Channel Avatar

TechKnowSurge @[email protected]

4.9K subscribers - no pronouns :c

Website: techknowsurge.com/ LinkedIn: www.linkedin.com/compa


02:04
Security Operations 11-4: Delivery
03:19
Security Operations 11-3: Security Training Content
05:11
Security Operations 11-2: Training
05:51
Security Operations 11-1: Awareness
01:26
Security Operations 11-0: Module Intro
06:25
Security Operations 10-16: Physical Access Control
09:29
Security Operations 10-15: Access Control Models
10:25
Security Operations 10-14: Access Control
01:39
Security Operations 10-13: Identity Proofing
04:28
Security Operations 10-12: Federation
05:09
Security Operations 10-11: Single Sign-On (SSO)
06:19
Security Operations 10-10: IAM Policies and Enforcement
07:51
Security Operations 10-9: HOTP and TOTP
03:25
Security Operations 10-8: One-Time Passwords (OTP)
05:40
Security Operations 10-7: Multi Factor Authentication (MFA)
02:07
Security Operations 10-6: Key Storage
06:17
Security Operations 10-5: Privileged Access Management (PAM)
07:42
Security Operations 10-4: Password Manager
21:57
Security Operations 10-3: What Makes a Good Password
03:27
Security Operations 10-2: Authentication, Authorization, and Accounting (AAA)
04:49
Security Operations 10-1: Identity and Access Management (IAM)
03:34
Security Operations 10-0: Module Intro
02:11
Security Operations 9-7: Mandatory Vacations
04:10
Security Operations 9-6: Job Rotation
05:11
Security Operations 9-5: Separation of Duties
03:35
Security Operations 9-4: Need to Know
03:53
Security Operations 9-3: Least Privilege
04:59
Security Operations 9-2: Onboarding and Termination Procedures
11:38
Security Operations 9-1: Personnel Management
03:01
Security Operations 9-0: Module Intro
04:19
Security Operations 8-8: Vendor Monitoring and Termination
10:30
Security Operations 8-7: Agreement Types
02:28
Security Operations 8-6: Vendor Selection
04:52
Security Operations 8-5: Supply Chain Management
05:34
Security Operations 8-4: Cloud Hosting Considerations
13:30
Security Operations 8-3: Vendor Assessment
09:06
Security Operations 8-2: Gathering Requirements
05:25
Security Operations 8-1: Vendor Management
05:16
Security Operations 8-0: Module Intro
05:29
Security Operations 7-15: Data Retention and Retirement
03:34
Security Operations 7-14: Data Loss Prevention
03:35
Security Operations 7-13: Data Loss Detection
10:42
Security Operations 7-12: Data Masking and Obfuscation
05:37
Security Operations 7-11: Steganography
05:37
Security Operations 7-10: Encrypting Data
07:19
Security Operations 7-9: Keeping Data Confidential
03:46
Security Operations 7-8: Data States
06:48
Security Operations 7-7: Data Protection
02:58
Security Operations 7-6: Data Inventory and Data Labeling
04:56
Security Operations 7-5: Data Classifications
09:08
Security Operations 7-4: Personally Identifiable Information (PII)
03:25
Security Operations 7-3: Data Types
07:31
Security Operations 7-2: Compliance, Privacy, and Data Roles
05:13
Security Operations 7-1: Data Management
01:56
Security Operations 7-0: Module Intro
08:41
Security Operations 6-17: Patch Management
01:44
Security Operations 6-16: Validation of Remediation
07:51
Security Operations 6-15: Vulnerability Remediation
01:53
Security Operations 6-14: Action Plan
02:50
Security Operations 6-13: Prioritization and Escalation