Lesson Archive
Actionable Intelligence Cyber Security
Actionable Intelligence In Cyber security, you will get intelligence from several sources like logs, alerts generated by the appliances in the network, external threat intelligence providers, etc. At the end of the day, you need actionable intelligence for example “File abc.exe on XYZ system is malicious, and recommended action is to remove the file” or … Read more
View LessonBig picture attack surface assessment
Attack surface assessment As a cyber security professional, surface assessment is the primary step you must perform before you venture into monitoring and protecting your IT infrastructure. The first step is to discover your assets, which may include workstations, servers, IoT devices, network devices, applications, web servers, and other various IT infrastructure devices and appliances. … Read more
View LessonCloud Network Activity Monitoring
Network Activity Monitoring in Cloud Before cloud infrastructure came into the market, we have an on-prem environment that contains Firewalls, Switches, Routers, Web application firewalls, Load balancers, Web servers, and Proxy servers. Usually, these are physical appliances to provide better performance and manageability. With cloud infrastructure which provided its own advantages, new components introduced API … Read more
View LessonCloud Security
Basics of cloud security If you have experience in VMware or HyperV or understand how virtual infrastructure is built, the cloud is an extension of it on a larger scale. A virtual infrastructure like VMware is designed to maximize the potential of hardware making it shared for more end users. There are different cloud providers … Read more
View Lesson