Video accessible from your Account page after purchase.
Register your product to gain access to bonus material or receive a coupon.
Overview:
This master class includes the following courses:
The Threat Intelligence and Threat Hunting, 2nd Edition video course provides learners with the knowledge and skills to fortify systems, protect sensitive data, and ensure compliance with privacy regulations.
System and Privacy Data Protection LiveLessons provides learners with an understanding of how to protect and store existing data, as well as why data confidentiality and business impacts are critical to data protection. In this course, the learner will examine multiple aspects of system privacy and data protection, ranging from basic concepts to tools that are commonly used by data practitioners.
Malware and Incident Response LiveLessons provides learners with an understanding of basic malware analysis and how to respond to incidents as soon as they happen. Learners will also explore the basics of how malware works and how to set up a safe environment to analyze malware in a lab. This course is meant to be an introduction to simple tools and techniques for those new to cyber security.
The Secure Operations and Protections, 2nd Edition video course explores organizations' strategies, practices, and technologies to protect their systems, networks, and data, ultimately enhancing their overall security posture. Dive into the essential aspects of secure operations, including network security, system hardening, and incident response planning.
In all these courses, expert trainer, author, and cybersecurity expert Aamir Lakhani uses hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals. Aamir teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations.
About Pearson Video Training:
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Threat Intelligence and Threat Hunting, 2nd Edition
Introduction
Lesson 1: Threat-Intelligence and Threat-Hunting Concepts
Lesson 2: Analyze Indicators of Potentially Malicious Activity
Lesson 3: Tools or Techniques to Determine Malicious Activity
Lesson 4: Concepts Related to Attack Methodology Frameworks
Lesson 5: Utilizing Threat Intelligence to Support Organization Security
Lesson 6: Analyze Output from Common Vulnerability Assessment Tools
Lesson 7: Threats and Vulnerabilities Associated with Specialized Technology
Summary
--
System and Privacy Data Protection
Introduction
Lesson 1: Data Privacy and Protection
Lesson 2: Risk Mitigation
Lesson 3: Importance of Policies, Procedures, and Controls
Lesson 4: Analyzing Logs and Impact Analysis
Lesson 5: SIEMs and Query Writing
Lesson 6: E-Mail Analysis
Lesson 7: Automation
Summary
--
Malware and Incident Response
Introduction
Lesson 1: Threat Landscape
Lesson 2: Malware Labs
Lesson 3: Dynamic Analysis
Lesson 4: Malware Packet Analysis
Lesson 5: PE File Identification
Lesson 6: File Persistence
Lesson 7: String Analysis
Summary
--
Secure Operations and Protections, 2nd Edition
Introduction
Lesson 1: Importance of System and Network Architecture Concepts in Security Operations
Lesson 2: Importance of Efficiency and Process Improvement in Security Operations
Lesson 3: Recommend Controls to Mitigate Attacks and Software Vulnerabilities
Lesson 4: Analyze Data to Prioritize Vulnerabilities
Summary