Added conclusion
This commit is contained in:
parent
13263f6059
commit
5c9aac443f
|
@ -0,0 +1,16 @@
|
|||
# Conclusion
|
||||
|
||||
Now that you have completed this course on Security you are now aware of the possible security treats to computer systems & networks. Not only that, but you are now better able to protect your systems as well as recommend security measures to others.
|
||||
|
||||
This course provides fundamental everyday knowledge on security domain which will also help you keep security at the top of your priority.
|
||||
|
||||
## Other Resources
|
||||
|
||||
Some books that would be a great resource
|
||||
|
||||
- Holistic Info-Sec for Web Developers <https://holisticinfosecforwebdevelopers.com/>- Free and downloadable book series with very broad and deep coverage of what Web Developers and DevOps Engineers need to know in order to create robust, reliable, maintainable and secure software, networks and other, that are delivered continuously, on time, with no nasty surprises
|
||||
- Docker Security - Quick Reference: For DevOps Engineers <https://holisticinfosecforwebdevelopers.com/> - A book on understanding the Docker security defaults, how to improve them (theory and practical), along with many tools and techniques.
|
||||
- How to Hack Like a Legend <https://amzn.to/2uWh1Up>- A hacker’s tale breaking into a secretive offshore company, Sparc Flow, 2018
|
||||
- How to Investigate Like a Rockstar <https://books2read.com/u/4jDWoZ>- Live a real crisis to master the secrets of forensic analysis, Sparc Flow, 2017
|
||||
- Real World Cryptography <https://www.manning.com/books/real-world-cryptography>- This early-access book teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications.
|
||||
- AWS Security <https://www.manning.com/books/aws-security?utm_source=github&utm_medium=organic&utm_campaign=book_shields_aws_1_31_20>- This early-access book covers commong AWS security issues and best practices for access policies, data protection, auditing, continuous monitoring, and incident response.
|
|
@ -25,6 +25,7 @@ The courseware is not an ethical hacking workshop or a very deep dive into the f
|
|||
2. [Network Security](https://linkedin.github.io/school-of-sre/security/network_security/)
|
||||
3. [Threats, Attacks & Defence](https://linkedin.github.io/school-of-sre/security/threats_attacks_defences/)
|
||||
4. [Writing Secure Code & More](https://linkedin.github.io/school-of-sre/security/writing_secure_code/)
|
||||
5. [Conclusion](https://linkedin.github.io/school-of-sre/security/conclusion/)
|
||||
|
||||
|
||||
## Post Training asks/ Further Reading
|
||||
|
|
Loading…
Reference in New Issue