The Resource Cybersecurity : methods of protection (Blue Team activity), Sergii Nesterenko
Cybersecurity : methods of protection (Blue Team activity), Sergii Nesterenko
Resource Information
The item Cybersecurity : methods of protection (Blue Team activity), Sergii Nesterenko represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Merrimack Valley Library Consortium.This item is available to borrow from 1 library branch.
Resource Information
The item Cybersecurity : methods of protection (Blue Team activity), Sergii Nesterenko represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Merrimack Valley Library Consortium.
This item is available to borrow from 1 library branch.
- Summary
- "In the first part of the course, you'll learn about different kinds of cyberattack and how they can be executed. In the second part, you'll prevent or mitigate these attacks and protect your digital assets. First of all you'll find out how to harden your network in all directions. We'll talk about firewalls and how to fine-tune them correctly. You'll manage IDS and IPS and understand what they can tell us. You'll also learn how to track hackers in the cyberspace, harden every host in the network, and find network spies. Next, we cover how to harden your websites and web applications: what steps you should take to avoid SQL injection, XSS scripts, session hijacking, and more. We'll show you how to protect yourself and your employees against hackers and their psychological manipulations, and phishing and spear-phishing."--Resource description page
- Language
- eng
- Extent
- 1 online resource (1 streaming video file (3 hr., 9 min., 56 sec.))
- Note
-
- Title from title screen (viewed January 7, 2019)
- Date of publication from resource description page
- Label
- Cybersecurity : methods of protection (Blue Team activity)
- Title
- Cybersecurity
- Title remainder
- methods of protection (Blue Team activity)
- Statement of responsibility
- Sergii Nesterenko
- Language
- eng
- Summary
- "In the first part of the course, you'll learn about different kinds of cyberattack and how they can be executed. In the second part, you'll prevent or mitigate these attacks and protect your digital assets. First of all you'll find out how to harden your network in all directions. We'll talk about firewalls and how to fine-tune them correctly. You'll manage IDS and IPS and understand what they can tell us. You'll also learn how to track hackers in the cyberspace, harden every host in the network, and find network spies. Next, we cover how to harden your websites and web applications: what steps you should take to avoid SQL injection, XSS scripts, session hijacking, and more. We'll show you how to protect yourself and your employees against hackers and their psychological manipulations, and phishing and spear-phishing."--Resource description page
- Cataloging source
- UMI
- Characteristic
- videorecording
- http://library.link/vocab/creatorName
- Nesterenko, Sergii
- LC call number
- QA76.9.A25
- PerformerNote
- Presenter, Sergii Nesterenko
- Runtime
- 190
- http://library.link/vocab/subjectName
-
- Computer networks
- Computer security
- Computer crimes
- Technique
- live action
- Label
- Cybersecurity : methods of protection (Blue Team activity), Sergii Nesterenko
- Note
-
- Title from title screen (viewed January 7, 2019)
- Date of publication from resource description page
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Configuration of playback channels
- unknown
- Content category
- two-dimensional moving image
- Content type code
-
- tdi
- Content type MARC source
- rdacontent
- Control code
- on1081043423
- Dimensions
- unknown
- Extent
- 1 online resource (1 streaming video file (3 hr., 9 min., 56 sec.))
- Form of item
- online
- Media category
-
- computer
- video
- Media MARC source
-
- rdamedia
- rdamedia
- Media type code
-
- c
- v
- Medium for sound
- other
- Other physical details
- digital, sound, color
- Sound
- sound
- Sound on medium or separate
- sound on medium
- Specific material designation
-
- remote
- other
- Stock number
- CL0501000015
- Video recording format
- other
- Label
- Cybersecurity : methods of protection (Blue Team activity), Sergii Nesterenko
- Note
-
- Title from title screen (viewed January 7, 2019)
- Date of publication from resource description page
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Configuration of playback channels
- unknown
- Content category
- two-dimensional moving image
- Content type code
-
- tdi
- Content type MARC source
- rdacontent
- Control code
- on1081043423
- Dimensions
- unknown
- Extent
- 1 online resource (1 streaming video file (3 hr., 9 min., 56 sec.))
- Form of item
- online
- Media category
-
- computer
- video
- Media MARC source
-
- rdamedia
- rdamedia
- Media type code
-
- c
- v
- Medium for sound
- other
- Other physical details
- digital, sound, color
- Sound
- sound
- Sound on medium or separate
- sound on medium
- Specific material designation
-
- remote
- other
- Stock number
- CL0501000015
- Video recording format
- other
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mvlc.org/portal/Cybersecurity--methods-of-protection-Blue-Team/buHsH-Un2Ls/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mvlc.org/portal/Cybersecurity--methods-of-protection-Blue-Team/buHsH-Un2Ls/">Cybersecurity : methods of protection (Blue Team activity), Sergii Nesterenko</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mvlc.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mvlc.org/">Merrimack Valley Library Consortium</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Cybersecurity : methods of protection (Blue Team activity), Sergii Nesterenko
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mvlc.org/portal/Cybersecurity--methods-of-protection-Blue-Team/buHsH-Un2Ls/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mvlc.org/portal/Cybersecurity--methods-of-protection-Blue-Team/buHsH-Un2Ls/">Cybersecurity : methods of protection (Blue Team activity), Sergii Nesterenko</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mvlc.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mvlc.org/">Merrimack Valley Library Consortium</a></span></span></span></span></div>