YoVDO

Red Hat Security in a Post-Shellshock World

Offered By: Red Hat via YouTube

Tags

Red Hat Summit Courses Cybersecurity Courses Risk Assessment Courses Security Breaches Courses

Course Description

Overview

Explore Red Hat's evolving security response services in this 57-minute conference talk from the 2015 Red Hat Summit. Gain insights into how Red Hat product security operates and adapts to new challenges in the wake of major incidents like Shellshock and Heartbleed. Learn the basics of Red Hat's security approach and discover how to better prepare for future security breaches. Understand the importance of customer feedback in shaping Red Hat's security strategies and get practical advice on handling security events. Engage with topics such as risk assessment, collaborative security efforts, and emerging security trends. Discover what steps you can take to enhance your organization's security readiness and learn how Red Hat is prepared to support you during critical security incidents.

Syllabus

Introduction
Terms
Risk
Heartbleed
Issues that matter
Working together
The new things
What can you do
Talk to us
We are ready
Product Security


Taught by

Red Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network