Added conclusion

This commit is contained in:
Nishant Singh 2020-11-18 00:39:08 +05:30
parent 13263f6059
commit 5c9aac443f
2 changed files with 17 additions and 0 deletions

View File

@ -0,0 +1,16 @@
# Conclusion
Now that you have completed this course on Security you are now aware of the possible security treats to computer systems & networks. Not only that, but you are now better able to protect your systems as well as recommend security measures to others.
This course provides fundamental everyday knowledge on security domain which will also help you keep security at the top of your priority.
## Other Resources
Some books that would be a great resource
- Holistic Info-Sec for Web Developers <https://holisticinfosecforwebdevelopers.com/>- Free and downloadable book series with very broad and deep coverage of what Web Developers and DevOps Engineers need to know in order to create robust, reliable, maintainable and secure software, networks and other, that are delivered continuously, on time, with no nasty surprises
- Docker Security - Quick Reference: For DevOps Engineers <https://holisticinfosecforwebdevelopers.com/> - A book on understanding the Docker security defaults, how to improve them (theory and practical), along with many tools and techniques.
- How to Hack Like a Legend <https://amzn.to/2uWh1Up>- A hackers tale breaking into a secretive offshore company, Sparc Flow, 2018
- How to Investigate Like a Rockstar <https://books2read.com/u/4jDWoZ>- Live a real crisis to master the secrets of forensic analysis, Sparc Flow, 2017
- Real World Cryptography <https://www.manning.com/books/real-world-cryptography>- This early-access book teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications.
- AWS Security <https://www.manning.com/books/aws-security?utm_source=github&utm_medium=organic&utm_campaign=book_shields_aws_1_31_20>- This early-access book covers commong AWS security issues and best practices for access policies, data protection, auditing, continuous monitoring, and incident response.

View File

@ -25,6 +25,7 @@ The courseware is not an ethical hacking workshop or a very deep dive into the f
2. [Network Security](https://linkedin.github.io/school-of-sre/security/network_security/)
3. [Threats, Attacks & Defence](https://linkedin.github.io/school-of-sre/security/threats_attacks_defences/)
4. [Writing Secure Code & More](https://linkedin.github.io/school-of-sre/security/writing_secure_code/)
5. [Conclusion](https://linkedin.github.io/school-of-sre/security/conclusion/)
## Post Training asks/ Further Reading