Red Hat Security in a Post-Shellshock World
Offered By: Red Hat via YouTube
Course Description
Overview
Explore Red Hat's evolving security response services in this 57-minute conference talk from the 2015 Red Hat Summit. Gain insights into how Red Hat product security operates and adapts to new challenges in the wake of major incidents like Shellshock and Heartbleed. Learn the basics of Red Hat's security approach and discover how to better prepare for future security breaches. Understand the importance of customer feedback in shaping Red Hat's security strategies and get practical advice on handling security events. Engage with topics such as risk assessment, collaborative security efforts, and emerging security trends. Discover what steps you can take to enhance your organization's security readiness and learn how Red Hat is prepared to support you during critical security incidents.
Syllabus
Introduction
Terms
Risk
Heartbleed
Issues that matter
Working together
The new things
What can you do
Talk to us
We are ready
Product Security
Taught by
Red Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network