自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(1)
  • 资源 (2)
  • 收藏
  • 关注

转载 用SASE加速零信任网络交付

by K.P. IMKP 五一节前,我们成功地交付了第一个基于SASE架构的零信任网络项目。从敲下第一行代码到第一个项目交付,经历了半年时间的打磨,信域安全云网(TM-SONA)开始在客户业务环境里落地了。 这半年来,我们一直在思考和实践如何帮客户更快速、更便捷的完成零信任网络升级,过程中踩了不少坑,积累了很多经验,也有了一些成果。趁着这个假期有点时间,我整理了一下我们对零信任网络和SASE的理解,拿出来跟大家一起探讨。 内容大纲如下: ...

2020-05-10 22:21:30 1297

CISSP in 21 Days

Day 1: This chapter covers various concepts related to security management practices, control environment, and asset classification and controls. Day 2: This chapter discusses important requirements of security awareness and training as well as risk assessment and management. Day 3: This chapter covers the threats, vulnerabilities, and countermeasures for physical security and physical security design that includes perimeter and interior security. Day 4: This chapter addresses the concepts in operations and facility security, along with protecting and securing equipment. Day 5: This chapter covers concepts related to access control, methodologies and techniques, authentication, and access-related attacks and countermeasures. Day 6: This chapter covers concepts related to vulnerability assessment and penetration testing. Day 7: This chapter covers various concepts related to cryptography, such as methods and types of encryption, as well as the application and use of cryptography. Day 8: This chapter covers the core concepts in Public Key Infrastructure, key management techniques, methods of cryptanalytic attacks, and various cryptographic standards. Day 9: This chapter covers various concepts in the areas of operations procedures and responsibilities, incident management, and reporting. Day 10: This chapter covers control environment related to operations security and also evaluation criteria, such as TCSEC. Day 11: This chapter covers concepts in systems engineering and the Software Development Life Cycle models. Day 12: This chapter covers IT systems, threats and vulnerabilities of application systems, and application control concepts. Day 13: This chapter covers various concepts in network architecture, Open System Interconnect (OSI), and the TCP/IP models. It also covers various protocols in the TCP/IP models related to the application and transport layers, along with threats, vulnerabilities, attacks, and countermeasures for the TCP/IP protocols and services. Day 14: This chapter covers different protocols that are in the network/Internet layer, data link layer, and physical layer in the TCP/IP model. In addition, it covers some of the threats and vulnerabilities that are prevalent in such protocols, common attacks, and possible countermeasures. Day 15: This chapter covers concepts in computer architecture, the Trusted Computing Base, and protection domain and its related mechanisms. Day 16: This chapter addresses the concepts in assurance-related standards, various certification and accreditation schemes, and various computer security models. Day 17: This chapter covers various concepts in Business Continuity Planning, its goals and objectives as well as the concepts in the Business Impact Analysis. Day 18: This chapter covers the Disaster Recovery Planning process, various backup concepts, and the process of resuming business from alternative sites. Day 19: This chapter covers various computer crimes, cyber crimes, as well as different types of attacks. Day 20: This chapter covers laws and regulations related to information systems across the world. Additionally, it covers concepts related to computer investigations and ethical usage of information systems as prescribed by international bodies including (ISC)2. Day 21: This chapter contains a full mock test paper containing a total of 250 questions from all 10 domains.

2011-02-24

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除