Inhalt: Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. wxGlade, a GUI designer written in Python for the wxPython GUI toolkit, was designed to help simplify this process. In this course, learn how to quickly develop Python GUI apps using the wxPython library-which brings the wxWidgets capability to Python-and the wxGlade tool. To lend each concept a real-world context, instructor Malcom Shore steps through how to build a cybersecurity compliance app based on the NIST Cybersecurity Framework. Malcom begins by detailing how to create a simple wxPython application. He then shows how to construct a user interface for your application using wxGlade and add functional application code to put the finishing touches on your project. Umfang: 02:06:37
Inhalt: Securing or "hardening" Android apps is an important final step to ensure code, keys, and credentials, as well as the developer's intellectual property, are well protected. This course provides an introduction to the key features of the Android security model: from the Android operating system to the hardware it runs on. Instructor Malcolm Shore demonstrates the weaknesses in some sample commercial Android apps, and shows the default output from existing development environments, including Android Studio, PhoneGap, and RAD Studio. He then explains a range of tools and techniques to increasingly harden an Android app, secure known vulnerabilities, and test your work. Malcolm also reviews advanced techniques for securing enterprise apps and leveraging the security enhancements in Android O. Using these tutorials, you'll be able to develop more secure and more robust mobile applications. Umfang: 01:44:12.00
Inhalt: It is estimated that by 2020, there will be 20 billion IoT devices worldwide. Designing security around these devices is crucial. In this course, Malcolm discusses what some of the security concerns are, and then shows you how to design with these concerns in mind. He covers IoT development and he explains how to test an IoT gateway and IoT devices. Umfang: 02:50:08.00
Inhalt: IoT is one of the biggest new developments in IT, with growth expected to reach billions of devices in the short term. There is, however, a major gap in understanding of security for IoT. Many first-wave IoT systems are showing significant security weaknesses, and security is often recognized as one of the key blockers to successful IoT deployments. In this course, Malcolm Shore provides guidance for businesses intending to deploy IoT solutions on the end-to-end security architecture required to ensure the comprehensive security of their deployment. He provides an introduction to security architecture and discusses emerging IoT reference architecture, domain specific architecture, proximity network services, and more. Umfang: 02:05:01.00
Inhalt: The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsiders worked effectively for years, but it's no longer a viable option in today's world. Workers working remotely, insider threats, and attackers taking advantage of trust between internal systems-these demand a new approach to extending protection to all users and their devices, regardless of their location. In this course, Malcolm Shore shows how to better protect your networks and systems by adopting what's known as a zero trust approach to access control-removing trust relationships in networks and requiring that trust decisions are made at the time that access is requested. Malcom starts with a brief history of the concept of software trust, before moving onto key facets of the zero trust approach, the reasons for wanting to minimize trust relationships in network architectures, and the tenets and models that have been proposed for zero trust. Umfang: 00:52:02
Inhalt: The security required for cloud deployments is quite different from the security applied to on-site infrastructure. In order to ensure the most effective cloud security, cloud deployments should be properly architected. In this course, instructor Malcolm Shore shows how to do this using the SABSA enterprise security architecture. Malcolm goes over strategy, planning, and the ongoing architectural management processes needed to maintain the architecture and keep it relevant. He walks you through establishing a conceptual architecture, threat modeling, and risk management, then explains how the elements of the contextual and conceptual layers work together to provide a conceptual architecture suitable for the cloud. Malcolm covers how to create the logical architecture and align security services with attributes. He concludes with a description of cloud-delivered security services and a review of what you covered in the course. Umfang: 01:11:11
Programm Findus Internet-OPAC findus.pl V20.236/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 17.05.2024, 12:10 Uhr. 2.978 Zugriffe im Mai 2024. Insgesamt 513.208 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral