|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1322446638 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
220602s2022 cau153 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d OCLCO
|
024 |
8 |
|
|a 0636920670896
|
029 |
1 |
|
|a AU@
|b 000072055670
|
035 |
|
|
|a (OCoLC)1322446638
|
037 |
|
|
|a 0636920670896
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20220602
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Defensive cybersecurity fundamentals /
|c Amanda Berlin.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Sebastopol, California] :
|b O'Reilly Media, Inc.,
|c [2022]
|
300 |
|
|
|a 1 online resource (1 video file (2 hr., 33 min.)) :
|b sound, color.
|
306 |
|
|
|a 023300
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Amanda Berlin, presenter.
|
520 |
|
|
|a Everyone talks about the intrusion kill chain (sometimes called the “cyber kill chain”)—a model for actionable intelligence in which defenders align enterprise defensive capabilities to the specific processes an adversary might undertake to target that enterprise. However, much of what’s discussed publicly is misinformation and scare tactics. Join expert Amanda Berlin to learn the most effective steps you can take to protect your organization from the vast majority of threats with defensive mitigation and monitoring. Through use cases such as ransomware, data exfiltration, and lateral movement, you’ll see how to improve the standard of defense at each level, then discover step-by-step what you can accurately cover using the kill chain by working through use cases that outline the specifics of attacks. You'll also gain hands-on experience through tabletop exercises and drills to strengthen your understanding. Much of what’s covered will be hands-on walk-throughs in a Microsoft Windows environment. Windows domains are the most popular target for attackers as they’re frequently the most insecurely configured.
|
588 |
0 |
|
|a Online resource; title from title details screen (O’Reilly, viewed June 2, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Intrusion detection systems (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Systèmes de détection d'intrusion (Sécurité informatique)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
650 |
|
7 |
|a Intrusion detection systems (Computer security)
|2 fast
|
655 |
|
7 |
|a Instructional films
|2 fast
|
655 |
|
7 |
|a Internet videos
|2 fast
|
655 |
|
7 |
|a Nonfiction films
|2 fast
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Berlin, Amanda,
|e author.
|
710 |
2 |
|
|a O'Reilly (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/0636920670896/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|