How the DoD (Dept. of Defense) determines how IT Systems are secured, STIG.
Автор: Rob Riker's Tech Channel
Загружено: 2021-04-02
Просмотров: 6107
Joining me today is Tom Major. He's an Army Veteran, thank you for your service Tom! He spent the last 20+ years working as a Department of Defense IT Systems Administrator Contractor. During his tenure as a contractor, one of Tom's responsibilities was to apply security policies based on DoD guidelines called STIG or Securing Technologies Implementation Guide. Tom walks us through how it all works.
Everything discussed here is publicly available and nothing sensitive, classified or confidential is discussed or shown.
If you have any questions, feel free ask questions by commenting and I'll forward them to Tom to answer them. Thanks and enjoy!
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: