Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next

Title Security superstream : zero trust / Dr. Wendy Ng, Nicolas Chaillan, Wolfgang Goerlich, Razi Rais. [O'Reilly electronic resource]

Edition [First edition].
Publication Info. [Place of publication not identified] : O'Reilly Media, Inc., 2022.
QR Code
Description 1 online resource (1 video file (2 hr., 50 min.)) : sound, color.
Playing Time 025000
Description digital rdatr
video file rdaft
Instructional films lcgft
Performer Chloé Messdaghi, Dr. Wendy Ng, Nicolas Chaillan, Wolfgang Goerlich, Razi Rais, presenters.
Summary With the expansion of the remote workforce, more than ever security professionals need to know exactly who is logging into critical systems and accessing role-appropriate data. Enter zero trust--a network security model based on a strict identity verification process. Join us to get up to speed with key techniques and best practices for the zero-trust model and gain expert advice on emerging guidelines and standards and how to successfully deploy it. You'll learn how to employ multifactor authentication, biometric and behavioral analytics, and continuous monitoring to verify user identities and control access to sensitive resources as you explore the challenges and opportunities of adopting and integrating zero trust into your cybersecurity strategy. What you'll learn and how you can apply it Learn how to view your organization's security and IT infrastructure through the lens of zero trust Understand how zero trust will impact any existing identity, network, and security systems This recording of a live event is for you because... You're a security practitioner interested in implementing zero trust. You're a developer or engineer new to or looking to enter a security role. You want to become well-versed in the foundations and best practices of zero trust. Recommended follow-up: Read: Zero Trust Security: An Enterprise Guide (book) Watch: What Are the Common Challenges to Adopting a Zero Trust Network Security Model? (video).
Subject Computer security.
Computer crimes -- Prevention.
Sécurité informatique.
Computer crimes -- Prevention
Computer security
Genre Instructional films
Internet videos
Nonfiction films
Instructional films.
Nonfiction films.
Internet videos.
Films de formation.
Films autres que de fiction.
Vidéos sur Internet.
Added Author Messdaghi, Chloé, presenter.
Ng, Wendy, presenter.
Chaillan, Nicolas, presenter.
Goerlich, Wolfgang, presenter.
Rais, Razi bin, presenter.
O'Reilly (Firm), publisher.
Added Title Zero trust
Standard No. 0636920817680
Patron reviews: add a review
Click for more information
EVIDEO
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information