Configurations: The Weak Link in the Security Chain

Configurations: The Weak Link in the Security Chain

Conf42 via YouTube Direct link

intro

1 of 17

1 of 17

intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Configurations: The Weak Link in the Security Chain

Automatically move to the next video in the Classroom when playback concludes

  1. 1 intro
  2. 2 preamble
  3. 3 who is peleg
  4. 4 what we will cover
  5. 5 software bible
  6. 6 common types of misconfigurations
  7. 7 permission issues
  8. 8 unencrypted files and risks
  9. 9 challenges in monitoring changes
  10. 10 the automation gap
  11. 11 defence
  12. 12 introduction to configu
  13. 13 managing permissions effectively
  14. 14 ensuring data encryption
  15. 15 effective monitoring techniques
  16. 16 embracing automation
  17. 17 thank you for your attention

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.