Description: Hacking becomes very common nowadays. If it comes about the company information, it is one of the most dangerous problems. An ethical hacker helps an organisation to protect their data and increases the security of a computer system. Therefore, the demand for a certified ethical hacker is increasing day by day. The Certified Ethical Hacking - Complete Video Training course will help to meet your need if you want to build a stable career in ethical hacking. The course is taught in two parts. One part deals with the basic knowledge of ethical hacking and helps you to be an ethical hacker while the second section prepares you for the Certified Professional Ethical Hacker (CPEH). The bundle video course teaches the fundamental concepts of ethical hacking including access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, reconnaissance, covering tracks, malware, buffer overflows, and password cracking, etc. You will also learn to implement the counter-response to protecting your information. In short, the Certified Ethical Hacking - Complete Video Training provides a complete guide to ethical hacking. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Ethical Hacking - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Ethical Hacking - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview Overview FREE 00:35:00 Reconnaissance Reconnaissance 00:25:00 Protocols Protocols 01:25:00 Windows Hacking Windows Hacking 01:19:00 Attacking Web Technologies Attacking Web Technologies 00:56:00 Pen Testing Wireless Networks Pen Testing Wireless Networks 01:34:00 Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Final Exam Final Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Order Your Certificates and TranscriptsOrder Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00
Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks
TETRA training course description This 2 day training course covers the network architecture required for TETRA. It also looks at the Air Interface, TETRA Functions and Procedures. What will you learn Describe the TETRA Architecture Describe the Air Interface Explain the TETRA Functions Explain the TETRA Procedures TETRA training course details Who will benefit: Anyone working with TETRA. Prerequisites: None. Duration 2 days TETRA training course contents Introduction History of PMR, ETSI development, Tetra function, Tetra markets, Tetra standards, Tetra supplier base, Tetra Release 1, Tetra Release 2. Network Architecture Mobile network Identity, Mobile stations, Base station, Switching & Management, Addresses & Identitie. Air Interface Modulation, TDMA Format, FD, Framin, Burst format, Traffic Channel TCH, Dedicated Channel DCC, Common Control Channel CCC, Signalling Channel SCH, Logical Control mapping LCM, Protocol stack, Voice coded. TETRA Functions Trunked mode operation, User hierarchies, Individual calling, Group calling, Supplementary services, Voice and Data, Data services, Direct mode operation, Tetra WAP, Circuit mode priorities, Circuit mode data, Packet mode data, Discrete and Ambient listening. Automatic vehicle locator. TETRA Procedures MS operational modes, Mobility management, Cell selection, Security & Authentication, Decryption options, Cell setup, Channel assignment, Network management - internal, Network management -external, PSTN Gateway, ISDN Gateway, Control Room Gateway.
***24 Hour Limited Time Flash Sale*** GDPR , Compliance & Information Management Level 3, 5 & 6 at QLS Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter Unleash your potential in the crucial sectors of GDPR, Compliance, and Information Management with our comprehensive course bundle. Included in this unique bundle are three Quality License Scheme (QLS) endorsed courses that provide you with an in-depth understanding of GDPR basics, compliance certification, and information management. To authenticate your learning journey, you'll receive a hardcopy certificate upon completion of these QLS-endorsed courses, marking a noteworthy milestone in your professional development. But that's not all; this course bundle also incorporates five relevant Continued Professional Development (CPD) Quality Standard (QS) accredited courses. These cover important topics like Anti-Money Laundering (AML), Know Your Customer (KYC) guidelines, Cyber Security Awareness, Cyber Law, and Security Management. Equip yourself with this comprehensive GDPR, Compliance & Information Management course bundle and stay ahead in a world that increasingly values data protection and regulatory compliance. Key Features of the GDPR, Compliance & Information Management Level 3, 5 & 6 at QLS Bundle: 3 QLS-Endorsed Courses: We proudly offer 3 QLS-endorsed courses within our GDPR, Compliance & Information Management Level 3, 5 & 6 at QLS bundle, providing you with industry-recognized qualifications. Plus, you'll receive a free hardcopy certificate for each of these courses. QLS Course 01: Data Protection : GDPR Basics QLS Course 02: Certificate in Compliance QLS Course 03: Information Management 5 CPD QS Accredited Courses: Additionally, our bundle includes 5 relevant CPD QS accredited courses, ensuring that you stay up-to-date with the latest industry standards and practices. Course 01: Anti-Money Laundering (AML) Training Course 02: KYC Course 03: Cyber Security Awareness Training Course 04: Cyber Law Online Course Course 05: Security Management Diploma In Addition, you'll get Five Career Boosting Courses absolutely FREE with this Bundle. Course 01: Professional CV Writing Course 02: Job Search Skills Course 03: Self-Esteem & Confidence Building Course 04: Professional Diploma in Stress Management Course 05: Complete Communication Skills Master Class Convenient Online Learning: Our GDPR, Compliance & Information Management Level 3, 5 & 6 at QLS courses are accessible online, allowing you to learn at your own pace and from the comfort of your own home. Learning Outcomes of the GDPR, Compliance & Information Management Level 3, 5 & 6 at QLS Bundle: By the end of this GDPR, Compliance & Information Management bundle course, learners will be able to: Understand the essentials of the General Data Protection Regulation (GDPR). Gain theoretical knowledge of compliance and its significance in businesses. Learn about the intricacies of Information Management. Gain insights into Anti-Money Laundering (AML) measures. Understand the importance of Know Your Customer (KYC) guidelines. Develop awareness about Cyber Security and its importance in the digital age. Gain insights into the essentials of Cyber Law. Understand the principles of Security Management. The GDPR, Compliance & Information Management Level 3, 5 & 6 at QLS bundle offers a wide spectrum of knowledge across several key domains. It empowers you with a fundamental understanding of the GDPR, taking you through its importance in the digital era, and ensuring data protection. The bundle also includes a course on Compliance, which deepens your knowledge of maintaining organisational standards and regulations. The Information Management course provides insights into managing and utilising information effectively in a business setting. Moreover, the bundle also includes relevant CPD QS accredited courses like AML Training and KYC, offering a thorough understanding of financial regulations and customer verification processes. Further, it encompasses courses like Cyber Security Awareness Training, Cyber Law, and Security Management Diploma, amplifying your understanding of the digital security landscape. This comprehensive course bundle promises a thorough theoretical understanding, preparing you for the next steps in your career journey. CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This GDPR, Compliance & Information Management bundle course is ideal for: Individuals aspiring for a career in data protection, compliance, or information management. Professionals in the IT or finance sector seeking to enhance their theoretical knowledge. Students studying law, finance, or related fields. Anyone with a keen interest in understanding the legal and regulatory aspects of data management. Career path GDPR Compliance Officer - Salary range in the UK: £25,000 - £55,000 per year Compliance Officer - Salary range in the UK: £26,000 - £60,000 per year Information Management Specialist - Salary range in the UK: £30,000 - £70,000 per year AML Analyst - Salary range in the UK: £30,000 - £55,000 per year Cyber Security Analyst - Salary range in the UK: £30,000 - £70,000 per year Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included
Duration 2 Days 12 CPD hours This course is intended for This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of the ProxySG. Overview Solve common authentication and SSL issuesUnderstand the underlying architecture of SGOSMonitor and analyze ProxySG performanceUse policy tracing as a troubleshooting tool The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG. Using Authentication Realms Describe the benefits of enabling authentication on the ProxySG Describe, at a high level, the ProxySG authentication architecture Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods Understanding Authentication Credentials Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments Configure the ProxySG to use Kerberos authentication Understanding Authentication Modes Describe authentication surrogates and authentication modes Describe ProxySG authentication in both explicit and transparent deployment mode Understanding HTTPS Describe key components of SSL encryption Describe how the SSL handshake works Describe some of the legal and security considerations related to use of the SSL proxy Managing SSL Traffic on the ProxySG Describe how the SSL proxy service handles SSL traffic Describe the standard keyrings that are installed by default on the ProxySG Identify the types of security certificates that the ProxySG uses Optimizing SSL Interception Performance Configure the ProxySG to process SSL traffic according to best practices for performance SGOS Architecture Identify key components of SGOS Explain the interaction among client workers and software workers in processing client requests Explain the significance of policy checkpoints Describe key characteristics of the SGOS storage subsystem Explain the caching behavior of the ProxySG Caching Architecture Describe the benefits of object caching on the ProxySG Explain the caching-related steps in a ProxySG transaction Identify and describe the HTTP request and response headers related to caching Describe, in general terms, how the ProxySG validates cached objects to ensure freshness Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching System Diagnostics Describe the use of the health monitor and health checks Explain the use of the event and access logs Describe the information available in advanced URLs and sysinfo files Describe the function of policy tracing and packet captures Introduction to Content Policy Language (CPL) Describe the fundamental concepts and purposes of ProxySG policy transactions Understand the relationship of layers, rules, conditions, properties, and triggers Describe the two types of actions in CPL Describe how to write, edit, and upload CPL code Using Policy Tracing for Troubleshooting Identify the two main types of ProxySG policy traces Describe the various sections of a policy trace result Configure a global and policy-driven trace Access and interpret policy trace results ProxySG Integration Identify other Symantec products that can be used as part of a complete security solution
GSM training course description GSM is in widespread use today. This seminar gives an comprehensive overview of GSM. What will you learn Explain what GSM is. Describe the architecture of the GSM network. Describe the GSM protocol stack. GSM training course details Who will benefit: Anyone who needs to know more about GSM. Prerequisites: Telecommunications Introduction Duration 2 days GSM training course contents Introduction History of GSM, analogue networks, digital networks, PCS1900. GSM services Telephony, digital encoding, data rates, Group 3 fax, SMS, Supplementary services. GSM architecture Mobile station Mobile Equipment (ME), Subscriber Identity Module (SIM). Base Station Subsystem Base Transceiver Station (BTS), Base Station Controller (BSC). Network Subsystem Mobile Services Switching Centre (MSC), Home Location Register (HLR), Visitor Location Register (VLR), Equipment Identity Register (EIR), Visitor Location register (VLR), Authentication Centre (AuC) Radio Link Aspects Bands, FDMA, TDMA, Traffic channels, Control channels, Speech coding, Channel coding and modulation, Multipath equalisation, Frequency hopping. GSM signalling SS7 overview, GSM SS7 nodes, Base Station Subsystem Application Part (BSSAP), Transaction Capabilities Application Part (TCAP), Mobile Application Part (MAP). Interfaces Um, Abis and A interfaces. Mobility and call processing in GSM Attach & location update process, mobile originate, mobile termination, handovers. GSM services Tele services, Bearer services, supplementary services, SMS, security. GSM futures GPRS, UMTS.
Employees, managers and directors should all have a good understanding of the threat posed by cyber-attacks and the importance of guarding against data breaches. This short course will explain why cyber attacks and data breaches happen and provide practical advice on how to set up effective defences.
In today's world, the need for Close Protection services is greater than ever before. With the rise of global threats and the increasing demand for VIP protection, the Close Protection industry is growing rapidly. This is where our Legal Considerations in Close Protection course comes in. It provides the essential knowledge and skills required for a successful career in Close Protection. From threat assessment to legislation, you'll learn how to navigate every challenge that comes your way. Learning Outcomes: Understand the basics of Close Protection and the role of the Close Protection Team Identify the key components of planning for Close Protection operations Analyse threats and perform threat assessments Develop vehicle drills for embus and debus Evaluate route selection and perform reconnaissance Understand legislation related to Close Protection in the UK Our course on Legal Considerations in Close Protection is perfect for anyone interested in pursuing a career in this exciting field. Over seven modules, you'll gain a comprehensive understanding of the legal considerations involved in Close Protection operations. Beginning with an introduction to Close Protection, you'll learn about the role of the Close Protection team and the importance of planning for operations. Our threat assessment module will teach you how to analyse potential threats, while our vehicle drills module will give you practical experience in embus and debus techniques. You'll also learn about route selection and reconnaissance, crucial skills for any Close Protection professional. And finally, our module on legislation regarding Close Protection will provide you with a solid foundation in the legal considerations involved in this field. If you're looking to become a successful Close Protection professional, our course is the perfect place to start. Enrol now and take the first step towards an exciting new career. Certification Upon completion of the course, learners can obtain a certificate as proof of their achievement. You can receive a £4.99 PDF Certificate sent via email, a £9.99 Printed Hardcopy Certificate for delivery in the UK, or a £19.99 Printed Hardcopy Certificate for international delivery. Each option depends on individual preferences and locations. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This course is particularly useful for: Individuals interested in pursuing a career in Close Protection Professionals seeking to expand their knowledge of Close Protection legal considerations Security personnel looking to specialise in Close Protection Law enforcement officers seeking to understand the legal aspects of Close Protection Career path Upon completion of this course, you can pursue many career paths, such as: Close Protection Officer: £20,000 - £60,000 per year Close Protection Team Leader: £40,000 - £100,000 per year Close Protection Manager: £50,000 - £150,000 per year Close Protection Consultant: £75,000 - £200,000 per year Security Director: £100,000 - £250,000 per year CEO, Security Firm: £250,000+ per year
Perl training course description A hands on introduction to programming in Perl. What will you learn Write Perl programs. Use Perl modules. Debug Perl programs. Examine existing code and determine its function. Perl training course details Who will benefit: Anyone wishing to learn Perl. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Perl training course contents Introduction to Perl What is Perl? When to use Perl, downloading Perl, installing Perl, documentation, perldoc, running Perl, the Perl environment. Perl under UNIX, Perl under Windows. "Hello world". Variables Scalars, data types, $_, strings and numbers, assignment, constants, strict, scope, STDIN. Operators Number operators, string operators, precedence and associativity, converting numbers and strings, shortcut operators. Flow control Blocks, if, else, elseif, unless, foreach, while, for do, until. Regular expressions What are regular expressions? Pattern matching, Perl as a filter, file editing. Strings Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Subroutines Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Arrays and hashes Working with arrays, element access, push(), pop(), shift(), unshift(), <STDIN> as an array, associative arrays, hashes of arrays, hash references, arrays of hashes, hashes of hashes. Files Simple file handling, open, close, <FILEHANDLE>, <>, file tests, directory access, directory handles, database access, packing and packing binary data. I/O STDIN, STDOUT and STDERR, Command line arguments,@ARGV. Perl debugging The built in debugger, running the debugger, debugger commands, graphical debuggers. Script syntax errors, single stepping, breakpoints, watches. Packages and modules CPAN, Finding modules, installing modules, using modules, scope. Report formatting Formats, defining a format, invoking a format, field holders. Process management System interaction, system(), exec(), signals. Security issues.
Register on the CompTIA A+ (220-1002) today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The CompTIA A+ (220-1002) is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The CompTIA A+ (220-1002) Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the CompTIA A+ (220-1002), all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Section 01: All About the CompTIA A+ 2019 Core 2 Exam CompTIA A+ 2019 Core 2 (220-1002) Course Introduction 00:02:00 What is the CompTIA A+ 00:02:00 Why Get A+ Certified? 00:03:00 What is on the CompTIA A+ Core 2 (220-1002) Exam? 00:04:00 How to Pass the CompTIA A+ Exam 00:04:00 How to use this Video Course 00:03:00 Section 02: Safety and Professionalism Professional Communication Part 1 00:06:00 Professional Communication Part 2 00:07:00 Physical Safety 00:07:00 Section 03: The Visible Computer What is an Operating System? 00:09:00 Users and Super Users 00:05:00 Why Windows? 00:08:00 Windows Editions and Versions 00:12:00 Touring the macOS 00:06:00 Touring Linux 00:08:00 Section 04: CPUs 32-Bit vs. 64-Bit Processing 00:12:00 Section 05: RAM Virtual Memory 00:06:00 Section 06: Power Supply Power Protection 00:10:00 Section 07: Implementing Mass Storage Understanding Partitioning 00:04:00 MBR Partitioning 00:12:00 GPT Partitioning 00:09:00 Understanding File Systems 00:12:00 Popular File Systems 00:07:00 Formatting in Action 00:11:00 Dynamic Disks 00:09:00 Software RAID in Storage Spaces 00:10:00 Encrypting Mass Storage 00:09:00 Section 08: Building a PC Boot from Everything 00:12:00 Installing Windows 00:12:00 Post-Installation Tasks 00:12:00 Windows Installation options 00:07:00 Section 09: Windows under the Hood What is the Registry? 00:11:00 Processes 00:07:00 Services 00:04:00 Your Windows Toolset 00:08:00 Windows 7 Task Manager 00:09:00 Windows 10 Task Manager 00:06:00 Information and Configuration Tools 00:11:00 Performance Monitor 00:12:00 Event Viewer 00:07:00 Tools for Programmers 00:08:00 Section 10: Users, Groups, and Permissions Introduction to Users and Groups 00:06:00 Managing Users and Groups 00:12:00 NTFS Permissions 00:08:00 Linux and macOS Permissions 00:05:00 File Explorer 00:14:00 Sharing Resources 00:11:00 Security Policies 00:08:00 Section 11: Maintaining and Optimizing Operating Systems Patch Management 00:11:00 Working with Disks 00:06:00 Working with Applications 00:07:00 System Restore 00:05:00 Backing up Your Files 00:07:00 Task Scheduler 00:07:00 Section 12: Working with the Command-Line Interface Understanding the CLI 00:11:00 Navigating the CLI 00:14:00 Working with Folders 00:07:00 Working with Files 00:11:00 Working with Drives 00:13:00 Super Copy Commands 00:09:00 Advanced Windows Command Line 00:08:00 Advanced Linux Commands 00:13:00 Command-Line Permissions 00:08:00 Introduction to Scripting 00:10:00 Interpreted Languages 00:12:00 Section 13: Troubleshooting Operating Systems Windows Recovery Environment 00:05:00 Advanced Windows Startup Options 00:07:00 Troubleshooting Boot Problems 00:10:00 Troubleshooting at the GUI 00:11:00 Troubleshooting Applications 00:07:00 Kernel Panic 00:05:00 Section 14: Display Technologies Resolutions and Aspect Ratios 00:06:00 Multiple Monitors 00:05:00 Section 15: Essentials of Networking Network Card Troubleshooting 00:09:00 Section 16: Local Area Networking Working with Connections 00:09:00 Working with Workgroups 00:08:00 Working with Active Directory 00:14:00 Windows Sharing with Mac and LInux 00:07:00 Net Command 00:04:00 Firewall Configuration 00:11:00 Windows Firewall 00:08:00 Port Forwarding 00:07:00 Section 17: Wireless Networking Wireless Encryption 00:11:00 Enterprise Wireless 00:16:00 Section 18: The Internet Telnet and SSH 00:07:00 Remote Desktop Connections 00:06:00 The World Wide Web 00:09:00 Troubleshooting Internet Connections 00:07:00 Section 19: Portable Computing Power Management 00:11:00 Section 20: Care and Feeding of Mobile Devices Mobile Device Security 00:08:00 Mobile Security Troubleshooting 00:06:00 Mobile Device Troubleshooting 00:10:00 Section 21: Securing Computers Threats 00:10:00 Physical Security 00:08:00 Passwords and Authentication 00:14:00 Malware 00:14:00 Anti-Malware 00:11:00 Social Engineering 00:06:00 Licensing 00:10:00 Incident Response 00:05:00 Environmental Controls 00:06:00 Section 22: Operational Procedures Documents You Need to Know 00:09:00 Data You Need to Know 00:04:00 Change Management 00:06:00 The Zen of Backup 00:11:00 Recycling and Data Destruction 00:07:00