The Resource Cybersecurity attacks (Red Team activity), Sergii Nesterenko

Cybersecurity attacks (Red Team activity), Sergii Nesterenko

Label
Cybersecurity attacks (Red Team activity)
Title
Cybersecurity attacks (Red Team activity)
Statement of responsibility
Sergii Nesterenko
Creator
Speaker
Subject
Language
eng
Summary
"There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network--and what harm they can do. Then we'll look at another attack vector: websites and web-applications. You'll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we'll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You'll find out what social engineering, phishing, and spear-phishings, and why they're becoming especially dangerous today.By the end of this course, you'll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them."--Resource description page
Cataloging source
UMI
Characteristic
videorecording
http://library.link/vocab/creatorName
Nesterenko, Sergii
LC call number
QA76.9.A25
PerformerNote
Presenter, Sergii Nesterenko
Runtime
216
http://library.link/vocab/subjectName
  • Computer networks
  • Computer security
  • Computer crimes
Technique
live action
Label
Cybersecurity attacks (Red Team activity), Sergii Nesterenko
Link
http://databases.mvlc.org/connect/safari?uiCode=&xmlId=9781788478878
Instantiates
Publication
Note
  • Title from title screen (viewed March 20, 2018)
  • Date of publication from resource description page
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Configuration of playback channels
unknown
Content category
two-dimensional moving image
Content type code
  • tdi
Content type MARC source
rdacontent
Control code
on1029302259
Dimensions
unknown
Extent
1 online resource (1 streaming video file (3 hr., 35 min., 31 sec.))
Form of item
online
Media category
  • computer
  • video
Media MARC source
  • rdamedia
  • rdamedia
Media type code
  • c
  • v
Medium for sound
other
Other physical details
digital, sound, color
Sound
sound
Sound on medium or separate
sound on medium
Specific material designation
  • remote
  • other
Stock number
CL0500000949
Video recording format
other
Label
Cybersecurity attacks (Red Team activity), Sergii Nesterenko
Link
http://databases.mvlc.org/connect/safari?uiCode=&xmlId=9781788478878
Publication
Note
  • Title from title screen (viewed March 20, 2018)
  • Date of publication from resource description page
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Configuration of playback channels
unknown
Content category
two-dimensional moving image
Content type code
  • tdi
Content type MARC source
rdacontent
Control code
on1029302259
Dimensions
unknown
Extent
1 online resource (1 streaming video file (3 hr., 35 min., 31 sec.))
Form of item
online
Media category
  • computer
  • video
Media MARC source
  • rdamedia
  • rdamedia
Media type code
  • c
  • v
Medium for sound
other
Other physical details
digital, sound, color
Sound
sound
Sound on medium or separate
sound on medium
Specific material designation
  • remote
  • other
Stock number
CL0500000949
Video recording format
other

Library Locations

    • Merrimack Valley Library ConsortiumBorrow it
      4 High Street, Suite 175, North Andover, MA, 01845, US
      42.7009413 -71.1255084
Processing Feedback ...