An information security operations center ("ISOC" or "SOC") is a facility where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended....
An information security operations center ("ISOC" or "SOC") is a facility where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended....
Operating System Introduction
27mStorage Hierarchy , Exceptions, Interrupts and traps
27mOS Management Services
23mOS Security Issues
23mProcess And Threads
36m?Process Scheduling
29mScheduling Algorithm
15mProcess Synchronization
42mMemory Management - 1
42mFile Systems 1
20mMemory Management - 2
20mFile Systems-1
20mUnix Filesystem
20mUnix Filesystem (Contd.)
23mLinux : Basic Commands
24mLinux : Basic Commands (Contd.)
17mLinux : Users and Permissions
17mLinux : I/O Redirection and Pipes
20mLinux : Task Control
21mLinux : Shell Environment
21mLinux : Compression / Archiving
17mLinux: Print & Sync Commands
17mLinux: File Comparison
22mBasic Networking Administration
18mFilesystems and Devices
21mShell Introduction
21mShell Comments and Variables
21mShell Variables
20mShell Arrays and Arithmetic
19mShell Condition and Relation
19mShell Examples
19mShell Functions
23mShell File Test
17mShell Loop Control
22mShell Script Variations
13mShell Pattern Matching
16mShell Case Statements
19mShell Co-routines
18mShell Signals and Traps
19mShell Subshell
20mShell Declarations
12mShell Examples 2
11mShell Review
8mAn Introduction
19mStructure of a Network
18mNetwork Core - Definition
22mNetwork Access and Physical Media
16mStructure of ISP and Packet Delays
25mNetwork Protocol Layers
17mNetwork Devices
20mNetwork Security- An Introduction
22mPublic Key Cryptography
18mDigital Signatures
16mSecurity in Practise
18mSecurity in Practise (contd.)
16mWireshark
23mSnort
22mReview I
9mReview II
13m