Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (26)
  • HBZ
  • Packt Publishing,  (26)
  • Examinations  (26)
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886465 , 1835886469
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Information Systems Audit and Control Association Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to the context of IT risk management, laying the foundation with key concepts and illustrating the vital role of IT risk management in shaping business strategy. The course progresses to elucidate the RACI Chart, essential roles concerning risk, and the influence of organizational structure and culture on risk management practices. It focuses on developing a solid understanding of risk management principles, processes, and controls, and delves into the relationship between IT risk and other business functions. It also addresses project risk, change risk, and the nuances of people and technology in the risk landscape. The course wraps up with practical insights into implementing controls, testing their effectiveness, and deploying risk response plans, all while emphasizing the value of risk communication and the importance of policies, standards, and procedures. What you will learn Grasp IT risk management fundamentals Navigate RACI charts and risk roles Assess organizational risk impact Communicate risk effectively Develop risk scenarios and responses Utilize key risk assessment tools Audience This course is ideal for IT professionals aiming to bolster their risk management skills. Knowledge of basic IT concepts is recommended. Perfect for those prepping for CRISC certification or seeking to align IT strategies with business objectives for robust security management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on chrmodern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883006 , 1835883001
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Access control ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883341 , 1835883346
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer software developers Certification ; Computer software Study guides Development ; Examinations ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with setting up essential development and virtualization tools on both Linux and Windows, laying the groundwork for efficient network development. You'll delve into various data formats like JSON, XML, and YAML, essential for modern software development and API interactions. As the course progresses, it explores software development methodologies, including Agile, Lean, and Waterfall, providing insights into choosing the right approach for your projects. You'll also gain a solid understanding of software quality, code organization, and version control, with a focus on Git basics for both local and remote management. The course emphasizes practical applications of these skills in real-world scenarios, from API basics to managing application infrastructure and security. The course wraps up by immersing you into the world of DevOps, including Docker and Bash basics, unit testing, and automated testing strategies, complemented by hands-on experience in configuring devices with Bash, Python, and Ansible. You'll also navigate through key networking concepts, IP services, and platform capabilities, culminating with Python scripting using a Cisco SDK. What you will learn Understand Agile, Lean, and Waterfall methodologies Learn Git basics and version control Grasp API usage and application infrastructure Dive into Docker and Bash essentials Configure devices using Python and Ansible Navigate through networking basics and IP services Audience This course is ideal for IT professionals and network enthusiasts seeking to enhance their skills in network development and automation. Familiarity with basic networking and programming concepts is beneficial. Perfect for those aiming to acquire Cisco DevNet Associate certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880784 , 1835880789
    Language: English
    Pages: 1 online resource (1 video file (39 hr., 53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies. By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security. What you will learn Understand the core principles of Security and Risk Management Explore advanced Security Architecture and Engineering concepts Build effective strategies for Asset Security and management Implement robust Communication and Network Security protocols Master Identity and Access Management (IAM) processes Learn to conduct thorough Security Assessments and Testing Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to become a CISSP. A basic understanding of IT security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881309 , 1835881300
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Certified Information Security Manager (CISM) certification is the pinnacle for individuals aspiring to excel in Information Security Management. This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. Uncover essential strategies, frameworks, and techniques encompassing governance principles, risk assessment methodologies, security program construction, and incident handling practices. Explore how to integrate security requirements seamlessly into IT operations, align strategies with business objectives, and effectively manage and mitigate incidents. Understanding these domains isn't just about passing the CISM exam; it's about gaining expertise to excel in today's cybersecurity landscape. Delve into regulatory impacts, risk assessment methodologies, security policy development, and incident response strategies. Equip yourself to align security programs with business objectives, analyze emerging threats, and navigate incident categorization and post-incident reviews. What you will learn Integrate governance principles into operations effectively Manage security risks using robust assessment methodologies Implement incident management aligned with regulations Identify and categorize incidents for prompt resolution Create essential policies for organizational resilience Ace post-incident reviews for continuous improvement Audience This course is tailored for aspiring or current information security professionals aiming to pursue the Certified Information Security Manager (CISM) certification. Prerequisites for this course include a basic understanding of information security concepts and familiarity with IT governance frameworks. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886328 , 1835886329
    Language: English
    Pages: 1 online resource (1 video file (48 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Penetration testing (Computer security) Study guides Examinations ; Hacking Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Hackers Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Piratage informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Pirates informatiques ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical hacking. It delves into attacker motives and the intricacies of various attack classifications, establishing a robust foundation in cybersecurity principles. The course then covers the entire spectrum of cyber threat landscapes, from information warfare to the Cyber Kill Chain. It discusses vital topics like risk management and cyber threat intelligence, equipping you with the skills to manage cyber threats efficiently. The course shifts its focus to advanced concepts such as the MITRE ATT&CK Framework, the Diamond Model of Intrusion Analysis, and the CEH Hacking Methodology, merging these with practical ethical hacking skills. You'll gain insights into the nuances of threat hunting, incident handling, and the role of machine learning and AI in cybersecurity. The course also addresses critical aspects of network and web security, including various scanning and enumeration techniques, vulnerability assessments, and countermeasures against common cyber threats. You'll also delve into specialized areas like mobile, IoT, and cloud security. The course concludes with an emphasis on the latest standards and regulations in cybersecurity, preparing you for the CEH certification and real-world cybersecurity challenges. What you will learn Navigate ethical hacking methodologies and frameworks Conduct comprehensive network and web security assessments Develop skills in mobile, IoT, and cloud security strategies Prepare for the CEH certification with practical insights and knowledge Utilize and analyze various cyber-attack classifications Implement effective threat hunting and incident management Audience This Certified Ethical Hacker course is designed to strengthen the practical knowledge of security officers, auditors, site administrators, and any professional focused on network security. It's an excellent fit for those responsible for safeguarding network infrastructure and keen to deepen their understanding of ethical hacking. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Sophie Goodwin: Sophie Goodwin is a Voice-Over talent. Her background spans over eight years as a film and voice talent, with experience in eLearning content, independent films, TV & web commercials, and video games. She joined ACI Learning while completing her BS in Telecommunication at the University of Florida. Apart from her work as an Edutainer, Sophie is also involved in other aspects of the entertainment industry. She is certified in (ISC)_ CC: Certified in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888186 , 1835888186
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer networks Study guides Examinations ; Telecommunication Study guides Switching systems ; Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Télécommunications ; Systèmes de commutation ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at Cisco's NX-OS, laying a foundation for understanding data center environments. It progresses to OSPFv2 and OSPFv3, crucial for robust network communication, and explores Multi-Protocol BGP and PIM, key for scalable networks. Advanced network solutions like FHRPs, RSTP+, and LACP are covered, essential for network resilience. You'll delve into vPC, VXLAN, EVPN, and OTV, essential for network virtualization and overlay networks. The focus then shifts to Cisco ACI, introducing intent-based networking with Cisco APIC. Topics include ACI Access Policies, Tenant Policies, and Contracts. You'll learn about UCS Rack Servers, Blade Chassis, and delve into UCS Infrastructure and Network Management. The course includes insights on UCS Software Updates, NetFlow, SPAN, and Streaming Telemetry, crucial for network maintenance and troubleshooting. Wrapping up, the course covers Fibre Channel, Port Channels, Nexus Software Updates, and essentials of cloud computing with NIST 800-145, equipping you with the knowledge to handle modern data center demands. What you will learn Understand NX-OS and OSPF protocols Gain expertise in FHRPs and RSTP+ Learn advanced LACP and vPC DCCOR Explore VXLAN and EVPN technologies Grasp ACI Tenant Policies and Contracts Analyze packet flow and cloud concepts Audience This course is ideal for network professionals aiming to specialize in data center technologies. Prior knowledge of networking and basic Cisco concepts is recommended. This course is perfect for those seeking to align their skills with Cisco's advanced data center solutions and practices. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884348 , 1835884342
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an understanding of software security fundamentals, where you'll grasp the importance of secure coding practices and the repercussions of negligence. As you progress, you'll tackle real-world scenarios, learning to identify vulnerabilities and employ strategies to mitigate risks. The course focuses on the hands-on application of security principles, from initial software design to post-deployment checks, ensuring you're adept at protecting applications against modern threats. You'll dive into the OWASP Top Ten, encryption, and secure session management, gaining the foresight to preempt security breaches. The course wraps up by honing your skills in error handling, testing for security, and effective logging, transforming you into an invaluable asset for any development team focused on creating cyber-secure applications. What you will learn Implement secure password protocols Employ encryption for data security Design software with security in mind Apply OWASP security standards Execute thorough security testing Monitor applications against threats Audience The course is ideal for software developers and coders keen to specialize in secure application development. A foundational understanding of programming and basic security concepts is recommended. Perfect for those who aim to integrate top-notch security measures into their development processes. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882047 , 1835882048
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Study guides Design ; Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of enterprise network design, introducing high availability techniques and WLAN deployment options. You'll compare on-premises and cloud solutions, gaining insights into the complexities of modern networking. The journey includes learning about SD-WAN, SD-Access, and QoS, enhancing your network performance skills. Focusing on advanced topics, you'll delve into Cisco Express Forwarding, device and path virtualization technologies like GRE and IPsec, essential for secure network architecture. The course also covers LISP, VXLAN, and VTP, crucial for network scalability. Troubleshooting techniques form a key part of the curriculum, addressing challenges in 802.1Q, EtherChannel, and more. You'll gain expertise in routing protocols such as OSPF and BGP, crucial for enterprise networking. The course also covers wireless networking fundamentals, NTP, NAT/PAT, and FHRP. Wrapping up, the course dives into network security and automation, including REST API security and orchestration tools, equipping you for the dynamic field of enterprise networking. This comprehensive course prepares you for navigating complex network environments and emerging technologies. What you will learn Grasp enterprise network design fundamentals Learn WLAN deployment strategies Compare on-prem and cloud network deployments Deepen knowledge of Quality of Service (QoS) Explore Cisco Express Forwarding techniques Develop troubleshooting skills for network issues Audience This course is ideal for network professionals and enthusiasts seeking advanced skills in enterprise networking. Prior knowledge of basic networking concepts and familiarity with Cisco's network environment is recommended. This course is perfect for those looking to deepen their understanding of Cisco's enterprise solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888940 , 1835888941
    Language: English
    Pages: 1 online resource (1 video file (30 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Computer technicians Study guides Certification ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey with our exhaustive CompTIA Security+ Training Guide, meticulously designed to pave your path from a cybersecurity enthusiast to a certified expert. This extensive course is your ultimate roadmap to mastering the wide-ranging concepts of information security, from the foundational cybersecurity frameworks to the advanced mechanisms of risk management. Each section unfolds progressively, allowing you to build upon your knowledge through engaging lessons that cover essential security roles, threat types, cryptographic solutions, and much more. As cyber threats grow more sophisticated, the demand for professionals equipped with comprehensive and advanced skills has skyrocketed. Our course not only delves into theoretical knowledge but also provides hands-on practical scenarios to solidify your understanding. With over 30 hours of expert content, you'll learn the intricacies of securing networks, managing vulnerabilities, and ensuring resilience in the face of digital threats. By the end of this course, you'll not just be prepared to ace the CompTIA Security+ exams but also to tackle real-world security challenges with confidence and expertise. What you will learn Summarize fundamental security concepts to build a strong base. Compare various threat types to better understand security breaches. Explain cryptographic solutions to secure organizational data. Implement robust identity and access management controls. Secure enterprise and cloud network architectures against potential threats. Enhance application security capabilities and ensure software integrity. Audience This course is tailored for IT professionals eager to climb the cybersecurity career ladder, entry-level individuals ready to step into the security arena, and students focused on carving out a future in information security. It's also the perfect starting point for anyone seeking to build a solid foundation in cybersecurity principles, offering the knowledge and credentials needed to thrive in this dynamic field. About the Author Alexander Oni : Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805125044 , 1805125044
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3/8
    Keywords: Business Study guides Data processing ; Examinations ; Microsoft software Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Set out on a comprehensive journey through our PL-900 certification course, which equips you with the knowledge you need to pass the PL-900 exam. This course offers over 15 hours of instructional content, 140 pages of study guides, and practice exams, ensuring that you have all the resources required for success. The course aligns closely with the PL-900 curriculum, following the 76 learning objectives defined by Microsoft. It's structured to enhance your chances of passing the exam by systematically addressing each learning objective in sequence, ensuring that you never feel lost. Start by familiarizing yourself with the PL-900 exam and the most effective strategies for success. Then, configure the Power Platform on your computer to prepare your learning environment. Throughout the course, you will dive into understanding the business value and core components of Microsoft Power Platform, master Power BI to create powerful reports and gain valuable insights, develop proficiency in Power Apps for crafting custom business applications, and gain in-depth knowledge of Power Automate to streamline business processes. Additionally, you will explore how to leverage the capabilities of Power Virtual Agents to create efficient chatbots. By the end of the course, you will be equipped to learn, demonstrate, and apply Power BI capabilities to build sophisticated reports. Join us on this empowering learning journey to unlock your full potential in the Microsoft Power Platform realm. What You Will Learn Learn everything required to pass the PL-900 exam and achieve the Power Platform Fundamentals certification Understand the core components and business value of Microsoft Power Platform Master Power BI capabilities for creating advanced reports and gaining valuable insights Learn Power Apps to design and build customized business applications Gain expertise in Power Automate for streamlined automation of everyday business processes Learn how to effectively communicate the significance of Microsoft Power Platform's core components Audience This course is designed to cater to a diverse range of learners, including students aiming to pass the PL-900 exam and earn the esteemed Microsoft Power Platform Fundamentals certification. Data analysts and business managers seeking insights into the Power Platform's capabilities will find this course invaluable. Additionally, individuals interested in mastering Power Apps, Power Automate, Power BI, Power Virtual Agents, Dataverse, Connectors, and AI Builder will benefit greatly. If you aspire to receive an official Microsoft certificate, or if you are looking for a comprehensive introduction to the Power Platform, this course caters to your learning needs. About The Author HHN Automate Book Inc.: Henry Habib is a seasoned manager at a leading management consulting firm. He leverages his expertise to provide counsel on growth strategy, operation, and analytics to Fortune 500 companies. With a strong background in implementing data-driven solutions, Henry has a proven track record of making an impact in organizations of all sizes. He strongly advocates for no-code application development in business and deploys such solutions for his clients. These solutions are not only easier to understand but also quicker to implement. In addition to his consulting work, Henry is a dedicated professor who takes pleasure in guiding students toward success in various fields, ranging from case interviews to no-code application development and automation. His courses are designed to be engaging and informative, and he is always available to assist students in mastering challenging concepts.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 5, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781837632244 , 1837632243
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This refresher course covers all the eight domains of the CISSP certification exam. You will cover topics ranging from security and risk management in an organization. How organizations use asset management to discover what data and systems exist in their organization in order to provide proper protection. You will learn security in architecture, networking, and physical locations. Lastly, you will see how security fits in the software development lifecycle and how organizations test and monitor for security in their organization. Further, you will learn about the importance of security concepts such as confidentiality, integrity, and availability. How authentication and authorization are used to manage user and system access. How organizations prepare for disasters and ready themselves to resume operations. How risk management is used to define the organization's approach to security. By the end of this course, you will have a much better understanding of how security fits in an organization and will be prepared to take this examination. What You Will Learn Understand risk, threat, and vulnerability management Understand the importance of security training Learn asset management, retention, and lifecycle Learn cryptography principles and their application in a system Understand facility design and protection against threats Understand security in the software development lifecycle Audience This course is for cyber security professionals looking to expand their knowledge and take the CISSP exam and for technology practitioners who want to understand cyber security and leaders who want to understand cyber security. About The Author Derek Fisher: Derek Fisher is a leader, speaker, author, and instructor in cyber security. He has several decades of experience in designing systems in both hardware and software and holds a graduate degree in cyber security from Boston University. He continues to work professionally as a leader, university instructor, and conference speaker in the security space, where he provides his insight into multiple fields and disciplines.
    Note: Online resource; title from title details screen (O’Reilly, viewed February 7, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887684 , 1835887686
    Language: English
    Pages: 1 online resource (1 video file (23 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Cloud computing Study guides Examinations ; Microcomputers Study guides Maintenance and repair ; Examinations ; Computer technicians Study guides Certification ; Examinations ; Telecommunications engineers Study guides Certification ; Examinations ; Infonuagique ; Examens ; Guides de l'étudiant ; Micro-ordinateurs ; Entretien et réparations ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins with an introduction to the pivotal role of cloud computing in modern IT. Exploring beyond basic data storage and processing, it covers scalability, security, and various deployment models, providing an all-encompassing view of the cloud environment. Structured as an engaging journey, the course delves into the deployment and service models, emerging cloud technologies, and strategies for business and performance capacity planning. It emphasizes high availability, scalability, and effective use of regions and availability zones. You'll navigate through the complexities of Identity and Access Management (IAM), network security, and data protection, underlining the critical aspect of security in cloud computing. Practical demonstrations and hands-on exercises include resource provisioning, virtual machine deployment, and container configuration, ensuring real-world applicability. Towards the end, the course focuses on optimizing and maintaining cloud environments, with insights into automation, orchestration, and operational management. Completing this course equips you for the CompTIA Cloud+ certification and empowers you to manage and secure cloud environments, staying abreast of evolving technologies and threats. What you will learn Master Cloud deployment models Explore emerging Cloud technologies Plan for business capacity Implement high availability strategies Secure Cloud traffic effectively Deploy and configure containers Audience This course is tailored for IT professionals, system administrators, and network engineers aiming for CompTIA Cloud+ certification. It is ideal for tech leaders and project managers overseeing cloud projects, and aspiring cloud experts seeking in-depth knowledge in cloud deployment, security, and management. Perfect for those in technical roles needing a comprehensive understanding of cloud computing essentials. About the Authors ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way. Ronnie Wong: Ronnie brings over 20 years of experience in the field of computers and technology, coupled with more than a decade dedicated to technical instruction. This extensive background is complemented by an impressive array of certifications: Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Technology Specialist (MCTS), and CompTIA's A+, Security+, Network+. Ronnie is also a certified IT Technician, holding the CCNA Security. Wes Bryan: Wes Bryan, our Edutainer, began his IT journey in 2009 and transitioned into IT instruction. He earned global teaching awards three times during his early teaching years and holds certifications including CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+, MCSA, MTA, MCTS, MCP, MS, and MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887424 , 1835887422
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 51 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Penetration testing (Computer security) Study guides Certification ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Informatique ; Personnel ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course is meticulously designed to transform learners into skilled professionals in the field of penetration testing and vulnerability management. The course kicks off with an overview of the latest penetration testing skills and vulnerability assessment techniques. It progresses to unravel the complexities of regulations and compliance in the industry, discussing key mandates like PCI-DSS and GDPR. The course further delves into practical aspects of penetration testing such as legal concepts, documentation, standards, and methodologies. It covers critical elements like DNS and target reconnaissance, host discovery, and the use of various tools for defense detection and avoidance. You'll gain hands-on experience in vulnerability scanning, network segmentation testing, and exploring the intricacies of wireless and cloud attacks, among others. Beyond technical skills, the course emphasizes professionalism, integrity, and the significance of effective communication during engagements. It culminates in mastering the art of report writing and recommended remediations, ensuring a comprehensive understanding of the entire penetration testing process. From understanding the basics of penetration testing to analyzing scripts and automating tasks, you'll to be adept at identifying, exploiting, and mitigating security weaknesses. What you will learn Understand the fundamentals and challenges of application security Master risk management strategies and security analysis techniques Conduct penetration testing and exploit vulnerabilities Implement runtime protection in applications Apply security standards, requirements, and maturity models Create a comprehensive roadmap for application security Audience The ideal target audience for the CompTIA PenTest+ course includes cybersecurity professionals, IT security analysts, vulnerability testers, network security professionals, and anyone aspiring to build a career in penetration testing or enhance their skills in identifying and mitigating network vulnerabilities. It's also well-suited for individuals preparing for the CompTIA PenTest+ certification exam. About the Authors ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way. Daniel Lowrie: Daniel Lowrie, our show host, shifted to IT education after successful roles as a systems administrator and network administrator. His certifications include CompTIA A+, Network+, Linux+, CySA+, PenTest+, CEH, MCSA, CFR, and eJPT. Ronnie Wong: Ronnie brings over 20 years of experience in the field of computers and technology, coupled with more than a decade dedicated to technical instruction. This extensive background is complemented by an impressive array of certifications: Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Technology Specialist (MCTS), and CompTIA's A+, Security+, Network+. Ronnie is also a certified IT Technician, holding the CCNA Security.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883402 , 1835883400
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.076
    Keywords: Computing Technology Industry Association Study guides Examinations ; Electronic data processing personnel Certification ; Computer technicians Study guides Certification ; Microcomputers Study guides Maintenance and repair ; Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins with a comprehensive look at mobile and desktop operating systems, delving into Windows, macOS, and Linux, setting you up with a versatile foundation in OS management. You'll explore installation requirements, system utilities, and command-line tools essential for today's IT professionals. The course focuses on enhancing your security knowledge, covering the spectrum from malware to social engineering, and enforcing best practices in workstation and mobile security. It also addresses the intricacies of securing web browsers and handling OS issues. The course wraps up by equipping you with critical skills for change management, backup strategies, and developing robust incident response capabilities, ensuring you're prepared to handle the complexities of IT environments. What you will learn Configure diverse operating systems Enhance system security protocols Resolve software application issues Secure network and web environments Organize IT documentation efficiently Implement backup and recovery methods Audience The course is ideal for individuals venturing into the IT field, requiring a foundational grasp of system operations and security. Suitable for those seeking CompTIA A+ certification, enhancing their troubleshooting and operational prowess. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887943 , 1835887945
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computing Technology Industry Association Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a journey to mastering cybersecurity with our CompTIA CySA+ certification course, a pathway designed for those aspiring to become proficient cybersecurity analysts. This course comprehensively covers crucial topics like threat intelligence, vulnerability management, and incident response, ensuring you are well-prepared for the CompTIA CySA+ exam. As a globally recognized certification, CySA+ validates the essential skills and knowledge pivotal in the cybersecurity domain, making it a sought-after credential for professionals in the field. In this course, you will dive deep into practical aspects of cybersecurity, learning to analyze security logs, identify and address security incidents, and manage vulnerabilities effectively. A significant emphasis is also placed on the critical skill of effectively communicating security findings, a key component of a cybersecurity professional's role. By the end of this course, you will not only be prepared for the CySA+ exam but also equipped with the real-world skills needed to excel in the fast-evolving cybersecurity landscape, making the certification a valuable milestone in your career advancement. What you will learn Navigate the complexities of cybersecurity concepts and principles. Identify and mitigate malicious activities in network, host, and application security. Utilize a variety of cybersecurity tools for detection, analysis, and response. Master encryption mechanisms and IAM implementations for enhanced security. Understand the roles of DNS, IP reputation, and email security in cybersecurity. Engage in proactive threat hunting to pre-empt potential security breaches. Audience The CompTIA CySA+ (CS0-003) course is ideal for aspiring and current cybersecurity professionals, IT staff looking to specialize in security, and students in related fields. It's also perfect for compliance and risk management personnel, government or defense employees, and technical support staff seeking comprehensive cybersecurity knowledge. This course is a valuable resource for anyone aiming to pass the CySA+ certification exam or enhance their understanding of cybersecurity practices. About the Authors ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way. Daniel Lowrie: Daniel Lowrie, our show host, shifted to IT education after successful roles as a systems administrator and network administrator. His certifications include CompTIA A+, Network+, Linux+, CySA+, PenTest+, CEH, MCSA, CFR, and eJPT. Sophie Goodwin: Sophie Goodwin, with 8+ years of experience as a film and voice talent, enriches our team with on-camera and voice-over expertise spanning eLearning content, independent films, TV & web commercials, and video games. Her qualifications include a Bachelor of Science in Telecommunication and (ISC)² CC certification in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883068 , 1835883060
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.076
    Keywords: Computing Technology Industry Association Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Cloud computing Study guides Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course begins with a comprehensive exploration of cloud service models and deployment strategies, equipping professionals with the knowledge to navigate complex cloud environments. You'll deepen your understanding of cloud characteristics and remote connections, crucial for managing and executing cloud services effectively. This course also focuses on the intricate details of cloud network and storage concepts, ensuring you're well-versed in the technical underpinnings that make cloud computing so transformative. Learn to assess the financial implications of cloud technology and navigate vendor relationships, giving you an edge in cloud adoption and migration strategies. The course wraps up with a robust overview of cloud security and compliance, highlighting best practices in data protection and risk management. By integrating DevOps into your cloud repertoire, you'll emerge with a skill set that not only prepares you for the CompTIA Cloud Essentials+ exam but also for a successful career in cloud computing. What you will learn Enhance knowledge of cloud models Implement advanced cloud solutions Manage cloud security and compliance Strategize cloud financial planning Integrate DevOps in cloud practices Execute informed cloud migrations Audience Professionals with foundational cloud knowledge will find this course ideal for advancing their skills. It's suited for those with a grasp of basic IT principles, seeking to deepen their cloud expertise and prepare for the CompTIA Cloud Essentials+ exam. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Sophie Goodwin: Sophie Goodwin's background spans over eight years as a film and voice talent, with experience in eLearning content, independent films, TV & web commercials, and video games. She joined ACI Learning while completing her BS in Telecommunication at the University of Florida. Apart from her work as an Edutainer, Sophie is also involved in other aspects of the entertainment industry. Distinctions: Bachelor of Science in Telecommunication, Voice-Over Talent Certification: (ISC)_ CC: Certified in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805128816 , 1805128817
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Electronic data processing personnel Study guides Certification ; Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: In this comprehensive course, you will learn how to design and implement a robust strategy for securing data and applications in Azure, Microsoft's cloud computing platform. The course begins with an in-depth exploration of threat modeling, covering the basics of threat modeling, understanding application threat modeling, and applying the STRIDE methodology to identify and mitigate threats. You will also learn best practices for shifting from a traditional waterfall development approach to a DevOps approach and understand the phases of DevOps and the importance of DevSecOps in ensuring security throughout the development process. The course then delves into strategies for mitigating threats to data, including ransomware protection, identifying and protecting sensitive data, and governing data using Microsoft Purview and Defender for cloud apps. You will learn how to implement encryption, access controls, data classification, and data retention policies to safeguard data from unauthorized access and prevent data breaches. Real-world case studies will be used to illustrate best practices and provide practical insights into securing data and applications in Azure. By the end of this course, you will be well-equipped with the knowledge and skills needed to safeguard your organization's data and applications in Azure effectively. What You Will Learn Understand the Microsoft cloud security ecosystem and its components Manage risks using Microsoft security tools and technologies Explore the relationship between processes, technologies, and business Design a comprehensive security strategy for IaaS, PaaS, and SaaS Create a robust Zero Trust strategy for enhanced security Evaluate GRC strategies for effective cybersecurity management Audience This course is designed for individuals who are preparing for the SC-100 Microsoft Cybersecurity Architect exam and seeking to expand their knowledge of building and designing cybersecurity solutions using Microsoft products. Whether you are a cybersecurity professional looking to enhance your skills, an IT practitioner interested in Microsoft products, or an aspiring cybersecurity architect, this course provides comprehensive insights and practical guidance to help you achieve your goals. About The Author Anand Rao Nednur: Anand Rao Nednur is a senior technical instructor and cloud consultant. He has worked with large enterprises for about 15 years and has a wide range of technologies in his portfolio. Anand is adept at not just cloud platforms (Azure, AWS, and GCP) but is also well-versed with IAM, security, and automation with PowerShell and Python. In addition, he has been developing and updating the content for various courses. He has been assisting many engineers in lab examinations and securing certifications. Anand is also a certified seasoned professional holding several certifications and has delivered instructor-led training in several states in India as well as several countries such as the USA, Bahrain, Kenya, and UAE. He has worked as a Microsoft-certified trainer globally for major corporate clients.
    Note: "Published in April 2023.". - Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781804616918 , 1804616915
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Jenkins (Software development tool) Study guides Examinations ; Open source software Study guides Examinations ; Computer software Study guides Development ; Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Learn to automate your CI/CD pipelines with Jenkins. Anyone interested in learning how to work with CI/CD pipeline with Jenkins will benefit by enrolling in this course. About This Video Understand Jenkins architecture and terminology Explore the features of Jenkins X and how it works Understand Ansible roles and architecture In Detail This CI/CD Pipelines with Jenkins Certification Training Course will help you learn server automation, continuous integration, build pipelines and configuration tools, automated testing and code quality improvement, and distributed systems in Jenkins through intensive, hands-on practice assignments. You will start with the very basis of DevOps and the need for it. You will learn about continuous integration and continuous delivery and the need for them. Learn and understand the Jenkins use cases, features, capabilities, architecture, and terminology of Jenkins. Moving further, you will also see how to install Jenkins on Linux and Windows. Along the course, you will learn about Maven, how to set up Maven with Jenkins, and explain parameterized build and distributed build. You will also learn Jenkinsfile, Jenkins CLI, features of Jenkins X, and how it works. You will explore how to access the Jenkins application using VM Public DNS and learn to demonstrate how to create CI/CD pipeline using Jenkins and Docker. By the end of this course, you will have understood Jenkins's best practices, and how to create Jenkins Job using Backup Plugin. Audience Anyone interested in learning Jenkins will benefit from this Jenkins certification training. This Jenkins course is also well-suited for freshers, software developers, software engineers, technical leads, system administrators, and test engineers. Learners need to possess an undergraduate degree or a high school diploma.
    Note: Online resource; title from title details screen (O'Reilly, viewed September 13, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837638291 , 1837638292
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 37 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.76
    Keywords: Bootstrap (Computer program) Study guides Examinations ; Web site development ; Bootstrap (Computer program) ; Examinations ; Web site development ; Instructional films ; Internet videos ; Nonfiction films ; Study guides ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Bootstrap is a free, open-source, front-end development framework to create websites and web applications. Bootstrap is designed for the responsive development of mobile-first websites and provides a collection of syntax for template designing. It contains HTML, CSS, and JavaScript-based design templates for typography, forms, buttons, navigation, and other interface components. This course begins with an introduction to the concepts and components of Bootstrap and demonstrates how to set up the software to run the first example on a web page. The course then advances to teaching about Bootstrap lists, collapsible content, dropdowns, forms, and modals. The course provides a solid understanding of the Bootstrap framework with the goal to create a modern responsive website. You will also learn to code a basic to advanced website with the software. Upon completion, the course will provide a comprehensive understanding of Bootstrap concepts and a solid understanding of the Bootstrap framework. You can hone your HTML and CSS skills for responsive web development and learn what a responsive website is and how to create one. What You Will Learn Build your own complex website with ease Garner thorough knowledge of Bootstrap, CSS, and HTML Explore how the components of Bootstrap work Understand the concepts of a framework comprehensively Learn web development using CSS styles for designing Learn to write advanced codes using Bootstrap Audience This course has been designed for anyone wishing to learn Bootstrap from scratch and looking for an easy way to understand Bootstrap concepts and components. Beginners looking to learn about a responsive website and how to create one, and those looking to learn the fundamentals of HTML, CSS, and Bootstrap, will benefit from this course. The course prerequisites include a fair understanding of basic HTML and CSS and the fundamental mechanics of web development. You must aspire to create a modern responsive website and be knowledgeable in using a code editor such as Notepad++, Brackets, and others. About The Author Amit Diwan: Studyopedia was founded by Amit Diwan in 2018 after working for Tutorialspoint , IIT, IASRI, Sitepoint, DU, and C# Corner. Studyopedia sells courses on Udemy, Tutorialspoint, Geeksforgeeks, and Skillshare, providing video courses to master various technologies and programming languages, databases, frameworks, Python, data science, machine learning, Java, Android, C/C++, HTML5, Bootstrap, JavaScript, jQuery, PHP, CSS, WordPress, Drupal, Joomla, Magento, osCommerce, OpenCart, PrestaShop, and other disciplines. Studyopedia delivers high-quality video courses to millions of students and professionals enrolled through their website on multiple programming languages and technologies.
    Note: "Published in November 2022.". - Online resource; title from title details screen (O'Reilly, viewed November 28, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837633142 , 1837633142
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.165
    Keywords: Microcomputers Study guides Maintenance and repair ; Examinations ; Computer technicians Study guides Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This fully revised and updated resource offers complete coverage of the latest release of the CompTIA A+ 220-1101 exam, which is an internationally recognized, fundamental IT training certification. In this course, we will cover all 5 domains as per the latest exam syllabus. Domain 1.0 talks about mobile devices, which cover 15% of the exam. In this domain, we will cover laptop hardware components, mobile device types (tablets, smartphones), and learn how to set up mobile devices. Then, we will cover Domain 2.0, which talks about networking; this domain covers 20% of the questions in the exam. In this domain, we will cover networking hardware devices, learn how to configure a basic SOHO network, learn about networking configuration concepts (IPv4, IPv6, DNS, VPNs), internet connections, and network types (cable, fiber, LANs). Next, Domain 3.0 is about hardware, which covers 25% of the questions in the exam. In this domain, we will cover cables and connectors, motherboards, CPUs, power supplies, RAM, hard drives and SSDs, peripherals, and more. In Domain 4.0, we will cover virtualization and cloud computing, which covers 11% of the questions in the exam. Here, we will cover cloud computing (IaaS, SaaS, PaaS, elasticity, cloud storage) and client-side virtualization (virtual machines, hypervisors). In the final domain, Domain 5.0, we will talk about hardware and network troubleshooting, which covers the largest percent of questions in the exam--29%. Here, we will look at how to resolve problems with best practices and industry standards and how to troubleshoot RAM, motherboards, CPUs, power supplies, hard drives, display issues, mobile device issues, printers, wired/wireless networks. By the end of this course, you will be prepared for the CompTIA A+ Core 1 (220-1101) Certification exam. What You Will Learn Learn all about hardware components Repair and configure mobile devices Set up and configure basic networks Build a PC from the ground up Understand what the cloud is and how virtualization works Troubleshoot hardware and network issues Audience This guide is designed for anyone looking to take and pass the CompTIA A+ Certification Core 1 (220-1101) Certification exam, anyone who wants to improve their skills as a computer or IT technician, or wants to learn awesome stuff about PCs, Macs, mobile devices, networking, the cloud, IT security, and more. A basic familiarity with computers and networks is helpful. Furthermore, CompTIA recommends having 9-12 months of on-the-job experience before taking the A+ exam. This is recommended but not required. About The Authors Mike Meyers: Total Seminars, LLC, is a provider of PC and network repair seminars and certification training services through books, videos, and courseware for thousands of organizations throughout the world including the United Nations, the FBI, and all branches of the US Department of Defense. Mike Meyers is the president and co-founder of Total Seminars, which produces the best-selling CompTIA A+ and Network+ Certification books with over 1 million books in print. He is affectionately called the "Alpha Geek" and is the industry's leading authority on CompTIA Certifications. He has created several other best-selling video courses on CompTIA certifications with the Total Seminars team of instructors. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant, and speaker. He is the author of numerous popular PC books and videos, including the best-selling CompTIA A+ Certification All-In-One Exam Guide and CompTIA Network+ Certification All-In-One Exam Guide. His humorous and easy-to-follow approach to teaching comes through in his video training courses as well as his classroom instructor-led courses. Making IT concepts easy to understand and fun to learn helps students stay engaged and retain the information. Steve Nicholson: Steve Nicholson is an information security professional with decades of experience in IT. Ever the problem-solver, Steve specializes in digital forensics and incident response, holding an MS in Digital Forensics from UCF, multiple GIAC certifications, and the coveted Lethal Forensicator title. A Marine Corps veteran, Steve volunteers time between both the Marine Corps Cyber Auxiliary and the Civil Air Patrol's CyberPatriot programs and sits on the FLDOE Cybersecurity Curriculum Committee. He is also the NSA program administrator for his college's Center of Academic Excellence in cyber defense. Having taught many students over the years, Steve's favorite part about educating people is the "AHA!" they have when learning something new or perfecting a difficult skill.
    Note: "Updated November 2022.". - Online resource; title from title details screen (O'Reilly, viewed December 12, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Amazon Web Services (Firm) ; Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Cloud computing Study guides Examinations ; Electronic data processing personnel Certification ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Infonuagique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Gain practical knowledge about AWS Cloud through hands-on video sessions and practice demos About This Video Aligned with the latest exam guide of AWS Certified Cloud Practitioner (CLF-C01) Discover nine hours of highly engaging self-paced videos and hands-on demos Build a solid foundation to start your AWS journey In Detail The AWS Certified Cloud Practitioner is an entry-level certification. This certification will assess how well one understands AWS fundamentals and its services and ecosystem end to end. This helps individuals gain and develop talent with critical knowledge related to implementing cloud initiatives. Earning AWS Certified Cloud Practitioner validates foundational AWS knowledge as a steppingstone. This course is a hands-on specific course where you gain practical knowledge about AWS Cloud through videos and demo sessions by covering all the key concepts that will help you prepare and pass the certification exam. The concepts covered in-depth in this course include core concepts and the value of cloud computing; an introduction to AWS Cloud; AWS services; the AWS shared responsibility model; security best practices and compliance; and AWS Cloud costs, economics, and billing practices. With this, we will also understand the value of the AWS Cloud, explore AWS Services (S3, EC2, RDS, IAM, DynamoDB, Route 53), and then learn the application of AWS services with common use cases. By the end of this course, you will be well prepared for the latest AWS Certified Cloud Practitioner exam. Audience This course is designed for anyone who wants knowledge about AWS Cloud or wants to pass the AWS Certified Cloud Practitioner Certification. For this course, there are no prerequisites required nor any prior AWS Cloud experience necessary. We will use AWS Cloud free tier for the course.
    Note: "Updated in February 2022.". - Online resource; title from title details screen (O’Reilly, viewed March 10, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837634224 , 183763422X
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 49 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.165
    Keywords: Microcomputers Study guides Maintenance and repair ; Examinations ; Computer technicians Study guides Certification
    Abstract: CompTIA offers certifications from basic IT fundamentals to A+ to networking, Linux, Cyber security, and more. The objectives of the CompTIA A+ Core 2(220-1102) are operating systems, security, software troubleshooting, and operational procedures. In this course, we will cover all four domains as per the latest exam syllabus. The first domain, Operating Systems, carries 31% of the exam and comprises operating system types and purposes (Windows, macOS, iOS, Android, Linux, and so on), Windows versions, OS installation, and command-line tools. The second domain, namely Security, holds 25% of the exam and consists of physical and logical security concepts, wireless security protocols, social engineering threats, attacks, and more. The third domain, which holds 22% of the exam, is Software Troubleshooting which explains how to troubleshoot Microsoft OS, PC security, mobile OS, and application issues as well as malware removal. The last and final domain of the exam is Operational Procedures, which holds 225 weightage and explains best practices for documentation, change management, disaster prevention and recovery, safety procedures, and more. It also includes different types of licenses and policies, professional conduct, remote access technologies, and so on. By the end of the course, we will make sure you are ready to pass the CompTIA A+ Core 2(220-1102) exam. What You Will Learn Explore different operating systems: Windows, Mac, Linux, iOS, Android Understand security concepts such as malware, anti-malware, and networking security protocols Learn to secure your computer, mobile device, and network Troubleshoot software and mobile issues Learn to use command-line tools in Windows, Mac, and Linux Explore the different types of operational procedures Audience This course is for anyone looking to take and pass the CompTIA A+ Certification Core 2 (220-1102) certification exam; anyone who wants to improve their skills as a computer or IT technician; and anyone who wants to learn awesome stuff about Windows, macOS, Linux, mobile, IT security, scripting, and more. A basic familiarity with computers and networks is helpful. Furthermore, CompTIA recommends having 9-12 months of on-the-job experience before taking the A+ exam. This is recommended but not required. About The Authors Mike Meyers: Total Seminars, LLC, is a provider of PC and network repair seminars and certification training services through books, videos, and courseware for thousands of organizations throughout the world including the United Nations, the FBI, and all branches of the US Department of Defense. Mike Meyers is the president and co-founder of Total Seminars, which produces the best-selling CompTIA A+ and Network+ Certification books with over 1 million books in print. He is affectionately called the "Alpha Geek" and is the industry's leading authority on CompTIA Certifications. He has created several other best-selling video courses on CompTIA certifications with the Total Seminars team of instructors. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant, and speaker. He is the author of numerous popular PC books and videos, including the best-selling CompTIA A+ Certification All-In-One Exam Guide and CompTIA Network+ Certification All-In-One Exam Guide. His humorous and easy-to-follow approach to teaching comes through in his video training courses as well as his classroom instructor-led courses. Making IT concepts easy to understand and fun to learn helps students stay engaged and retain the information. Steve Nicholson: Steve Nicholson is an information security professional with decades of experience in IT. Ever the problem-solver, Steve specializes in digital forensics and incident response, holding an MS in Digital Forensics from UCF, multiple GIAC certifications, and the coveted Lethal Forensicator title. A Marine Corps veteran, Steve volunteers time between both the Marine Corps Cyber Auxiliary and the Civil Air Patrol's CyberPatriot programs and sits on the FLDOE Cybersecurity Curriculum Committee. He is also the NSA program administrator for his college's Center of Academic Excellence in cyber defense. Having taught many students over the years, Steve's favorite part about educating people is the "AHA!" they have when learning something new or perfecting a difficult skill.
    Note: "Updated Novermber 2022."
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781804616611 , 1804616613
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/040285536
    Keywords: Project management Study guides Examinations ; Project managers Study guides Certification ; Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Learn project management in the most effective and easy way, through this course. About This Video Understand the latest trends and emerging practices in PMP Learn the core competencies that are required by a project management professional Understand various case studies created by PMP-certified veterans In Detail Any project is bound to meet obstacles if the scope of the project is not identified correctly before the project commences. This course teaches you the best practices to identify the scope correctly and manage schedules, such that your project does not overshoot its costs. The course covers basic to advanced concepts, from an introduction to PMP and PMI, project management framework, project management processes groups, and role of the project to integration, scope, and schedule management. Some interesting topics from procurement management to stakeholder management have also been covered in detail. The course dives deeply into the concepts of professional and social responsibility and concludes by covering Agile concepts. By the end of this course, you will be able to work on any project and move the project toward completion. Audience This course is for beginners who want to start their career in project management and for practitioners who want to get PMP-certified. You should have a four-year degree with 4,500 hours of leading and directing projects along with 35 hours of project management education to start with the PMP course.
    Note: "Updated in August 2022.". - Online resource; title from title details screen (O'Reilly, viewed September 13, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781804615553 , 1804615552
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8/3
    Keywords: Computer security Study guides Examinations ; Penetration testing (Computer security) Study guides Certification ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Study guides Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Learn the fundamentals of cybersecurity using hands-on applied learning materials About This Video Learn the fundamentals of ethical hacking from scratch with the help of practical examples The course comes bundled with all the requisite materials to reinforce learning Identify the appropriate pentesting framework for meeting the needs of a specific client In Detail Ethical hacking fundamentals do not change from one exam to the next. One can expect to see questions about Nmap, what commands were used to generate a specific output, and which tool would you use, regardless of the exam vendor. An individual is expected to know what pentesting framework would be used to meet a specific condition and what information should be delivered in an executive summary. You should know how to scope an assessment and identify what document is used for what purpose and the OWASP Top 10 and identify the hacking methodology used to exploit each one. These are just a few fundamentals that remain constant from one ethical hacking exam. This course provides you with the fundamental knowledge every ethical hacker is expected to know. Throughout this course, you will learn about cybersecurity tools, reverse shells, scripting basics, identifying output, and what commands were used to generate the output. This course will help you identify security tools and ethical hacking techniques, exploit web application vulnerabilities, appropriate documentation for starting and finalizing a pentest, correct reporting procedures, and appropriately exploit for a given vulnerability. By the end of this course, you will have learned the fundamentals of pentesting, and renewed your confidence, and recharged your cyber security career with ease. Audience This course is for the individuals wanting to begin work as an ethical hacker or pentester, and who want to become a Pentest+, Cybersecurity Analyst (CySA+), OSCP, or CeH certified. Anyone who requires a refresher on ethical hacking fundamentals, preparing for entry-level to mid-level cybersecurity exams, and is interested in learning the fundamentals of cybersecurity will gain a lot from this course. You will need a PC or laptop, a stable internet connection, hardware capable of virtualization, and a strong willingness to learn!.
    Note: "Updated in June 2022.". - Online resource; title from title details screen (O'Reilly, viewed July 6, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781804611197 , 1804611190
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.8/1
    Keywords: Salesforce (Online service) Study guides Examinations ; Sales management Study guides Computer programs ; Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Prepare yourself for the Salesforce Platform App Builder Certification Exam by taking this course. About This Video Design data model, user interface, business logic, and security for custom applications Customize application for mobile use Design reports and dashboards In Detail The Salesforce Platform App Builder Certification Training helps you explore everything from understanding basic Salesforce concepts to building apps on the platform, setting up security and access permissions, and creating workflow automation procedures. The course also prepares you for the Salesforce Platform App Builder Certification Exam. We will start by getting an in-depth understanding of the exam details and the requirements. Next, we will explore Salesforce and learn to create a Salesforce account. We will look at the process of customizing profile and role creation. We will also cover Salesforce data and how to create custom objects. We will explore the lightning console and understand how to move from classic to lightning. Along the course, we will learn data modeling and management, custom objects, and understand standard and custom objects. We will learn to demonstrate how to create various lightning pages and how to create a roll-up summary field. Learn about security access and grant access using hierarchies and about permission sets. Explore the various types of reports and create a custom report type, create joined reports and dashboards. By the end of this course, you will have understood the topics that will help you pass the certification exam. Audience This Salesforce Platform App Builder Certification course is suitable for individuals looking to build a career in Salesforce, app developers, system administrators, sales representatives, and product managers. Learners need to possess an undergraduate degree or a high school diploma.
    Note: "Updated in August 2022.". - Online resource; title from title details screen (O'Reilly, viewed September 13, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...