Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Defense in Depth
Showing:
50
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
IFERP Connecting Engineers
Defense in Depth - IFERP
0
rewiews
Explore cybersecurity's Defense in Depth approach, covering layered security strategies, major threats, and objectives to protect valuable data and information systems effectively.
Add to list
11
Lesons
27 minutes
On-Demand
Free-Video
LASCON
Tangled Web: Defense in Deception - 2017
0
rewiews
Explore defensive deception strategies for web applications, including tools and techniques to detect, confuse, and corral attackers. Learn to plan, execute, and monitor effective deception in cybersecurity.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Introduction to Security and Network Forensics - Lecture 1
0
rewiews
Comprehensive overview of security fundamentals, covering threats, defense strategies, and network models for a solid foundation in cybersecurity principles.
Add to list
19
Lesons
46 minutes
On-Demand
Free-Video
Dungeons and Dragons, Siege Warfare, and Fantasy Defense in Depth
0
rewiews
Explore fantasy-inspired cybersecurity concepts through Dungeons & Dragons and siege warfare analogies, offering unique insights into defense-in-depth strategies for IT professionals.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Dragos: ICS Cybersecurity
Regulatory Developments in the Oil and Gas Pipeline Industry - Cybersecurity Challenges and Solutions
0
rewiews
Explore regulatory changes in oil and gas pipeline cybersecurity, including TSA's new directive, industry challenges, and implementing cloud technology to meet requirements.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
OWASP Foundation
Leveraging Users' Engagement to Improve Account Security
0
rewiews
Explore techniques to enhance account security using breach data, prevention strategies, and user engagement. Learn to correlate signals, improve detection rules, and encourage secure practices.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
OWASP Foundation
Securing In-House Execution of Unsafe Third-Party Executables
0
rewiews
Explore a framework for securely executing third-party code in production environments, addressing challenges and implementing best practices to mitigate risks associated with untrusted executables.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
LASCON
Defense-in-Depth Engineering Techniques for Secure Software Design
0
rewiews
Explore techniques for building resilient software, identifying overlooked vulnerabilities, and designing for incident preparedness. Learn to architect secure systems and improve incident response capabilities.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Is the Internet on Fire? Strategies for Mitigating Open Source Software Vulnerabilities
0
rewiews
Explore strategies for mitigating open source software vulnerabilities, including supply chain attacks, SBOMs, and next-generation security controls for robust defense and compromise resilience.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
All I Know About Cybersecurity I Learned from Fungus
0
rewiews
Explore fascinating parallels between fungal biology and cybersecurity principles, gaining unique insights into cloud-native application security and best practices through nature-inspired analogies.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
OWASP Foundation
Start Covering Your Bases and Stop Chasing APT Headlines
0
rewiews
Learn effective cybersecurity strategies to protect against common threats, moving beyond headline-grabbing APTs to focus on fundamental security practices and risk mitigation.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
DevSecCon
Defense in Depth: Refocusing on Defensive Security Techniques
0
rewiews
Explore defensive product security techniques, emphasizing defense-in-depth and supply chain security. Learn key aspects to consider in your application security strategy.
Add to list
9
Lesons
19 minutes
On-Demand
Free-Video
SQLBits
The Swiss Cheese Security Pattern - Building Secure Data Architectures
0
rewiews
Adopt a multi-layered approach to data security, minimizing risks through strategic architecture and mindset shifts in asset protection.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Controlling Access to External APIs with Cilium
0
rewiews
Step-by-step guide on configuring Cilium to limit GitHub repo access for cluster workloads, covering TLS termination, certificate management, and L7 network policies for enhanced security in multi-tenant environments.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Databricks
Databricks Serverless Security - Serverless Compute Isolation
0
rewiews
Explore Databricks' serverless compute isolation techniques, including defense-in-depth strategies and multi-layered security measures to minimize risks in the intelligent data warehouse environment.
Add to list
1
Lesons
10 minutes
On-Demand
Free-Video
OWASP Foundation
Software Security Engineering: Lessons from the Past to Fix the Future
0
rewiews
Explore software security engineering strategies to eliminate known bugs and achieve 99.99% resilience against zero-day threats. Learn from past events to fix future security problems in applications.
Add to list
29
Lesons
39 minutes
On-Demand
Free-Video
All Things Open
Introduction to Kubernetes Security
0
rewiews
Explore Kubernetes security essentials for operations and application development. Learn cluster access, network policies, secrets management, and secure container building techniques.
Add to list
1
Lesons
1 hour 23 minutes
On-Demand
Free-Video
Linux Foundation
Istio and Cilium - Pushing the Boundaries of Zero-Trust Security
0
rewiews
Explore innovative zero-trust network solutions using Istio ambient mesh and Cilium. Learn to secure Kubernetes services with defense-in-depth strategies and policy enforcement points for optimal performance and protection.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Memory Armor for SPIRE - Fortifying with Confidential Containers
0
rewiews
Explore enhancing SPIRE security with Confidential Containers, protecting sensitive data in memory from potential attacks and adding an extra layer of defense to your cloud-native infrastructure.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
(Almost) Secure by Default - Next Steps for Hardening Istio in Production Environments
0
rewiews
Explore advanced security measures for Istio in production, including mTLS, certificate management, and integration with network policies and cloud security services for a robust zero-trust architecture.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Enterprise Security Strategy Leveraging on Zero Trust Approach
0
rewiews
Explore Zero Trust security strategies for enterprise protection, moving beyond traditional perimeter defenses to role-based, defense-in-depth approaches for safeguarding virtual assets in the modern digital landscape.
Add to list
13
Lesons
35 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
A Retro- and Introspective of the State of Cyber
0
rewiews
Análisis retrospectivo e introspectivo del estado de la ciberseguridad, explorando desafíos actuales, prácticas efectivas y tecnologías emergentes para mejorar la resiliencia y postura de seguridad.
Add to list
15
Lesons
46 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Defensa en Profundidad para Aplicaciones en Contenedores
0
rewiews
Estrategias de defensa en profundidad para aplicaciones en contenedores, desde el código hasta la interfaz de usuario, en entornos cloud o locales. Enfoque en controles automatizados y mejores prácticas de seguridad.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
OWASP Foundation
The Emperor’s New Password Manager - Security Analysis of Web-based Password Managers
0
rewiews
Security analysis of web-based password managers, revealing vulnerabilities in features like one-time passwords and bookmarklets. Explores diverse root causes and provides guidance for improving password manager security.
Add to list
10
Lesons
24 minutes
On-Demand
Free-Video
Microsoft
Ask the Experts - Protecting Always Connected Windows on ARM PCs for the Hybrid
0
rewiews
Explore modern security solutions for hybrid work environments, focusing on Snapdragon-powered PCs with Windows secured-core features to protect against threats in real-time.
Add to list
15
Lesons
31 minutes
On-Demand
Free-Video
Security BSides San Francisco
East vs West - How The Coasts Approach Information Security Differently
0
rewiews
Explore the contrasting approaches to information security between Wall Street and Silicon Valley, uncovering valuable insights for professionals across various security roles.
Add to list
5
Lesons
20 minutes
On-Demand
Free-Video
Submersion Therapy - No One Cares About Your Data Breach Except You and Why Should They
0
rewiews
Explore data breach impacts, risk management, and lessons from Sony's experience. Learn to prepare for security incidents and engage in effective risk conversations.
Add to list
26
Lesons
43 minutes
On-Demand
Free-Video
Devoxx
Security and Microservices
0
rewiews
Explore strategies for securing microservices architectures, including defense in depth, technology choices, and integration techniques to protect vital data and processes while minimizing attack surfaces.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
Hack In The Box Security Conference
Securing ICS - SCADA - Defense In Depth
0
rewiews
Explore defense-in-depth strategies for ICS/SCADA security, including red teaming methodologies, threat modeling, and best practices to combat insider and cyber threats in industrial control systems.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Spring I/O
Spring Security for N00bz - A Quick Introduction for the Terminally Insecure
0
rewiews
Comprehensive introduction to Spring Security, covering defense-in-depth strategies and live coding demonstrations for securing applications using open-source tools.
Add to list
30
Lesons
57 minutes
On-Demand
Free-Video
Stealing Domain Admin or How I Learned to Stop Worrying and Love the CSSF
0
rewiews
Explore techniques for compromising domain admin privileges, including social engineering, password spraying, and hash attacks. Learn defensive strategies and the importance of system hardening.
Add to list
21
Lesons
47 minutes
On-Demand
Free-Video
Defense in Depth - Your Security Castle
0
rewiews
Explore defense-in-depth strategies for optimizing security controls, including network segmentation, vulnerability management, and layered protection techniques.
Add to list
13
Lesons
44 minutes
On-Demand
Free-Video
Encryption Mobility Cloud - Oh My
0
rewiews
Explore encryption challenges in mobile and cloud environments, focusing on security threats, evolving attack methods, and effective defense strategies for the modern digital landscape.
Add to list
24
Lesons
29 minutes
On-Demand
Free-Video
Stable 08 LOL They Placed Their DMZ in the Cloud - Easy Pwnage or Disruptive Protection
0
rewiews
Explore innovative cloud-based DMZ strategies, comparing traditional designs with new models and discussing their implications for network security and defense-in-depth approaches.
Add to list
12
Lesons
23 minutes
On-Demand
Free-Video
ACCU Conference
Secure by Design - Security Principles for the Working Architect
0
rewiews
Explore key security principles for system design, focusing on practical application in mainstream development. Learn to create securable systems without relying on specialized security engineering jargon.
Add to list
11
Lesons
1 hour 17 minutes
On-Demand
Free-Video
NDC Conferences
Security and Microservices
0
rewiews
Explore microservices security: defense in depth, distributed architecture protection, and strategies to enhance data safety while minimizing attack surfaces.
Add to list
38
Lesons
53 minutes
On-Demand
Free-Video
Canonical Ubuntu
Canonical's Role in Security for Cloud Native Landscapes
0
rewiews
Explore Canonical's comprehensive security approach for cloud-native environments, covering host OS, containers, and infrastructure to deliver defense-in-depth protection against evolving threats.
Add to list
11
Lesons
11 minutes
On-Demand
Free-Video
Linux Foundation
The Seven Properties of Highly Secure IoT Devices
0
rewiews
Explore seven key properties for secure IoT devices, including hardware-based trust and defense in depth. Learn practical guidelines for making informed security decisions in IoT development.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Google Cloud Tech
Prevent Data Exfiltration with Google Cloud's Built-in Controls
0
rewiews
Explore defense-in-depth strategies and Google Cloud's security technologies to mitigate data exfiltration risks, featuring insights from Charles Schwab and Commerzbank.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
BSidesCharm
Make Better Risk Decisions to Prevent Future Cyber Attacks
0
rewiews
Discover proactive cybersecurity strategies for better risk decisions, focusing on preventative measures over reactive controls. Learn to identify vulnerabilities, assess business impact, and implement effective risk mitigation techniques.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
DEFCONConference
What History's Greatest Heist Can Teach Us About Defense in Depth
0
rewiews
Explore the fascinating Antwerp Diamond Heist to understand defense-in-depth security principles through analysis of history's greatest vault breach and its modern cybersecurity implications.
Add to list
14
Lesons
30 minutes
On-Demand
Free-Video
Eclipse Foundation
5 Easy Steps for More Secure IoT
0
rewiews
Discover practical strategies for enhancing IoT security through a 5-step defense-in-depth approach, covering dependency management, access control, cryptography, logging, and device updates.
Add to list
12
Lesons
38 minutes
On-Demand
Free-Video
SNIAVideo
Cyberstorage and Extended Detection and Response - Threat Detection Through Storage
0
rewiews
Discover how storage systems can enhance cybersecurity through threat detection and response, exploring Cyberstorage and XDR concepts for protecting valuable data assets from modern cyber threats.
Add to list
7
Lesons
32 minutes
On-Demand
Free-Video
SQLBits
A to Z Azure SQL Security Concepts
0
rewiews
Explore multi-layer defense-in-depth security techniques for Azure SQL databases, covering network security, RBAC, data protection, auditing, encryption, and monitoring.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Google Cloud Tech
Defining Security Baselines and Guardrails with Access and Organization Policies
0
rewiews
Learn to build effective security guardrails using access and organization policies for cloud environments, featuring insights from Box and best practices for managing security access policies.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Devoxx
Practical Guides for Enhancing Your Software Supply Chain Security
0
rewiews
Practical guide to fortify software supply chain security using open-source tools. Covers building, packaging, dependencies, code scanning, and establishing trust across the delivery process.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
CISSP Study Guide - Domain 1: Access Control
0
rewiews
Comprehensive guide covering access control concepts, authentication methods, and security protocols for CISSP exam preparation.
Add to list
31
Lesons
1 hour 34 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Watching the Watchers - The Hidden Risks of Container Scanning Tools
0
rewiews
Explore critical security risks and mitigation strategies for container vulnerability scanning tools, focusing on system protection, secure configurations, and defense-in-depth approaches.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
LASCON
Three Categories of Rogue AI and How to Mitigate Risk
0
rewiews
Discover essential strategies for identifying and defending against three types of rogue AI behaviors, including practical implementation of OWASP guidelines and Zero Trust frameworks for secure AI deployment.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
NDC Conferences
What We Can Learn from Aviation Industry Security Controls
0
rewiews
Explore fascinating parallels between aviation safety and cybersecurity principles, drawing insights from air crash investigations to enhance security control implementations and risk management.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
load more...