Category Archives: Uncategorized
29. Vulnerabilities Part1 Now, in the term of threats, you’ve heard me say lots of different examples of threats. And, of course, I’ve talked a lot about natural events, the floods and the earthquakes, unintentional events. Well, you could make an argument that fires are generally unintentional. We don’t often plan them unless we’re an […]
14. Technologies We also should take a look at the different technologies, again having that overview. So an information security manager should have good conceptual understanding of some of the following things like application security. Now, when we talk about application security, we can look at it from many different perspectives. It could be very […]
8. Context and Purpose Another aspect of this whole risk management is context and purpose. Now remember, managing risks is usually the responsibility of your information security manager. So the requirements of the risk management program then is pretty much to be able to determine what are the desired outcomes and what are the objectives. […]
1. Lesson 1: Risk Management Overview This domain is entitled the Information Risk Management and what we’re going to take a look at is a lot of processes that deal with all facets of risk management. We’re going to talk about establishing a process for your information asset classification and ownership, implementing a systematic and […]
5. Hardening systems In this video we’re going to be talking about hardening your computer. Now I’m going to go through a set of things that you guys are probably already know already when it comes to securing your computer. But just a couple of things here to keep in mind as we go through […]
1. Endpoint Protection In this video I’m going to be talking about endpoint protection. So first of all, let’s talk about what are endpoints. Endpoints are basically any computer in your organization. Every single computer in my organization, including my laptop in front of me, including my desktop, including that computer over there. All computers […]
7. SRPT, FTPS, SFTP, SNMP, IMAP In this video, we’re going to be talking about a variety of different secure protocols that you may see appear on your exam. And particularly we’ll talk about SRPC FTPS SFTP SNMP version three. And then we’ll take a look at secure pop and IMAP for emails. So let’s […]
4. Install and setup an FTP Server and Client In this video, we’re going to be installing and configuring an FTP server. Now we’re going to be using a piece of software called FileZilla. FileZilla is a free FTP server that you can download, and it has a free client that you can also download. […]
1. DNSSEC In this video, we’re going to be talking about DNS SEC or SEC or DNS SEC. DNS SEC actually stands for Domain Name System Security Extension. What exactly is this? Well, let’s talk about DNS in general. So remember what DNS does. DNS translates domain names to IP address. Simple enough. Now, during […]
15. Lab: Linear Regression using Estimators When you use an Estimator to perform linear regression, how does the Estimator object know? What is the training data set? What are the while labels and other properties of the regression, such as the batch size or even the number of Eatbox? How does it get this information? […]