Completed
Credentials
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How to Exploit Cloud Adoption for Making Your IT More Secure and Convenient for End Users - DefCamp #10
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Who is Telus
- 3 What is IT security
- 4 Deepfake
- 5 Threat evolution
- 6 Identity and encryption
- 7 Data encryption
- 8 Structure of the solution
- 9 Scenario sources
- 10 Type of implementation
- 11 volumetric transparent encryption
- 12 live data transformation
- 13 transparent encryption
- 14 application layer encryption
- 15 hardware appliance
- 16 security intelligence
- 17 Splunk example
- 18 IT infrastructure to cloud
- 19 Secure your identity
- 20 Credentials
- 21 Multifactor authentication
- 22 Real life scenarios