Lesson Archive

Actionable Intelligence Cyber Security

Actionable Intelligence In Cyber security, you will get intelligence from several sources like logs, alerts generated by the appliances in the network, external threat intelligence providers, etc. At the end of the day, you need actionable intelligence for example “File abc.exe on XYZ system is malicious, and recommended action is to remove the file” or … Read more

View Lesson

Big picture attack surface assessment

Attack surface assessment As a cyber security professional, surface assessment is the primary step you must perform before you venture into monitoring and protecting your IT infrastructure. The first step is to discover your assets, which may include workstations, servers, IoT devices, network devices, applications, web servers, and other various IT infrastructure devices and appliances. … Read more

View Lesson

Cloud Network Activity Monitoring

Network Activity Monitoring in Cloud Before cloud infrastructure came into the market, we have an on-prem environment that contains Firewalls, Switches, Routers, Web application firewalls, Load balancers, Web servers, and Proxy servers. Usually, these are physical appliances to provide better performance and manageability. With cloud infrastructure which provided its own advantages, new components introduced API … Read more

View Lesson

Cloud Security

Basics of cloud security If you have experience in VMware or HyperV or understand how virtual infrastructure is built, the cloud is an extension of it on a larger scale. A virtual infrastructure like VMware is designed to maximize the potential of hardware making it shared for more end users. There are different cloud providers … Read more

View Lesson

Search japan car & vehicle auctions with direct access via our free car auction.