Overview
Syllabus
Introduction
Berg
Barracuda
Architecture Enhancement
Kubernetes
monolithic applications
distributed database
Barracuda ATP
State of Cybersecurity
Ransomware
Maslows Hierarchy
Attacks to Barracuda
Spearfishing
Petia
Not Petia
File Security
Advanced Persistent Threats
Spear Phishing
Understanding Communication Patterns
Web Application
WAAFs
Attack Zero
Valve
Reverse Proxy
Secure Connectivity
Pay Attention
Transparent Proxy
SSL
IoT
Use Cases
Network Firewall
Smart Power Monitoring
Cloud
Cloud Infrastructure
Two Different Personas
Cloud Security Guardium
Firewall
Equifax
Ransomware Attacks
The Imperial Chancellor
Red Cliff
Questions
Taught by
Stanford Online