749Results for "Security Operations"
-
Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press1h 50m
Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press
By: Charles Pluta and Microsoft Press
Course
-
Complete Guide to Incident Response for Security Analysts6h 14m
Complete Guide to Incident Response for Security Analysts
By: Liam Cleary
Course
-
Building labs for incident response, threat hunting, and digital forensics12m
Building labs for incident response, threat hunting, and digital forensics
From: Building the Ultimate Cybersecurity Lab and Cyber Range
Video
-
Security operation considerations1m
Security operation considerations
From: Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press
Video
-
Security Operations3m
Security Operations
From: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep
Video
-
Security operations and administration4m
Security operations and administration
From: Systems Security Certified Practitioner (SSCP) Exam Tips
Video
-
COBIT for operational security5m
COBIT for operational security
From: Cybersecurity Foundations
Video
-
What is the security operation analyst exam?46s
What is the security operation analyst exam?
From: Microsoft Security Operations Analyst Associate (SC-200) Exam Tips
Video
-
Security automation in network operations6m
Security automation in network operations
From: Next-Generation Network Automation
Video
-
Security implementation and operations2m
Security implementation and operations
From: Cloud Computing: Understanding Core Concepts
Video
-
Obtaining security approval to operate5m
Obtaining security approval to operate
From: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Video
-
Atomic operations for efficient data sharing5m
Atomic operations for efficient data sharing
From: React: Web Workers
Video
-
Introduction to Security Orchestration, Automation and Response (SOAR)55m
Introduction to Security Orchestration, Automation and Response (SOAR)
By: Bryan Li
Course
-
IT Security Foundations: Operating System Security2h 4m
IT Security Foundations: Operating System Security
By: Lisa Bock
Course
-
Develop security operations to support a hybrid or multicloud environment7m
Develop security operations to support a hybrid or multicloud environment
From: Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep: 1 Design a Zero Trust Strategy and Architecture
Video
-
Introduction to Spring Security6m
Introduction to Spring Security
From: Spring Boot 2.0 Essential Training
Video
-
Security doesn’t operate in a vacuum4m
Security doesn’t operate in a vacuum
From: Five Biggest Mistakes of Cybersecurity Programs
Video
-
Operations security: Operational procedures and responsibilities (Clause A.12.1)5m
Operations security: Operational procedures and responsibilities (Clause A.12.1)
From: ISO 27001:2013-Compliant Cybersecurity: Annex A Controls
Video
-
Understanding SAP security roles2m
Understanding SAP security roles
From: SAP ERP Essential Training
Video
-
Get started with Microsoft Copilot for Security5m
Get started with Microsoft Copilot for Security
From: Microsoft Copilot for Security
Video
-
Evaluate a security operations strategy for sharing technical threat intelligence5m
Evaluate a security operations strategy for sharing technical threat intelligence
From: Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep: 1 Design a Zero Trust Strategy and Architecture
Video
-
Securing the Enterprise: A Guide to Cybersecurity Operations Management29m
Securing the Enterprise: A Guide to Cybersecurity Operations Management
By: Kevin Graham
Course
-
Beyond AWS security operations1m
Beyond AWS security operations
From: AWS Administration: Security Operations
Video
-
Operations security: Backup (Clause A.12.3)1m
Operations security: Backup (Clause A.12.3)
From: ISO 27001:2013-Compliant Cybersecurity: Annex A Controls
Video
-
Introducing the Security Operations domain40s
Introducing the Security Operations domain
From: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep
Video
-
Cloud (AKA “as a service”) is the future!13m
Cloud (AKA “as a service”) is the future!
From: The Zero Trust Framework
Video
-
Exam SC-200 Microsoft Security Operations Analyst: Introduction9m
Exam SC-200 Microsoft Security Operations Analyst: Introduction
From: Microsoft Security Operations Analyst Associate (SC-200) Cert Prep by Microsoft Press
Video
-
Module introduction: Evaluate governance risk compliance (GRC) technical strategies and security operations strategies49s
Module introduction: Evaluate governance risk compliance (GRC) technical strategies and security operations strategies
From: Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press
Video
-
Explain security concepts of cloud operations5m
Explain security concepts of cloud operations
From: CompTIA Cloud Essentials+ (CLO-002) Cert Prep
Video
-
Security operations3m
Security operations
From: Google Cloud Digital Leader Cert Prep: 5 Trust and Security with Google Cloud
Video
-
Building a security checklist3m
Building a security checklist
From: Google Cloud Security for Beginners: Tools and Services
Video
-
Creating a security policy for write operations3m
Creating a security policy for write operations
From: Building and Securing Restful APIs in .NET
Video
-
Understand the security operations suite4m
Understand the security operations suite
From: Google Cloud Security for Beginners: Tools and Services (2021)
Video
-
Operations security: Logging and monitoring (Clause A.12.4)5m
Operations security: Logging and monitoring (Clause A.12.4)
From: ISO 27001:2013-Compliant Cybersecurity: Annex A Controls
Video
-
Operations security: Control of operational software (Clause A.12.5)1m
Operations security: Control of operational software (Clause A.12.5)
From: ISO 27001:2013-Compliant Cybersecurity: Annex A Controls
Video
-
Introducing the threat hunting process6m
Introducing the threat hunting process
From: Complete Guide to Cybersecurity: A Practical Approach
Video
-
Evaluate a security operations strategy for incident management lifecycle4m
Evaluate a security operations strategy for incident management lifecycle
From: Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep: 1 Design a Zero Trust Strategy and Architecture
Video
-
Keeping security in operate3m
Keeping security in operate
From: DevSecOps: Building a Secure Continuous Delivery Pipeline
Video
-
Operations security: Technical vulnerability management (Clause A.12.6)2m
Operations security: Technical vulnerability management (Clause A.12.6)
From: ISO 27001:2013-Compliant Cybersecurity: Annex A Controls
Video
-
Cloud Security Operations1m
Cloud Security Operations
From: Certified Cloud Security Professional (CCSP) Exam Tips
Video
-
Considering private cloud security and operations1m
Considering private cloud security and operations
From: Cloud Computing: Understanding Private Cloud Options
Video
-
Modernize security operations3m
Modernize security operations
From: Introduction to Security Orchestration, Automation and Response (SOAR)
Video
-
Select a security framework4m
Select a security framework
From: Cybersecurity Careers: Become a Chief Information Security Officer (CISO)
Video
-
SSCP Cert Prep: 1 Security Operations and Administration2h 20m
SSCP Cert Prep: 1 Security Operations and Administration
By: Mike Chapple
Course
-
Exam SC-200 Microsoft Security Operations Analyst: Summary3m
Exam SC-200 Microsoft Security Operations Analyst: Summary
From: Microsoft Security Operations Analyst Associate (SC-200) Cert Prep by Microsoft Press
Video
-
Develop a security assessment policy1m
Develop a security assessment policy
From: Performing a Technical Security Audit and Assessment
Video
-
Operations security: Protection from malware (Clause A.12.2)1m
Operations security: Protection from malware (Clause A.12.2)
From: ISO 27001:2013-Compliant Cybersecurity: Annex A Controls
Video