YoVDO

More Technology More People No Process

Offered By: YouTube

Tags

Conference Talks Courses Threat Intelligence Courses Quality Management Courses Feedback Loops Courses Security Operations Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk from Louisville Infosec 2015 that delves into the intricate relationship between technology, people, and processes in cybersecurity. Learn about security operations, red team exercises, and three core concepts that form the foundation of effective security strategies. Discover how to leverage metrics, automation, and threat intelligence to enhance your organization's security posture. Gain insights into the Kinup Model, quality assurance, and the importance of feedback loops in security operations. Examine an AX project case study to understand practical applications of these concepts. Enhance your understanding of how to balance technological advancements with human factors and streamlined processes to create a robust security framework.

Syllabus

Intro
Security Operations
Red Team Exercises
Three Core Concepts
People on Technology
Metrics
Automation
Process
Threat Intelligence
Kinup Model
Quality
Feedback loops
An AX Project


Related Courses

Palo Alto Networks Cybersecurity
Palo Alto Networks via Coursera
(ISC)² Systems Security Certified Practitioner (SSCP)
(ISC)² via Coursera
CompTIA Security+ (SY0-701) Complete Course & Exam
Udemy
SSCP®: Monitoring and Analysis & Risk, Response, and Recovery (2012 Objectives)
Pluralsight
SSCP®: Security Operations and Administration
Pluralsight