Secure Operations and Protections, 2nd Edition

Video description

4+ hours of video instruction

Gain an introductory understanding of secure operations and protections concepts.

Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With over 4 hours of video training, the Secure Operations and Protections, 2nd Edition video course explores organizations' strategies, practices, and technologies to protect their systems, networks, and data, ultimately enhancing their overall security posture. Dive into the essential aspects of secure operations, including network security, system hardening, and incident response planning.

Throughout the video course, expert trainer, author and cybersecurity expert Aamir Lakhani uses hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals. This video course teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations.

Topics include:

  • System and Network Architecture Concepts
  • Efficiency and Process Improvement
  • Recommended Controls to Mitigate Attacks and Software Vulnerabilities
  • Analyzing Data to Prioritize Vulnerabilities

About the Instructor:

Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations.

Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. Mr. Lakhani is considered an industry leader for creating detailed security architectures within complex computing environments. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet’s dark security movement. He is the author or contributor of several books, and has appeared on FOX Business News, National Public Radio, and other media outlets as an expert on cybersecurity.

Writing under the pseudonym Dr. Chaos, Mr. Lakhani also operates the popular security social media blog which is hosted at DrChaos.com. In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as “a blogger, InfoSec specialist, super hero…and all around good guy.”

Skill Level:

  • Beginner

Learn How To:

  • Protect data and secure an organizations operation in their day-to-day business
  • Observe, collect, and secure date
  • Detect common security encounters and be prepared for them
  • Implement processes that allow communication of information in a correct and timely manner

Who Should Take This Course:

  • Cybersecurity Professionals
  • Anyone interested in learning cyber security fundamentals.

About Pearson Video Training:

Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.

Table of contents

  1. Introduction
    1. Secure Operations and Protections: Introduction
  2. Lesson 1: Importance of System and Network Architecture Concepts in Security Operations
    1. Learning objectives
    2. 1.1 Log ingestion–Part 1
    3. 1.2 Log ingestion–Part 2
    4. 1.3 Operating system (OS) concepts
    5. 1.4 Infrastructure concepts
    6. 1.5 Network architecture
    7. 1.6 Identity and access management
    8. 1.7 Encryption
    9. 1.8 Sensitive data protection
  3. Lesson 2: Importance of Efficiency and Process Improvement in Security Operations
    1. Learning objectives
    2. 2.1 Standardize processes
    3. 2.2 Streamline operations
    4. 2.3 Technology and tool integration
  4. Lesson 3: Recommend Controls to Mitigate Attacks and Software Vulnerabilities
    1. Learning objectives
    2. 3.1 Cross-site scripting
    3. 3.2 Overflow vulnerabilities
    4. 3.3 Data poisoning
    5. 3.4 Broken access control
    6. 3.5 Cryptographic failures
    7. 3.6 Injection flaws
    8. 3.7 Cross-site request forgery
    9. 3.8 Directory traversal
    10. 3.9 Insecure design
    11. 3.10 Security misconfiguration
    12. 3.11 End-of-life or outdated components
    13. 3.12 Identification and authentication failures
    14. 3.13 Server-side request forgery
    15. 3.14 Remote code execution
    16. 3.15 Privilege escalation
    17. 3.16 Local file inclusion (LFI)/remote file inclusion (RFI)
  5. Lesson 4: Analyze Data to Prioritize Vulnerabilities
    1. Learning objectives
    2. 4.1 Compensating controls
    3. 4.2 Control types
    4. 4.3 Patching and configuration management
    5. 4.4 Maintenance windows
    6. 4.5 Exceptions
    7. 4.6 Risk management principles
    8. 4.7 Policies, governance, and service-level objectives (SLOs)
    9. 4.8 Prioritization and escalation
    10. 4.9 Attack surface management
    11. 4.10 Secure coding best practices
    12. 4.11 Secure software development life cycle (SDLC)
    13. 4.12 Threat modeling
  6. Summary
    1. Secure Operations and Protections: Summary

Product information

  • Title: Secure Operations and Protections, 2nd Edition
  • Author(s): Aamir Lakhani
  • Release date: April 2024
  • Publisher(s): Pearson
  • ISBN: 0135341671