Académique Documents
Professionnel Documents
Culture Documents
Learn about:
1. Security and Risk
Management
2. Confidentality and Integrity of
1.2 Data - Role and Importance
Concepts discussed:
1. Control Framework
2. Due Care and Due Diligence
3. Security Controls 4.
1.5 Service Level Agreements
We will discuss: 1.
Information Risk Management
and Threat Management
2. Risk Analysis - Goals, Team,
Steps and types
3. Asset and information
valuation
4. Delphi Technique,
Countermeasure, Handling Risk
1.10 and Threat Modeling
Learn about:
1. Data Documentation -
Practices, Standards Control
Lifecycle
2. Data Specification, Modeling
2.3 and DB Maintenance
This video covers: 1.
Data Handling
2. Asset Management - Inventory
and Configutation Management
3. Equipment Lifecycle
2.4 4. Protecting Privacy
Learn about:
1.Data Security Controls
2. Scoping and Tailoring and
2.5 Standards Selection
2.6 Quiz
We will discuss:
1. Introduction to Secure
Network Architecture
2. Open System Interconnection
3 3.1 and Layers
Let us see:
1. Data Layers
2. Introduction to TCP/IP Model
3.2 and Layers
Learn About:
1. Private Networs and Loopback
Addresses
3.4 2. Types of IP Addressing
We will see:
1. Types of Networks
2. Introduction to Remote Access
3.7 and Protocols
This video shows:
1. Remote Access Security
2. Wireless Connectivity
3. Wireless Security and Network
3.8 Attacks
3.9 Quiz
Learn about:
1. Operation Modes - DES and
AES
2. Algorithms and Feedback
4.5 process
Let us see:
1. Asymetric Cryptography
2. Algorithms
3. Symetric vs Asymetric
4.6 Cryptography
Let us see:
1. Identity as a Service
2. Best Practices of Access
5.6 Control
5.7 Quiz
Learn about:
1. Security testing in SDLC and
Levels
2. Techniques and common
vulnerabilities
6.2 3. ICSM
Let us discuss:
1. Security Operations -
Introduction
2. Investigations and types of
7 7.1 Investigations
This video shows:
1. Incident Response Procedures
7.2 2. Evidence - Types and Lifecycle
What is:
1.Security Information and Event
Management
2. Filtering and Monitoring
7.3 3. Configuration Management
Learn About:
1. Operational Resilience
7.4 2. Threat to Operations
How to:
1. Manage administrative
Controls
2. Work on Storage and
7.6 Virtualization
We will see:
1. Configuration and Recovery
Management
2. Disaster Recovery and
7.8 Prevention
We will see:
1. Data Explosion and Evolution
of Big Data
1.2 2. Distribution System
What is covered
1. Hadoop Ecosystem
1.6 Components(Contd)
Hadoop Ecosystem
1.7 Components(Contd)
We will see:
1. Need for HDFS
2.3 2. HDFS Storage
What are:
1. The HDFS Commands
2.8 2. How to Install HDFS
Keynotes on:
1. Applications on Yarn
2.13 2. Yarn as an Application
2.14 Quiz