DevSecOps34 Videos

Data Warehouse: Hands-On Essentials

Snowflake Hands-On Essentials workshops are highly interactive, self-paced online courses designed for learners who are new to Snowflake or new to data work in general. These workshops provide practical experience and cover essential topics related to Snowflake. Here are the key details: Workshop Overview: Name: Hands-On Essentials Target Audience: Learners new to Snowflake or data […]

Cyberark Certified Trustee

The CyberArk Certified Trustee is a certification designed for cybersecurity professionals who have expertise in managing CyberArk solutions. It validates the individual’s ability to administer CyberArk’s identity security solutions and demonstrates proficiency in protecting critical assets and maintaining the integrity of digital transactions12. CyberArk’s certification program offers various levels of certification, including: Defender: This certification […]

Implementing an Information Security Program

LinkedIn Learning’s “Implementing an Information Security Program” course, taught by Kip Boyle, provides practical guidance for building and operating an effective information security program. Here are the key details: Course Overview: Title: Implementing an Information Security Program Instructor: Kip Boyle Duration: Approximately 1 month (free trial available) Skill Level: General Released: Not specified What You’ll […]

Fortinet NSE3 Network Security Associate

The Fortinet NSE3 Network Security Associate certification is part of the Fortinet Network Security Expert (NSE) program, which offers a comprehensive range of certifications for cybersecurity professionals. Let’s delve into the details: Certification Overview: Name: NSE3 Network Security Associate Description: The NSE3 certification validates foundational knowledge in network security and Fortinet products. Focus Areas: FortiGate […]

Beyond Atomic Testing with Attack Flows

2022-09-15–AttackIQ–Beyond-Atomic-Testing-with-Attack-Flows AttackIQ’s “Beyond Atomic Testing with Attack Flows” is a course that delves into testing EDR (Endpoint Detection and Response) or AI-based cybersecurity tools using the AttackIQ Security Optimization Platform. Let’s explore the key aspects of this course: Importance of Attack Flows: Many companies invest in technologies like EDR, which consider that a single atomic […]

Introduction to DevSecOps for Managers

In the fast-paced world of project management and development, security is no longer an afterthought. It’s become a fundamental aspect of the development lifecycle. The “Introduction to DevSecOps for Managers” course is a must-have for DevOps leaders who want to embed security practices seamlessly into their DevOps workflow. After completing the course, I’m excited to […]

Introduction to Cybersecurity

Cisco’s Introduction to Cybersecurity is a comprehensive course offered by Cisco Networking Academy that provides essential knowledge about the world of cybersecurity. Let’s dive into the details: Course Overview: This course aims to demystify the field of cybersecurity and its impact on our interconnected world. Whether you’re a professional interested in cybersecurity or simply want […]

Process Mining from Theory to Execution

The Celonis Process Mining: From Theory to Execution course, led by Professor Wil van der Aalst, delves into the science and practical applications of process mining. Here’s what you need to know: Course Overview: Instructor: Professor Wil van der Aalst, a pioneer in process mining. Objective: Understand the science behind process mining and its real-life […]

Assessment Design for Security Controls

AttackIQ’s “Assessment Design for Security Controls” is a comprehensive course that focuses on designing effective security assessments using the AttackIQ Security Optimization Platform. Let’s delve into the key aspects covered in this course: Assessment Design Theory: Before diving into any breach and attack tool, having a well-thought-out plan is crucial. The course emphasizes creating a […]

Monitoring Kubernetes

Monitoring Kubernetes clusters can be a complex task due to the dynamic and distributed nature of containerized applications. Datadog simplifies this process by providing comprehensive visibility into your Kubernetes environment. Here’s an overview of how Datadog helps in monitoring Kubernetes: 1. Datadog Agent Deployment The first step in monitoring Kubernetes with Datadog is deploying the […]

Introduction to Packet Tracer

Cisco’s Introduction to Packet Tracer is a self-paced course designed for beginners who have no prior networking knowledge. In this course, you’ll discover and troubleshoot using Cisco Packet Tracer, a powerful network simulation and visualization tool provided by Cisco Networking Academy. Here are some key points about Packet Tracer: Purpose: Packet Tracer allows you to […]

MTA – Security Fundamentals

MTA – Security Fundamentals is a certification that validates foundational knowledge in IT security. Here are the key details: Objective: The certification covers essential security concepts and principles. Participants learn about network, operating system, and software security. Topics Covered: The exam includes areas such as: Wireless security VPNs Network access protection Internet security Viruses and […]
error: Content is protected !!