Video description
Overview
A one-hour primer on detecting and protecting against security threats, before it's too late!
Description
The security landscape is in constant flux. Adversaries used to take months or years to compromise a network, but today only a few minutes--or even in some cases, seconds—is needed to compromise and exfiltrate data. Your only defense is to gain the knowledge you need to fully understand and prepare for the current threat landscape and how these threats are evolving. This one-hour primer on security threats in today’s world will set you on the road to understanding and accessing the tools you need to understand what is happening within the threat landscape, and specifically how to begin defending your network. You will also gain insight into the underground activities that adversaries are involved in, and what return of investment they seek after exploitation.
About the Instructor
Omar Santos, CISSP No. 463598, is a Principal Engineer in the Cisco Product Security Incident Response Team (PSIRT) within Cisco’s Security Research and Operations. He mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products, including cloud services. Omar has been working with information technology and cybersecurity since the mid-1990s. Omar has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies and the U.S. government. He is an active member of the security community, where he leads several industry-wide initiatives and standard bodies. Omar holds the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH) certifications, among others. Omar is the author of numerous books, video courses, white papers, and articles, and has delivered technical presentations at many conferences. You can follow Omar on Twitter: @santosomar
Topics covered include the following:
Lesson 1: Introduction to the Security Threat Landscape
Lesson 2: Security Fundamentals
Lesson 3: Attack Methods
Lesson 4: Evolution of Attacks in Network Infrastructure
Lesson 5: Improving the Security Posture
Skill Level
Beginner to Intermediate
What You Will Learn
Lesson 1: Introduction to the Security Threat Landscape
Lesson 2: Security Fundamentals
Lesson 3: Attack Methods
Lesson 4: Evolution of Attacks in Network Infrastructure
Lesson 5: Improving the Security Posture
Who Should Take This Course
- Network and security professionals
- This course helps any network professionals who want to learn the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats.
New Player Enables Streaming and Download Access
Now you can stream and download videos for unlimited 24/7 online/offline access and ownership.
- Streaming — Watch instantly as the video streams online in real time; after purchase simply click “Watch Now“ to get started.
- Download — Download video files for offline viewing anytime, anywhere; after purchase simply click the download icon within the player and follow the prompts.
Plus, enjoy new player features that track your progress and help you navigate between modules.
Lesson 1: Introduction to the Security Threat Landscape
This lesson provides an introduction to the current security threat landscape. It provides information on how attackers are able to steal information and cause harm. This lesson also highlights the evolution of networking, and how security threats have also evolved.
Lesson 2: Security Fundamentals
This lesson focuses on the CIA triad: Confidentiality, Integrity, and Availability. This lesson also defines security vulnerabilities, security threats, and countermeasures.
Lesson 3: Attack Methods
This lesson covers examples of different attack methods used by bad actors when compromising networks and stealing data.
Lesson 4: Evolution of Attacks in Network Infrastructure
This lesson reveals insights about the evolution of attacks in network infrastructure, and how to protect against these types of attacks.
Lesson 5: Improving the Security Posture
This lesson provides guidelines and recommendations on how to increase the security posture of your network, along with security operational best practices.
About LiveLessons Video Training
LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View all LiveLessons on InformIT at http://www.informit.com/livelessons.
About the Networking Talks Series
Pearson’s Networking Talks are quick-hitting video primers that cover key and emerging concepts for computer networking professionals. Networking Talks are video tutorials led by the industry’s most recognizable expert trainers and authors. Each video is about an hour in duration and includes a topical overview followed by an exploration of specific concepts that are discussed in detail. Networking Talks are published by Cisco Press and Pearson IT Certification–the leader in IT Certification learning solutions. Your purchase provides you with lifetime online access to the content.
Table of contents
Product information
- Title: The Current Security Threat Landscape Networking Talks LiveLessons
- Author(s):
- Release date: December 2015
- Publisher(s): Cisco Press
- ISBN: 0134466276
You might also like
article
Twenty Years of Open Innovation
Organizations that practice open innovation draw on external resources to develop new ideas for products and …
book
Beginning Backup and Restore for SQL Server: Data Loss Management and Prevention Techniques
Be guided through the techniques to back up and restore databases and files in SQL Server. …
article
Detect Fraud Using Isolation Forest
These shortcuts delve into generative AI, where algorithms and models create synthetic data, detect anomalies, and …
video
CCNA Cyber Ops SECOPS 210-255
Overview More than nine hours of video instruction on configuration and troubleshooting tasks to prepare you …