Search Results for - Narrowed by: Computer networks -- Security measures. - Instructional films. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Instructional$002bfilms.$002509Instructional$002bfilms.$0026ps$003d300? 2024-06-14T14:51:21Z Exam MS-100 Microsoft 365 identity and services. ent://SD_ILS/0/SD_ILS:2335515 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Costello, Dan, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137648689/?ar">https://learning.oreilly.com/videos/~/9780137648689/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137648689">https://learning.oreilly.com/videos/~/9780137648689</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137648689/?ar">https://go.oreilly.com/library-access/library/view/-/9780137648689/?ar</a><br/>Format:&#160;Video recording<br/> Defensive cybersecurity fundamentals ent://SD_ILS/0/SD_ILS:2333379 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Berlin, Amanda, author.<br/><a href="https://learning.oreilly.com/videos/~/0636920670896/?ar">https://learning.oreilly.com/videos/~/0636920670896/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar">https://go.oreilly.com/library-access/library/view/-/0636920670896/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920670896">https://learning.oreilly.com/videos/~/0636920670896</a><br/>Format:&#160;Video recording<br/> Hands-on threat modeling ent://SD_ILS/0/SD_ILS:2333383 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Deleersnyder, Sebastien, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671268">https://learning.oreilly.com/videos/~/0636920671268</a> <a href="https://learning.oreilly.com/videos/~/0636920671268/?ar">https://learning.oreilly.com/videos/~/0636920671268/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671268/?ar</a><br/>Format:&#160;Video recording<br/> Windows Network security fundamentals ent://SD_ILS/0/SD_ILS:2333384 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Weadock, Glenn E., presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671206/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920671206">https://learning.oreilly.com/videos/~/0636920671206</a> <a href="https://learning.oreilly.com/videos/~/0636920671206/?ar">https://learning.oreilly.com/videos/~/0636920671206/?ar</a><br/>Format:&#160;Video recording<br/> The complete cybersecurity bootcamp ent://SD_ILS/0/SD_ILS:2333407 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137949397">https://learning.oreilly.com/videos/~/9780137949397</a> <a href="https://learning.oreilly.com/videos/~/9780137949397/?ar">https://learning.oreilly.com/videos/~/9780137949397/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar">https://go.oreilly.com/library-access/library/view/-/9780137949397/?ar</a><br/>Format:&#160;Video recording<br/> Web hacker's toolbox : tools used by successful hackers. ent://SD_ILS/0/SD_ILS:2335459 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Czagan, Dawid, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781837632831/?ar">https://learning.oreilly.com/videos/~/9781837632831/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837632831">https://learning.oreilly.com/videos/~/9781837632831</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632831/?ar</a><br/>Format:&#160;Video recording<br/> Offensive hacking unfolded. Become a pro Pentester. ent://SD_ILS/0/SD_ILS:2334688 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Yadav, Avinash, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar">https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781804615294/?ar">https://learning.oreilly.com/videos/~/9781804615294/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781804615294">https://learning.oreilly.com/videos/~/9781804615294</a><br/>Format:&#160;Video recording<br/> Cybersecurity pevention and detection (Video collection). ent://SD_ILS/0/SD_ILS:2332252 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137929351">https://learning.oreilly.com/videos/~/9780137929351</a> <a href="https://learning.oreilly.com/videos/~/9780137929351/?ar">https://learning.oreilly.com/videos/~/9780137929351/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar">https://go.oreilly.com/library-access/library/view/-/9780137929351/?ar</a><br/>Format:&#160;Video recording<br/> SC-300 : Microsoft Identity and Access Administrator. ent://SD_ILS/0/SD_ILS:2331717 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Nednur, Anand Rao, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803238043/?ar">https://learning.oreilly.com/videos/~/9781803238043/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803238043">https://learning.oreilly.com/videos/~/9781803238043</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803238043/?ar">https://go.oreilly.com/library-access/library/view/-/9781803238043/?ar</a><br/>Format:&#160;Video recording<br/> Single sign-on and passwordless authentication : an overview. ent://SD_ILS/0/SD_ILS:2333558 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Ovcharov, Andrey, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202294">https://learning.oreilly.com/videos/~/10000MNHV202294</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202294/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202294/?ar">https://learning.oreilly.com/videos/~/10000MNHV202294/?ar</a><br/>Format:&#160;Video recording<br/> Finding your cyber security path. ent://SD_ILS/0/SD_ILS:2332701 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Miller, Alyssa, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202258">https://learning.oreilly.com/videos/~/10000MNHV202258</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202258/?ar">https://learning.oreilly.com/videos/~/10000MNHV202258/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202258/?ar</a><br/>Format:&#160;Video recording<br/> Identity and access management fundamentals. ent://SD_ILS/0/SD_ILS:2335277 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Kohli, Harpreet, presenter.<br/><a href="https://learning.oreilly.com/videos/~/0636920671145/?ar">https://learning.oreilly.com/videos/~/0636920671145/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920671145">https://learning.oreilly.com/videos/~/0636920671145</a> <a href="https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar">https://go.oreilly.com/library-access/library/view/-/0636920671145/?ar</a><br/>Format:&#160;Video recording<br/> Web hacking expert : full-stack exploitation mastery. ent://SD_ILS/0/SD_ILS:2335278 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a> <a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format:&#160;Video recording<br/> Practical cyber hacking skills for beginners. ent://SD_ILS/0/SD_ILS:2335514 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Oni, Alexander, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar">https://go.oreilly.com/library-access/library/view/-/9781837636181/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837636181">https://learning.oreilly.com/videos/~/9781837636181</a> <a href="https://learning.oreilly.com/videos/~/9781837636181/?ar">https://learning.oreilly.com/videos/~/9781837636181/?ar</a><br/>Format:&#160;Video recording<br/> Threat modeling with Owasp Threat Dragon &amp; risk rating a vulnerability. ent://SD_ILS/0/SD_ILS:2332599 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Fisher, Derek, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202248/?ar">https://learning.oreilly.com/videos/~/10000MNHV202248/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202248">https://learning.oreilly.com/videos/~/10000MNHV202248</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202248/?ar</a><br/>Format:&#160;Video recording<br/> Certified ethical hacker v11 ent://SD_ILS/0/SD_ILS:2333423 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Bushmiller, Dean, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780996619158/?ar">https://learning.oreilly.com/videos/~/9780996619158/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780996619158">https://learning.oreilly.com/videos/~/9780996619158</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar">https://go.oreilly.com/library-access/library/view/-/9780996619158/?ar</a><br/>Format:&#160;Video recording<br/> Digital forensics for pentesters : hands-on learning. ent://SD_ILS/0/SD_ILS:2331969 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Krahenbill, Cliff, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803231969">https://learning.oreilly.com/videos/~/9781803231969</a> <a href="https://learning.oreilly.com/videos/~/9781803231969/?ar">https://learning.oreilly.com/videos/~/9781803231969/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar</a><br/>Format:&#160;Video recording<br/> Secure operations and protections ent://SD_ILS/0/SD_ILS:2332092 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Lakhani, Aamir, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780137894833">https://learning.oreilly.com/videos/~/9780137894833</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar">https://go.oreilly.com/library-access/library/view/-/9780137894833/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137894833/?ar">https://learning.oreilly.com/videos/~/9780137894833/?ar</a><br/>Format:&#160;Video recording<br/> Secrets management with Terraform ent://SD_ILS/0/SD_ILS:2331925 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Winkler, Scott, author, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202178">https://learning.oreilly.com/videos/~/10000MNLV202178</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202178/?ar">https://learning.oreilly.com/videos/~/10000MNLV202178/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202178/?ar</a><br/>Format:&#160;Video recording<br/> Securing microservices with Istio Service Mesh ent://SD_ILS/0/SD_ILS:2331950 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Siriwardena, Prabath, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202172">https://learning.oreilly.com/videos/~/10000MNLV202172</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202172/?ar">https://learning.oreilly.com/videos/~/10000MNLV202172/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202172/?ar</a><br/>Format:&#160;Video recording<br/> Practical cloud security. ent://SD_ILS/0/SD_ILS:2334616 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Dotson, Chris, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar">https://go.oreilly.com/library-access/library/view/-/9781492060727/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492060727">https://learning.oreilly.com/videos/~/9781492060727</a> <a href="https://learning.oreilly.com/videos/~/9781492060727/?ar">https://learning.oreilly.com/videos/~/9781492060727/?ar</a><br/>Format:&#160;Video recording<br/> Qi ye shen tou ce shi he chi xu jian kong. ent://SD_ILS/0/SD_ILS:2332289 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a> <a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format:&#160;Video recording<br/> Implementing Cisco network security, Part 2. ent://SD_ILS/0/SD_ILS:2334801 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Pickard, John, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar">https://go.oreilly.com/library-access/library/view/-/0636920303213/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920303213">https://learning.oreilly.com/videos/~/0636920303213</a> <a href="https://learning.oreilly.com/videos/~/0636920303213/?ar">https://learning.oreilly.com/videos/~/0636920303213/?ar</a><br/>Format:&#160;Video recording<br/> Unsupervised machine learning in security applications. ent://SD_ILS/0/SD_ILS:2334784 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032373">https://learning.oreilly.com/videos/~/9781492032373</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492032373/?ar">https://learning.oreilly.com/videos/~/9781492032373/?ar</a><br/>Format:&#160;Video recording<br/> Securing microservices : protect sensitive data in transit and at rest. ent://SD_ILS/0/SD_ILS:2334787 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Newman, Sam, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar">https://go.oreilly.com/library-access/library/view/-/9781492038986/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492038986/?ar">https://learning.oreilly.com/videos/~/9781492038986/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492038986">https://learning.oreilly.com/videos/~/9781492038986</a><br/>Format:&#160;Video recording<br/> Preparing and exploring security data for machine learning. ent://SD_ILS/0/SD_ILS:2334770 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032335">https://learning.oreilly.com/videos/~/9781492032335</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492032335/?ar">https://learning.oreilly.com/videos/~/9781492032335/?ar</a><br/>Format:&#160;Video recording<br/> Supervised machine learning in security applications. ent://SD_ILS/0/SD_ILS:2334773 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032410">https://learning.oreilly.com/videos/~/9781492032410</a> <a href="https://learning.oreilly.com/videos/~/9781492032410/?ar">https://learning.oreilly.com/videos/~/9781492032410/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar</a><br/>Format:&#160;Video recording<br/> Hei ke wang luo ying yong : wang luo qin ru ying yong. ent://SD_ILS/0/SD_ILS:2332288 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a> <a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format:&#160;Video recording<br/> Forensic analysis of computer memory. ent://SD_ILS/0/SD_ILS:2334797 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a> <a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format:&#160;Video recording<br/> Managing SSH clients and servers. ent://SD_ILS/0/SD_ILS:2334344 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Wallen, Jack, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar">https://go.oreilly.com/library-access/library/view/-/9781492031666/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492031666">https://learning.oreilly.com/videos/~/9781492031666</a> <a href="https://learning.oreilly.com/videos/~/9781492031666/?ar">https://learning.oreilly.com/videos/~/9781492031666/?ar</a><br/>Format:&#160;Video recording<br/> Capture and analysis of network-based evidence. ent://SD_ILS/0/SD_ILS:2334767 2024-06-14T14:51:21Z 2024-06-14T14:51:21Z by&#160;Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492029182">https://learning.oreilly.com/videos/~/9781492029182</a> <a href="https://learning.oreilly.com/videos/~/9781492029182/?ar">https://learning.oreilly.com/videos/~/9781492029182/?ar</a><br/>Format:&#160;Video recording<br/>