Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Continuous Monitoring
Showing:
19
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Conf42
Debugging AI: Strategies for Upcoming Talents
0
rewiews
Gain insights into AI debugging strategies, from practical tips to handling complex models. Learn about data privacy, continuous monitoring, and effective techniques for junior engineers in ML systems.
Add to list
21
Lesons
29 minutes
On-Demand
Free-Video
Great Learning
DevOps Tutorial - Full Course
0
rewiews
This video teaches DevOps and its key functions and concepts by carrying out simultaneous demonstrations and examples to help you get started on the right foot.
Add to list
20
Lesons
10 hours 2 minutes
On-Demand
Free-Video
Great Learning
Docker Tutorial for Beginners
0
rewiews
Comprehensive guide to Docker: containerization, installation, commands, architecture, orchestration, AWS integration, monitoring, and Spring Boot deployment with hands-on demonstrations.
Add to list
21
Lesons
3 hours 27 minutes
On-Demand
Free-Video
Bugcrowd
Trickle Down PwnOnomics
0
rewiews
Learn how to succeed in bug bounty hunting, from zero experience to consistent earnings, with practical tips and strategies for effective vulnerability discovery and reporting.
Add to list
20
Lesons
34 minutes
On-Demand
Free-Video
LASCON
Close Encounters of the Vulnerable Kind - A DevSecOps Odyssey
0
rewiews
Explore common DevOps security risks, best practices, and the importance of fostering a DevSecOps culture. Learn to address vulnerabilities, implement proper controls, and enable developers in securing workflows effectively.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Succeeding with Enterprise Software Security Key Performance Indicators
0
rewiews
Learn to implement and measure effective enterprise software security KPIs. Discover strategies for aligning security goals with organizational objectives and improving development processes.
Add to list
16
Lesons
58 minutes
On-Demand
Free-Video
OWASP Foundation
Secure Authentication without the Need for Passwords
0
rewiews
Explore behavioral biometrics as a secure, user-friendly alternative to passwords for authentication. Learn how keystroke patterns can provide robust security without compromising usability or privacy.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
OWASP Foundation
Application Security at DevOps Speed and Portfolio Scale
0
rewiews
Explore a revolutionary approach to application security using passive sensors for real-time visibility across an organization's portfolio, enabling proactive collaboration and value generation.
Add to list
19
Lesons
52 minutes
On-Demand
Free-Video
Linux Foundation
Zero Trust Best Practices in Government and Federal Industries
0
rewiews
Explore key components and best practices for implementing zero trust security in government and federal industries, focusing on comprehensive protection strategies and advanced technologies.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Conf42
Build Cyber-Awareness in Platform Development Teams
0
rewiews
Enhance platform development teams' cyber-awareness through secure coding, network segmentation, and incident response planning. Foster a security-conscious culture for robust cybersecurity practices.
Add to list
11
Lesons
14 minutes
On-Demand
Free-Video
NashKnolX
Implementation of DevSecOps in Cloud Engineering
0
rewiews
Streamline cloud security with DevSecOps: automate processes, implement continuous monitoring, and integrate compliance as code for agile and secure deployments.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Runtime Security in the Cloud Native World
0
rewiews
Explore runtime security in cloud-native environments, focusing on detecting and mitigating security breaches in production. Learn about essential tools and strategies for maintaining robust security measures.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
RSA Conference
How to Reduce Supply Chain Risk - Lessons from Efforts to Block Huawei
0
rewiews
Explore supply chain risk management using Huawei as a case study. Experts discuss best practices for risk assessment, transparency, and securing networks in a global ecosystem.
Add to list
36
Lesons
56 minutes
On-Demand
Free-Video
RSA Conference
You See Honey, I See Beehive - Developing Honey Networks
0
rewiews
Explore end-to-end honey networks for breach defense, combining honeypots, security sensors, and continuous monitoring. Learn open-source and enterprise options for networks of any size.
Add to list
16
Lesons
30 minutes
On-Demand
Free-Video
Kaspersky
The Ultimate Tips to Implement a Secure Smart City Municipal Drone Program
0
rewiews
Explore the cybersecurity challenges and requirements for implementing secure municipal drone programs in smart cities, focusing on stability, reliability, and threat prevention.
Add to list
7
Lesons
21 minutes
On-Demand
Free-Video
Stanford University
Point of Care Monitoring and Continuous Monitoring
0
rewiews
Explore advancements in point-of-care and continuous monitoring technologies with industry experts, discussing innovations, challenges, and future trends in healthcare diagnostics.
Add to list
1
Lesons
1 hour 26 minutes
On-Demand
Free-Video
WeAreDevelopers
DevOps Maturity Check - A Way to Balance Autonomy and Alignment
0
rewiews
Explore balancing autonomy and alignment in DevOps teams through a maturity check, focusing on self-organization, collaboration, and continuous improvement practices.
Add to list
33
Lesons
1 hour 4 minutes
On-Demand
Free-Video
NDC Conferences
Minimum Viable Security
0
rewiews
Simplifying microservices security through automation and design principles. Learn to build a secure cluster, monitor networking, manage containers, and implement least privilege access for robust, scalable security.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Cloud Security Alliance
Control Constellations - Mapping the Cyber Cosmos of Threats
0
rewiews
Explore the intricate relationship between threat actors, TTPs, and cybersecurity controls to enhance organizational defense strategies and risk management through practical intelligence mapping.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
load more...