Instructors: Josiah Dykstra | March 2022 | Duration: 1h 44m
Video: MP4 1920x1080 48 KHz | English | Size: 544 MB
Join Josiah Dykstra for an introduction to the application of scientific methodology to the process of creating cybersecurity tools and systems.
Creating, using, and evaluating cybersecurity tools and systems are complex tasks. Many cybersecurity professionals are attracted to the challenges of building these tools and systems, and are motivated to use their expertise to bring sanity and solutions to real-world problems. The addition of scientific methodology aids in dealing with uncertainty, unknowns, choices, and crises. It can improve existing products and lead to groundbreaking innovation and applications.
In this course, you'll focus on practical, real-world applications of science to the work you do. You'll learn about scientific principles and flexible methodologies for effective security as you design, execute, and evaluate your own experiments. You'll discover why the application of science is worth the added effort and you'll glean insights from specific examples of experimentation in cybersecurity.
This course uses a mix of lectures, examples, exercises, and Q&A. The course is ideal for students, software developers, forensic investigators, network administrators, and any other person responsible for providing security.
What you'll learn and how you can apply it
By the end of this course, you'll understand
The steps and principles of scientific method and their application to everyday, practical cybersecurity
The difference between metrics and science
How experimentation and evaluation can help ensure that software is secure
And you'll be able to
Turn your ideas into well-formulated and testable questions
Identify, dissect, and evaluate the methodology and claims of others
Ask clarifying questions about the claims of vendors, marketers, and salespeople
This course is for you because.
You're an infosec practitioner, cybersecurity specialist, or other security professional intrigued by the practical application of science to your work
You need to evaluate and recommend security solutions to decision-makers in your organization
You want to become the top vendor or create the top product in your field
Prerequisites
There are no strict prerequisites. However, 5–10 years of experience in information security will offer the best context for learning. No prior training in scientific investigation is required.
https://www.oreilly.com/library/view/getting-started-with/0636920670926/
H4S
https://hot4share.com/6mjdn31dt80d/kjvuf.G.S.w.C.S.2022.rar.html
https://nitro.download/view/8EC1214FB3CFD30/kjvuf.G.S.w.C.S.2022.rar
https://rapidgator.net/file/b293c12a33698e37d2006aa7eafe138b/kjvuf.G.S.w.C.S.2022.rar.html
https://uploadgig.com/file/download/34be01cF4718cdc9/kjvuf.G.S.w.C.S.2022.rar