YoVDO

So You've Inherited a Security Department - Now What

Offered By: YouTube

Tags

Conference Talks Courses Splunk Courses Compliance Courses Budgeting Courses Security Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover essential strategies for managing an inherited security department in this 46-minute conference talk. Learn about open-source intelligence tools like ReconNG, The Harvester, and Odin. Explore best practices for securing your network, including disabling SSL, implementing centralized login, and removing unnecessary software. Gain insights into incident response, purple teaming, and application whitelisting. Understand the importance of compliance, VLANs, budgeting, and user education. Acquire valuable knowledge on vulnerability scanning and other critical aspects of cybersecurity management to effectively lead your newly inherited security team.

Syllabus

Introduction
Amanda Berlin
Open Source Intelligence II
ReconNG
The Harvester
Odin
Best Practice
Scripts
Disable SSL
Centralized Login
Remove Unnecessary Software
Disable DNS Zone Transfers
Spunk
Netdisco
Printers
Software
IR
Purple Team
Application Whitelisting
Purple teaming
Rawr
Compliance
VLANs
Budget
User Education
Favorite Vulnerability Scanner


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube