CG数据库 >> O’Reilly Learning Path: Network and Cloud Security

O’Reilly Learning Path: Network and Cloud Security的图片1

O’Reilly Learning Path: Network and Cloud Security

.M4V/.MP4, AVC, 1000 kbps, 1280x720 | English, AAC, 160 kbps, 2 Ch | 33+ hours | 4.53 GB

Instructors: Ric Messier, David Miller, Philip Polstra

If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this Learning Path, you’ll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you’ll know how to secure your data and keep it that way.

Contents

Learning Linux Security by Ric Messier

In this hands-on course you’ll learn to secure a Linux system. You’ll start by learning about booting, then jump into covering service management. From there, you’ll dive into logging and log management, intrusion detection and preventions, and users and permissions. You’ll learn about utilities and the Linux Kernel, including Kernel modules, builds, managing Kernel parameters, and firewalls. By this end of this course, you’ll have a well-rounded foundation in Linux security.

Securing Cloud Services by David Miller

With this segment of your Learning Path, you’ll get a clear understanding of potential security benefits and risks associated with cloud computing. You’ll begin by securing your infrastructure, including risk assessment and management, sensitive data, and data classification. From there, you’ll prepare for cloud use, covering web app security, security as a service, and security controls. Once you have completed this course, you will be fully capable of securing your own IT assets in the cloud.

Computer Forensics by Ric Messier

Computer Forensics is a broad topic that touches on many different skills specific to answering legal or investigative questions in relation to a computer. This course provides an overview of the skills you’ll need to work in this highly technical field, covering many topics, from preparing for an investigation, to ethics, to evidence acquisition, being an expert witness, and legal vs. corporate investigations. You’ll learn about forensic tools and how they are used. By the end, you’ll have a clear understanding of what it takes to be a computer forensics investigator.

Reverse Engineering and Exploit Development by Philip Polstra

In this course, you’ll learn about common software vulnerabilities and how to find them, as well as how vulnerabilities differ between various operating systems. You’ll start by reversing compiled Windows applications, and then move on to reverse compiled OS X, Linux, and Android applications. As you work through the course you’ll discovre how to find website and database vulnerabilities, and others. Finally, you’ll learn about simple exploits, web exploitation, and ARM exploitation.

Professional Guide to Wireless Network Hacking and Penetration Testing by Ric Messier

This course will equip you with the tools and techniques needed to effectively secure your 802.11 and Bluetooth networks. You’ll start with the basics of 802.11, such as frequencies, access points, associations, and enterprise networks. From there, you’ll learn how to secure your own wireless network. You’ll get a tour of wireless attack tools and wireless attacks before moving on to Bluetooth security. Finally, you’ll look at other wireless communications, such as WiMax, ZigBee, and RFID.

More Info

O’Reilly Learning Path: Network and Cloud Security的图片2

发布日期: 2016-09-08