Risk Management

Length: 00:11:44

Lesson Summary:

Protection of information is probably the single most important task for a penetration tester, ethical hacker, devops admin, network and system admin, and any other employee of a company or entity. These lectures will deal with the terminology related to information protection. Make sure you remember and understand the terms as you learn them one by one. We'll explore all sorts of cool things that they represent and can be tied to, like User Behavior Analytics being used by an AI to predict and proactively act to mitigate insider threats.

This lesson is only available to Linux Academy members.

Sign Up To View This Lesson
Or Log In

Looking For Team Training?

Learn More