Completed
Scenario sources
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How to Exploit Cloud Adoption for Making Your IT More Secure and Convenient for End Users - DefCamp #10
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Who is Telus
- 3 What is IT security
- 4 Deepfake
- 5 Threat evolution
- 6 Identity and encryption
- 7 Data encryption
- 8 Structure of the solution
- 9 Scenario sources
- 10 Type of implementation
- 11 volumetric transparent encryption
- 12 live data transformation
- 13 transparent encryption
- 14 application layer encryption
- 15 hardware appliance
- 16 security intelligence
- 17 Splunk example
- 18 IT infrastructure to cloud
- 19 Secure your identity
- 20 Credentials
- 21 Multifactor authentication
- 22 Real life scenarios