnerability management tools and processes, and prepare you to tackle the Threat and Vulnerability Management domain of exam CS0-002. Instructor Mike Chapple covers how to design a vulnerability management program, execute vulnerability scans, and report and analyze scan results. He wraps up by detailing the vulnerabilities associated with different types of technologies, as well as common software security issues to watch out for. Umfang: 02:43:03.00
Inhalt: Identity and access management systems help organizations accomplish several fundamental tasks: identifying users, authenticating them, and ensuring that they can access only the resources and information that they are privy to. In this course-the third installment in the CySA+ (CS0-002) Cert Prep series-instructor Mike Chapple delves into the identity access management portion of domain two of the CompTIA Cybersecurity Analyst (CySA+) (CS0-002) exam: Software and Systems Security. Mike discusses different means of verifying identity, including biometrics; key authentication techniques, systems, and protocols; authorization and privilege management; the identity management lifecycle; and how to address common security issues in the realm of identity management. Umfang: 01:38:20.00
Inhalt: A solid understanding of software and systems security-from the software development lifecycle to penetration testing-is essential for aspiring cybersecurity analysts, as well as for those looking to earn the CompTIA Cybersecurity Analyst (CySA+) certification. In this installment of the CySA+ (CS0-002) Cert Prep series, instructor Mike Chapple dives into key software and system security practices as he prepares you for the Software and Systems Security domain of the CySA+ (CS0-002) exam. Mike provides coverage of secure software development practices, virtualization, networking, cloud computing, and more. Upon wrapping up this course-along with CySA+ (CS0-002) Cert Prep: 3 Identity and Access Management-you'll be prepared to confidently answer questions in the Software and Systems Security domain of the CySA+ exam. Umfang: 03:59:55.00
Inhalt: Professionals looking to earn the CompTIA Cybersecurity Analyst (CySA+) certification must have a robust understanding of how to keep the security and overall health of their systems in check. In this installment of the CySA+ (CS0-002) Cert Prep series, instructor Mike Chapple covers key security techniques and best practices as he prepares you for the Security Operations and Monitoring domain of the CySA+ (CS0-002) exam. Mike covers log monitoring, network traffic analysis, intrusion detection and prevention, examining email for malicious content, network access control, endpoint security techniques, automating threat intelligence, and more. Umfang: 02:56:13.00
Inhalt: Review essential incident response concepts and best practices as you study for the CompTIA Cybersecurity Analyst (CySA+) (CS0-002) exam. In this installment of the CySA+ (CS0-002) Cert Prep series, instructor Mike Chapple discusses how to classify threats and assess the impact of cybersecurity incidents as he prepares you for the exam. Mike covers the importance of communication during a cybersecurity incident response effort, the symptoms of an incident in progress, the use of forensic tools, and the incident recovery process. After completing this course, you'll be prepared to tackle the Incident Response domain of the CySA+ (CS0-002) exam. Umfang: 02:08:07.00
Inhalt: The CompTIA Cybersecurity Analyst (CySA+) certification demonstrates to potential employers that you know how to tackle cybersecurity threats using a behavioral analytics-based approach. This course-the first in the CySA+ Cert Prep series-kickstarts your preparation for the newly revised exam (CS0-002). It reviews the five domains of the CySA+ exam at a high level and provides exam tips, question samples, and resources for learning more. Instructor Mike Chapple also explains the benefits of certification and the careers that CySA+ certified professionals may pursue in information security. Umfang: 00:44:49.00
Inhalt: Data stewardship programs help organizations achieve the maximum value from their information assets. In this course, instructor Mike Chapple shows you the basic foundations of data stewardship and best practices for getting your own data stewardship program off the ground. Mike explores the roles, qualities, and responsibilities of a data steward. He goes over best practices for maintaining data quality, then explains the many protections that go into maintaining data security. Mike discusses privacy controls and the patchwork of international, national, and local laws that govern data security and privacy. He concludes with useful steps you can take in building a data stewardship program. Umfang: 01:47:06
Inhalt: Discover how to create informative and visually appealing data visualizations using ggplot2, the leading visualization package for R. In this course, Mike Chapple shows how to work with ggplot2 to create basic visualizations, how to beautify those visualizations by applying different aesthetics, and how to visualize data with maps. Throughout the course, Mike also covers key concepts such as the grammar of graphics and how to apply different geometries to visualize data. To wrap up, he shares a case study that lends a practical context to the concepts covered in the course. Umfang: 02:27:22.00
Inhalt: Tidy data is a data format that provides a standardized way of organizing data values within a dataset. By leveraging tidy data principles, statisticians, analysts, and data scientists can spend less time cleaning data and more time tackling the more compelling aspects of data analysis. In this course, learn about the principles of tidy data, and discover how to create and manipulate data tibbles-transforming them from source data into tidy formats. Instructor Mike Chapple uses the R programming language and the tidyverse packages to teach the concept of data wrangling-the data cleaning and data transformation tasks that consume a substantial portion of analysts' time. He wraps up with three hands-on case studies that help to reinforce the data wrangling principles and tactics covered in this course. Umfang: 04:12:41.00
Inhalt: The tidy format provides a standardized way of organizing data values within a dataset. By leveraging tidy data principles, statisticians, analysts, and data scientists can spend less time cleaning data and more time tackling the more compelling aspects of data analysis. In this course, learn about the principles of tidy data, discover how to create and manipulate data tibbles, and find out how to use the tibbles in importing, transforming, and cleaning your data. Instructor Mike Chapple uses R and the tidyverse packages to teach the concept of data wrangling-the data cleaning and data transformation tasks that consume a substantial portion of analysts' time. He wraps up with three hands-on case studies that reinforce the data wrangling principles and tactics covered in this course. Umfang: 02:51:15
Inhalt: Hardly a day goes by without a major security incident making headlines. Each incident provides an opportunity to learn from another company's misfortune. In this series, you can explore high-profile cybersecurity breaches, discovering the inside story of what happened and lessons that you can draw from each breach. Instructor Mike Chapple breaks down incidents at major companies like Equifax and Target, and explains what you can do to protect your organization against similar attacks. He connects concepts you may have only studied to real-world incidents and shows how cybersecurity has evolved in response to these new kinds of threats. Umfang: 03:05:02.00
Inhalt: What is it like to work in the IT security industry? Mike Chapple is an information security expert with over 20 years of experience in the public and private sectors. Here he shares insights on what it takes to detect, prevent, and combat cyber attacks and other security breaches in today''s complex and diverse technological landscape-and find a job doing it. In this interview-style course, Mike answers questions such as... How does one break into the cybersecurity field? What are the various career tracks? How do organizations prevent a security breach? What are the compliance issues? Who is responsible for security in the cloud? How does IT security impact other business divisions? These are the kinds of insights that can help you explore a new career, focus on a course of study, or even prepare for an interview. Umfang: 00:32:15.00
Inhalt: The dark web-a bastion of encrypted websites that can be visited and hosted anonymously-is home to criminals and privacy-minded citizens alike. In this course, learn about the social and technical underpinnings of the dark web, as well as how you can access and host websites that are hidden from prying eyes. Instructor Mike Chapple provides some history on the dark web and the Tor Browser, the basic software needed to access the dark web and browse the internet anonymously. He then goes over the basics of encryption and shines a light on the technical aspects of the Tor network, as well as how to use it to browse the standard Internet anonymously. Plus, get briefed on the potential vulnerabilities that users of anonymized networks should watch out for. Umfang: 00:56:31.00
Inhalt: Social security numbers (SSNs) are one of the most sensitive pieces of personally identifiable information. If your organization stores SSN data, it has a responsibility to make sure it is secure-or face serious legal and financial repercussions. Learn how you can create a policy-driven program to protect social security numbers from unauthorized use. Instructor Mike Chapple explains how you can develop a company policy around the use of SSNs, identify SSN stores throughout your business, eliminate SSNs that you don't need, and protect those that you must retain. By the end of the course, you'll have the tools and techniques you need to help your organization protect the valuable information entrusted to its care. Umfang: 01:19:10.00
Inhalt: The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain. In this installment, Mike covers the objectives of Access Controls, the first domain, which comprises 16% of the questions on the exam. Topics include identification, authorization, and authentication, including multifactor and mobile device authentication. Learn about the identity management life cycle, and find out how to implement authentication mechanisms and access controls. To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com. Umfang: 01:33:43.00
Inhalt: The Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain. In this installment, Mike covers the objectives of the first domain, Security Operations and Administration, which comprises 16% of the questions on the exam. Topics include the security triad, data security, security controls, and compliance training. Learn about core concepts and the security code of ethics, and find out how to document controls, start asset and change management programs, conduct security awareness and training, implement physical controls, and assess the compliance of your organization. Umfang: 02:16:45
Inhalt: The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain. In this installment, Mike covers the objectives of Security Operations and Administration, the second domain, which comprises 17% of the questions on the exam. Topics include the security triad, data security, security controls, and compliance training. Learn about core concepts and the security code of ethics, and find out how to document controls, start asset and change management programs, conduct security awareness and training, implement physical controls, and assess the compliance of your organization. To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com. Umfang: 02:59:21.00
Inhalt: Jump start your career in IT by earning the (ISC)2 Systems Security Certified Practitioner (SSCP) certification. In this installment of the SSCP Cert Prep series, instructor Mike Chapple covers the objectives of Risk Identification, Monitoring, and Analysis, the third domain of the SSCP exam. Topics include quantitative risk assessment, risk visibility and reporting, vulnerability assessment tools, and security assessment techniques. In addition, learn about security information and event management (SIEM) systems, visualization and reporting, software testing, and more. Umfang: 02:10:50.00
Inhalt: Earning the (ISC)2 Systems Security Certified Practitioner (SSCP) certification can help to accelerate your career by validating your understanding of essential IT security concepts. In this installment of the SSCP Cert Prep series, instructor Mike Chapple covers the objectives of Incident Response and Recovery, the fourth domain of the SSCP exam. Topics discussed include incident management-including how to build a security incident response program-and network and software forensics. Mike also explores disaster recovery, discussing the design of backup strategies, different options for alternate processing facilities, and how to evaluate the effectiveness of business continuity and disaster recovery plans. Umfang: 01:33:30.00
Inhalt: The Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain. In this installment, Mike covers the objectives of Cryptography, the fifth domain, which comprises 9% of the questions on the exam. Topics include encryption, symmetric cryptography, and asymmetric cryptography. Learn about key management, working with digital certificates, and secure transport protocols. Plus, learn how to recognize and defend your organization against the most common types of cryptanalytic attacks: brute force and knowledge-based attacks. To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com. Umfang: 02:23:39.00
Inhalt: The Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain. In this installment, Mike covers the objectives of Networks and Communications Security, Domain 6, which comprises 16% of the questions on the exam. Topics include TCP/IP networking, configuring network security devices, and identifying the different types of network attacks. Plus, learn how to secure your network with firewall rules, switch and router configuration, and network monitoring; protect your telecommunications; and understand the unique features and vulnerabilities of wireless networks. To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com. Umfang: 03:10:09.00
Inhalt: The Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain. In the final installment, Mike covers the objectives of Systems and Application Security, Domain 7, which comprises 17% of the questions on the exam. Topics include malware, systems and application attack types, social engineering, and mobile and cloud security. Plus, learn techniques to secure your site and application code, harden virtual machines and appliances, and secure big data systems. To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com. Umfang: 03:02:49.00
Inhalt: The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. In this course, Mike Chapple provides a big-picture perspective of the SSCP exam, including an overview of the seven domain topics, what to expect from the questions, and how to best prepare for the exam. The course is the introduction to the SSCP Cert Prep series, which goes over each domain in more depth. Mike also includes additional resources for study and a discussion of the SSCP continuing education requirements. Umfang: 00:56:11.00
Inhalt: Nmap is a powerful network discovery and security auditing tool that's widely used in the cybersecurity community. In this course, learn how to use this open-source tool for port scanning of systems and network devices. Instructor Mike Chapple demonstrates how to install Nmap, configure scans, and interpret the output. Plus, he wraps up the course with a series of hands-on case studies, providing you with an opportunity to perform your own Nmap scans and check your results. Umfang: 01:46:30.00
Inhalt: It only takes one misconfigured device or missing patch for hackers to infiltrate your network. Fix the flaws in your systems before attackers can find them with Nessus, the network vulnerability scanner popular among cybersecurity analysts, sys admins, and network engineers. Using Nessus, you can scan servers, endpoints, and other network devices and check them against a database of thousands of known vulnerabilities. In this course, instructor Mike Chapple teaches you how to install Nessus, configure scans, and interpret the output. He explains how to create a vulnerability management program as well as a remediation workflow that will help you detect, understand, and resolve vulnerabilities before they are exploited. Umfang: 01:45:56.00
Programm Findus Internet-OPAC findus.pl V20.236/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 17.05.2024, 12:10 Uhr. 2.972 Zugriffe im Mai 2024. Insgesamt 513.202 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral