Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : Addison-Wesley Professional
    ISBN: 9780138057244 , 0138057249
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 50 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: Live lessons
    DDC: 005.74
    Keywords: Blockchains (Databases) ; Cryptocurrencies ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: 7 Hours of Video Instruction 7 hours of focused video training to teach core blockchain and cryptocurrency skills Overview Practical Blockchain and Cryptocurrency LiveLessons is your complete guide to learning and incorporating practical crypto and blockchain knowledge and skills for your company's systems. Unlike some other courses, Practical Blockchain and Cryptocurrency LiveLessons focuses on real-world applications, so you can learn with hands-on demos. In this course you will learn how to: Buy, trade, mine your own, and use cryptocurrency, including Bitcoin, Ripple, and DOGE Create your own blockchains for internal enterprise IT applications Create and execute your own smart contracts Learn how to perform cybersecurity audits on blockchains This course was built for anyone who wants to understand how popular cryptocurrencies work including Bitcoins and ETH, as well as professionals needing to implement their own blockchain applications or mine cryptocurrencies, and cybersecurity professionals who need to test and audit Blockchain applications. The course concludes with topics of modern cyber attacks in cryptocurrency and blockchain space. You will have the tools needed to test your own blockchain applications and understand how to protect them against future attacks. Expert author and trainer Aamir Lakhani will give you hands-on practical experience to become a blockchain and cryptocurrency engineer and architect. Topics include Module 1: Introduction to Cryptocurrencies Module 2: The Blockchain Module 3: Mining Module 4: Blockchain Applications Module 5: Cyber Attacks Module 6 Evolution of Cryptocurrency and Blockchains About the Instructor Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations. Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions, and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. Mr. Lakhani is considered an industry leader in creating detailed security architectures within complex computing environments. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet's dark security movement. He is the author or contributor of several books and has appeared on FOX Business News, National Public Radio, and other media outlets as an expert on cybersecurity. Writing under the pseudonym Dr. Chaos, Mr. Lakhani also operates the popular security social media blog which is hosted at DrChaos.com. In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as "a blogger, InfoSec specialist, super hero...and all-around good guy." Skill Level Beginner Learn How To Understand the basics of blockchain technology Work blockchain and cryptocurrencies Create and store cryptocurrencies Create NFTs Write and enforce smart contracts on blockchains Course requirement None Who Should Take This Course Anyone interested in learning about blockchain Pen testing or ed team for blockchain applications Blockchain Engineers and Architects for Enterprise IT organizations Cryptocurrency expert or advisor About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 5, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    Language: English
    Pages: 1 online resource (1 streaming video file (21 hr., 40 min., 31 sec.)) , digital, sound, color
    Series Statement: LiveLessons
    Keywords: Computing Technology Industry Association Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Computing Technology Industry Association ; Examinations ; Study guides ; Computer security ; Examinations ; Study guides ; Computer networks ; Security measures ; Examinations ; Study guides ; Electronic videos ; local ; Computing Technology Industry Association ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Computer networks ; Security measures ; Examinations ; Computer security ; Examinations ; Examinations ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Abstract: "CompTIA Cybersecurity Analyst CSA+ (CS0-001) Complete Video Course contains 12 hours of training with content divided into 4 modules with 17 content targeted content lessons. This title covers every objective in the CompTIA CSA+ exam and includes two full practice exams, so you have everything you need to learn all of the cyber security principles that appear on the test; but more than that, you will learn the fundamentals of preventing, detecting and combatting cybersecurity threats. Full of live trainer discussions, hands-on demos, whiteboard work, and deep dive discussions, this course covers cyber security fundamentals in a way that is easy to access and even fun."--Resource description page.
    Note: Title from title screen (viewed November 30, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780134755885 , 013475588X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; Electronic books ; local
    Abstract: Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer Understand the realities of cybercrime and today's attacks Build a digital forensics lab to test tools and methods, and gain expertise Take the right actions as soon as you discover a breach Determine the full scope of an investigation and the role you'll play Properly collect, document, and preserve evidence and data Collect and analyze data from PCs, Macs, IoT devices, and other endpoints Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence Analyze iOS and Android devices, and understand encryption-related obstacles to investigation Investigate and trace email, and identify fraud or abuse Use social media to investigate individuals or online identities Gather, extract, and analyze breach data with Cisco tools and techniques Walk through common breaches and responses from start to finish Choose the right tool for each task, and explore alternatives that might also be helpful The professional's go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You'll learn how to make the most of today's best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now. This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references. - Description based on online resource; title from title page (viewed January 18, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    Language: English
    Pages: 1 online resource (1 streaming video file (13 hr., 24 min., 14 sec.)) , digital, sound, color.
    Series Statement: LiveLessons
    Keywords: Kali Linux ; Computer crimes ; Investigation ; Computer networks ; Security measures ; Computer security ; Electronic videos ; local
    Abstract: "Digital Forensics and Cyber Crime with Kali Linux Fundamentals LiveLessons introduces you to the world of digital forensics and acts as a primer for your future forensic work. This is a fundamentals course with a focus on the average network engineer, so you don't need to be an IT expert to follow most of the concepts. Learn when a breach occurs, what actions you can take, and how to learn from the breach to prevent future attacks. This video course focuses on using open source technology available in the Kali Linux framework along with other tools to simplify forensic tasks. You will master the basics of digital forensics, learn best practices, and explore legal and forensic service concepts."--Resource description page.
    Note: Title from title screen (viewed August 30, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138320256 , 013832025X
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computing Technology Industry Association Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: "Video course.". - "Sneak peak.". - Online resource; title from title details screen (O'Reilly, viewed November 15, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 19 hr., 33 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. 20 Hours of Video Instruction 20 hours of deep-dive training covering every objective in the CompTIA Cybersecurity Analyst CySA+ (CS0-002) exam. Overview: The CompTIA Cybersecurity Analyst (CySA+) CS0-002 Complete Video Course is a full and complete resource to successfully study for the CompTIA CySA+ exam. With 20 hours of video training this course provides learners with topic-focused coverage on key exam topics, deep-dive demos and examples, and an exploration of relevant cybersecurity foundations and principles to help you gain an in-depth understanding of each objective in the CompTIA CySA+ certification, as well as a deeper understanding of cyber security. CompTIA Cybersecurity Analyst (CySA+) CS0-002 Complete Video Course contains 20 hours of training with content divided into 7 modules with 33 content targeted lessons. This title will surpass the traditional “test prep” training by providing an in-depth analysis of core concepts so that students understand all objectives in the CySA+ exam and will learn the fundamentals of preventing, detecting, and combatting cybersecurity threats. Taught by expert trainer, author, and cybersecurity expert Aamir Lakhani, this course uses trainer discussions, hands-on demos, and lightboard work to teach cyber security fundamentals in a way that is easy to access and implement in real world situations. About the Instructor Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations. Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions, and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. His areas of expertise include cyber defense, mobile application threats, malware management, ...
    Note: Online resource; Title from title screen (viewed November 5, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 31 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: 4+ Hours of Video Instruction 4+ hours of deep-dive training covering key system privacy and data protection concepts Overview: Cybersecurity is not only about preventing data breaches and hunting for attackers, it also involves many aspects of system and data privacy. With more than 4 hours of video training, System and Privacy Data Protection LiveLessons provides learners with an understanding of how to protect and store existing data, as well as understand that data confidentiality and business impacts are critical to data protection. In this course, the learner will examine multiple aspects of system privacy and data protection ranging from basic concepts to tools that are commonly used by data practitioners. System and Privacy Data Protection LiveLessons is taught by expert trainer, author, and cybersecurity expert Aamir Lakhani using hands-on demos, in-depth discussions, and lightboard explanations. This course will cover the best practices cybersecurity fundamentals in a way that is easy to access and implement in real world situations. Topics include: Data Privacy and Protection Risk Mitigation Importance of Policies, Procedures, and Controls Analyzing Logs and Impact Analysis SIEMs and Query Writing E-Mail Analysis Automation About the Instructor Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations. Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions, and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet’s dark security movement. Skill Level: Beginner Learn How To: Manage your security and privacy Protect and store existing data Use common tools to analyze and store logs Conduct impact analysis and risk mitigation Who Should Take This Course: Cybersecurity Professionals Anyone interested in learning cyber security fundamentals Cours...
    Note: Online resource; Title from title screen (viewed January 12, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 8 hr., 59 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: 7+ Hours of Video Instruction 7+ hours of video training exploring key threat intelligence and threat hunting concepts Overview: A cybersecurity professional needs to understand threats, threat actors, and have a clear understanding of where attackers are trying to take advantage of vulnerabilities. With more than 7 hours of video training, Threat Intelligence and Threat Hunting LiveLessons provides learners with a look at where the vulnerabilities in software, cloud, and other attack surfaces exist. Throughout the course, the learner will explore how to classify threats, work with the vulnerabilities, and use common assessment methodologies. The course will also dive into understanding threats against Internet of Things, real-time operating systems, and cloud-based environments. Threat Intelligence and Threat Hunting LiveLessons is taught by expert trainer, author, and cybersecurity expert Aamir Lakhani using hands-on demos, in-depth discussions, and lightboard explanations. The course will cover the best practices for cybersecurity in a way that is easy to access and implement in real world situations. Topics include: Importance of Threat Data and Intelligence Utilizing Threat Intelligence to Support Organization Security Vulnerability Management Activities Analyzing Output from Common Vulnerability Assessment Tools Threats Associated with the Cloud and Specialized Technology Implementing Controls to Mitigate Attacks and for Software Vulnerabilities Analyzing Logs and Impact Analysis About the Instructor Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations. Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions, and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet’s dark security movement. Skill Level: Beginner Learn How To: Apply key threat int...
    Note: Online resource; Title from title screen (viewed January 12, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 60 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: 2 Hours of Video Instruction 2 hours of introductory training covering key malware and incident response concepts Overview: Threats, viruses, and attacks are unavoidable and as a cybersecurity professional you will need to understand how to analyze these threats. With 2 hours of video training, Malware and Incident Response LiveLessons provides learners with an understanding of basic malware analysis and how to respond to incidents when they happen. Leaners will also explore the basics of how malware works and how to set up a safe environment to analyze malware in a lab. This course is meant to be an introduction to simple tools and techniques for those new to cyber security. Malware and Incident Response LiveLessons is taught by expert trainer, author and cybersecurity expert Aamir Lakhani. Using hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals, this video course teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations. Topics include: Threat Landscape Malware Labs Dynamic Analysis Malware Packet Analysis PE File Identification File Persistence String Analysis Skill Level: Beginner Learn How To: Set up a safe environment to analyze malware in a lab Use simple tools and techniques for malware analysis Respond to threats, viruses, and attacks Who Should Take This Course: Cybersecurity Professionals Anyone interested in learning cyber security fundamentals Course Requirements: There is no required prerequisite. About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video. Video Lessons are available for download for offline viewing within the streaming format. Look for the green arrow in each lesson.
    Note: Online resource; Title from title screen (viewed December 15, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Place of publication not identified] : Addison-Wesley Professional
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Information technology Security measures ; Intrusion detection systems (Computer security) ; Computer networks Security measures ; Technologie de l'information ; Sécurité ; Mesures ; Systèmes de détection d'intrusion (Sécurité informatique) ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: 18+ Hours of Video Instruction Description This master class includes the following courses: Threat Intelligence and Threat Hunting LiveLessons System and Privacy Data Protection LiveLessons Malware and Incident Response LiveLessons Secure Operations and Protections LiveLessons Threat Intelligence and Threat Hunting LiveLessons A cybersecurity professional needs to understand threats, threat actors, and have a clear understanding of where attackers are trying to take advantage of vulnerabilities. With more than 7 hours of video training, Threat Intelligence and Threat Hunting LiveLessons provides learners with a look at where the vulnerabilities in software, cloud, and other attack surfaces exist. Throughout the course, the learner will explore how to classify threats, work with the vulnerabilities, and use common assessment methodologies. The course will also dive into understanding threats against Internet of Things, real-time operating systems, and cloud-based environments. System and Privacy Data Protection LiveLessons Cybersecurity is not only about preventing data breaches and hunting for attackers, it also involves many aspects of system and data privacy. With more than 4 hours of video training, System and Privacy Data Protection LiveLessons provides learners with an understanding of how to protect and store existing data, as well as understand that data confidentiality and business impacts are critical to data protection. In this course, the learner will examine multiple aspects of system privacy and data protection ranging from basic concepts to tools that are commonly used by data practitioners. Malware and Incident Response LiveLessons Threats, viruses, and attacks are unavoidable and as a cybersecurity professional you will need to understand how to analyze these threats. With 2 hours of video training, Malware and Incident Response LiveLessons provides learners with an understanding of basic malware analysis and how to respond to incidents when they happen. Leaners will also explore the basics of how malware works and how to set up a safe environment to analyze malware in a lab. This course is meant to be an introduction to simple tools and techniques for those new to cyber security. Secure Operations and Protections LiveLessons Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With more than 3 hours of video training, Secure Operations and Protections LiveLessons dives into the methodologies behind how organizations and secure operation centers observe, collect, and secure data. This course provides the learner with an understanding of basic operations and architectures that a Security Operations Center would encounter by examining standard software development life cycles and change control processes. This masterclass is taught by expert trainer, author and cybersecurity expert Aamir Lakhani. Using hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals, this video course teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations. Course Requirements Basic understanding of computer systems and cybersecurity About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 9, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...