Tech Solution Courses & Practices

Tech Solution Courses & Practices

84 Followers
    196 - Domain 7 -72 Logging Techniques and Log types
    19:37
    197 - Domain 7 -72 Auditing, Audting Types and Audting Process
    18:33
    198 - Domain 7 -72 Data Loss Prevention
    8:16
    194 - Domain 7 -71 Major Categories of Computer Crime
    17:10
    195 - Domain 7 -72 Conduct Logging and Monitoring Activities
    7:54
    189 - Domain 7 - Security Operations
    10:47
    191 - Domain 7 -71 Evidence and types of Evidences
    9:10
    192 - Domain 7 -71 Evidence Collection and Forensic Procedures
    7:54
    187 - Domain 6 - 65 Conduct or Facilitate Security Audits
    9:38
    188 - Domain 6 - 65 Types of SOC Reports
    7:06
    186 - Domain 6 - 64 Analyze Test Output and Generate Report
    10:40
    182 - Domain 6 - 62 Compliance checks
    3:08
    183 - Domain 6 - 63 Collect Security Process Data
    4:50
    184 - Domain 6 - 63 Key Performance and Risk Indicators
    4:53
    185 - Domain 6 - 63 Natural and man-made disasters
    15:25
    180 - Domain 6 - 62 Website Monitoring
    3:28
    181 - Domain 6 - 62 Breach attack simulations
    2:58
    177 - Domain 6 - 62 Interface Testing
    4:27
    178 - Domain 6 - 62 Misuse Case Testing
    1:42
    179 - Domain 6 - 62 Test Coverage Analysis
    4:38
    167 - Domain 6 - 62 Network Discovery Scanning
    9:38
    168 - Domain 6 - 62 Network Vulnerability Scanning
    5:12