The Zero Trust Framework and Privileged Access Management (PAM) (Ravindra Das)

The Zero Trust Framework and Privileged Access Management (PAM) (Ravindra Das)
English | eBook | Size: 5.18 MB


This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense.

Linkedin Learning – Performance Management-Conducting Performance Reviews

Linkedin Learning – Performance Management-Conducting Performance Reviews UPDATED December 2024
English | Tutorial | Size: 196.30 MB


Performance reviews can have a huge impact on your employee’s future. In this short course, the second installment in the Performance Management series, learn how to prepare for and conduct fair, productive, and impactful performance reviews.

Modern Vulnerability Management: Predictive Cybersecurity (Computer Security) (Michael Roytman and Ed Bellis)

Modern Vulnerability Management: Predictive Cybersecurity (Computer Security) (Michael Roytman and Ed Bellis)
English | Tutorial | Size: 13.90 MB


This book comprehensively covers the principles of Risk-based vulnerability management (RBVM) – one of the most challenging tasks in cybersecurity — from the foundational mathematical models to building your own decision engine to identify, mitigate, and eventually forecast the vulnerabilities that pose the greatest threat to your organization.

PluralSight – Systems Thinking For Engineering Management

PluralSight – Systems Thinking For Engineering Management
English | Tutorial | Size: 303.66 MB


Systems thinking is about effectively understanding the dynamics of complex things. This course will teach you how to apply systems thinking to software engineering practices and processes.