Completed
intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Configurations: The Weak Link in the Security Chain
Automatically move to the next video in the Classroom when playback concludes
- 1 intro
- 2 preamble
- 3 who is peleg
- 4 what we will cover
- 5 software bible
- 6 common types of misconfigurations
- 7 permission issues
- 8 unencrypted files and risks
- 9 challenges in monitoring changes
- 10 the automation gap
- 11 defence
- 12 introduction to configu
- 13 managing permissions effectively
- 14 ensuring data encryption
- 15 effective monitoring techniques
- 16 embracing automation
- 17 thank you for your attention