Maurice Gardner
Cybersecurity Journey to Pro: My YouTube Portfolio
This channel showcases my evolving skillset, from Cyber fundamentals to more focused scopes. ️
Diving into:
Cloud (Azure, AWS)
Linux
SQL
Python Automation
AI technologies
My focus:
Building well-rounded expertise
Specializing in threat analysis & modeling
Real-world application for protecting enterprises
*Disclaimer* Copyright Notice:
The content used in the "Implement Patching using WSUS" video series originates from Practice-IT, and is copyrighted © Practice-IT 2017. All rights reserved.
This series adheres to the following guidelines from Practice-IT's copyright notice:
The content is used for educational and demonstration purposes only.
The videos credit Practice-IT as the source of the material.
No redistribution or commercial exploitation of the content is intended.
Further Information:
For complete details on Practice-IT's copyright policy, please visit their website at https://practiceit.cs.washington.edu/.
Using Splunk for Vulnerability Reporting Concepts
Utilizing Splunk with System & Network Security Implementation Concepts
Splunk to Monitor for Port Scanning & Incident Response Management Techniques
Linux Scripting Techniques
Managing Linux Shared Storage
Logical Volume Manager Commands
Storage Management Concepts
Managing & Configuring Linux System Services
Managing Processes in Linux
Remote Connectivity Management
Elevated User Privilege Management
Linux Identity Management
Package Management and Updating Linux Devices
Linux Backup and File Compression Concepts
Access Control Utilities
Editing Files in Linux
File and Directory Management in Linux
Configuring Two Factor Authentication
Authentication and Authorization Solutions
Authentication and Authorization Implementation Techniques
Identity and Account Management Mechanisms
Configuring Advanced Authentication and Authorization
Administering User & Group Accounts
Host Related Incident Compromise Indicators
Incident Response Communication & Reporting
Incident Response Tools
Digital Forensics Techniques
Introduction to Digital Forensics
Install and Configure Network Load Balancing
Implementing AD Federation Services Part 2