Explore all library
25 to 48 of 177 results
Search results 25 - 48 of 177Category: Security
- LEARNING PATHRichard Beck
Introduction to Ethical Hacking ToolsIntermediateDuration: Up to 19 hours and 28 minutesAuthor: Richard Beck; Difficulty: Intermediate; Description: This course has been designed to introduce you to a number of different ethical hacking tools.; Duration: Up to 19 hours and 28 minutes; Content Topics: Cyber Security, Security attacks, Security vulnerabilities, threats and countermeasures; This learning path has: 10 Courses, 9 Resources, 3 Exams, 15 Hands-on labs - HANDS-ON LABStefano Cascavilla
Inspecting and De-Identifying Data With Google Cloud Data Loss PreventionIntermediateDuration: Up to 45 minutesAuthor: Stefano Cascavilla; Difficulty: Intermediate; Description: In this lab, you will inspect data stored in Cloud Storage and understand the sensitive information therein.; Duration: Up to 45 minutes; Content Topics: Google Cloud Platform; This hands-on lab has: 4 Lab steps - HANDS-ON LABStefano Cascavilla
Managing Encryption Keys With Google Cloud KMSIntermediateDuration: Up to 1 hourAuthor: Stefano Cascavilla; Difficulty: Intermediate; Description: In this lab you will understand core concepts of Google Cloud KMS, you will create a Key Ring and a symmetric encryption key.; Duration: Up to 1 hour; Content Topics: Security; This hands-on lab has: 7 Lab steps - HANDS-ON LABRichard Beck
OWASP Exercises: Exploiting the Heartbleed BugIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: In this lab, you'll perform the Heartbleed attack using the MetaSploit Framework in order to dump the contents of a vulnerable webserver using an unpatched version of OpenSSL.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 7 Lab steps - HANDS-ON LABLogan Rakai
Cracking Passwords in LinuxIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps - HANDS-ON LABLogan Rakai
Protect Your Code Against Attacks With GauntltIntermediateDuration: Up to 1 hour and 15 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Description: Learn how to use Gauntlt for security testing and protect your code against attacks with Guantlt by embedding it into a continuous integration pipeline.; Duration: Up to 1 hour and 15 minutes; Content Topics: Security; This hands-on lab has: 7 Lab steps - COURSERichard Beck
Types of Cyber Attacks and How to Prevent ThemBeginnerDuration: 49 minutes and 23 secondsAuthor: Richard Beck; Difficulty: Beginner; Duration: 49 minutes and 23 seconds; Content Topics: Cyber Security; This course has: 3 Units - COURSEJonathan Bethune
Implementing Azure Infrastructure Compliance and SecurityIntermediateDuration: 1 hour and 21 minutesAuthor: Jonathan Bethune; Difficulty: Intermediate; Duration: 1 hour and 21 minutes; Content Topics: Compliance; This course has: 13 Units - COURSENMAP Network Scanner: The BasicsBeginnerDuration: 5 minutes and 43 secondsDifficulty: Beginner; Duration: 5 minutes and 43 seconds; Content Topics: Security; This course has: 1 Unit
- COURSEStuart Scott
Sharing Secrets Between Multiple Accounts Using AWS Secrets ManagerIntermediateDuration: 13 minutes and 14 secondsAuthor: Stuart Scott; Difficulty: Intermediate; Duration: 13 minutes and 14 seconds; Content Topics: Security; This course has: 2 Units - COURSEThomas Mitchell
Implementing and Managing Azure Active Directory Password ProtectionBeginnerDuration: 23 minutes and 42 secondsAuthor: Thomas Mitchell; Difficulty: Beginner; Duration: 23 minutes and 42 seconds; Content Topics: Microsoft Azure; This course has: 7 Units - COURSEHallam Webber
Configuring and Managing Azure Key VaultIntermediateDuration: 33 minutes and 29 secondsAuthor: Hallam Webber; Difficulty: Intermediate; Duration: 33 minutes and 29 seconds; Content Topics: Microsoft Azure; This course has: 7 Units - COURSEThomas Mitchell
Managing Azure Data Protection and Security ComplianceBeginnerDuration: 1 hour and 11 minutesAuthor: Thomas Mitchell; Difficulty: Beginner; Duration: 1 hour and 11 minutes; Content Topics: Microsoft Azure; This course has: 21 Units - COURSEThomas Mitchell
Getting Started with Conditional Access PoliciesIntermediateDuration: 15 minutes and 24 secondsAuthor: Thomas Mitchell; Difficulty: Intermediate; Duration: 15 minutes and 24 seconds; Content Topics: Identity and Access Management; This course has: 5 Units - COURSEKing Samuel
Fundamentals of Information Security Risk ManagementBeginnerDuration: 30 minutes and 40 secondsAuthor: King Samuel; Difficulty: Beginner; Duration: 30 minutes and 40 seconds; Content Topics: Risk Management; This course has: 4 Units - COURSEGuy Hummel
Introduction to Google Cloud Operations SuiteIntermediateDuration: 29 minutes and 43 secondsAuthor: Guy Hummel; Difficulty: Intermediate; Duration: 29 minutes and 43 seconds; Content Topics: Google Cloud Platform; This course has: 6 Units - LEARNING PATHThomas Mitchell
SC-200 Exam Prep: Microsoft Security Operations AnalystIntermediateDuration: Up to 49 hours and 57 minutesAuthor: Thomas Mitchell; Difficulty: Intermediate; Description: This course is designed to help you and your team prepare for the SC-200: Microsoft Security Operations Analyst exam.; Duration: Up to 49 hours and 57 minutes; Content Topics: Business Suites, Security; This learning path has: 61 Courses, 1 Lab challenge, 1 Exam, 5 Hands-on labs - HANDS-ON LABTiarnan Giles
Cloud Incident Response & Forensics: Introductory LabBeginnerDuration: Up to 1 hour and 5 minutesAuthor: Tiarnan Giles; Difficulty: Beginner; Description: In this, the first lab in the series, you will be performing analysis on how the attacker gained access to the system.; Duration: Up to 1 hour and 5 minutes; Content Topics: Security Investigations; This hands-on lab has: 6 Lab steps - HANDS-ON LABRichard Beck
OWASP Exercises: SQL InjectionIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: This lab shows how to manage the security level of a DVWA application and how to perform a SQL injection to a DVWA application.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 7 Lab steps - HANDS-ON LABLogan Rakai
Detecting EC2 Threats with Amazon GuardDutyBeginnerDuration: Up to 50 minutesAuthor: Logan Rakai; Difficulty: Beginner; Description: Learn how to use Amazon GuardDuty to automatically uncover malicious EC2 activity and configure threat lists to improve the security of your AWS environments.; Duration: Up to 50 minutes; Content Topics: Security; This hands-on lab has: 7 Lab steps - HANDS-ON LABAdil Islam
Managing Access in Azure Using Privileged Identity ManagementBeginnerDuration: Up to 1 hour and 15 minutesAuthor: Adil Islam; Difficulty: Beginner; Description: Learn how to assign and activate roles using Azure AD Privileged Identity Management.; Duration: Up to 1 hour and 15 minutes; Content Topics: Microsoft Azure; This hands-on lab has: 4 Lab steps - HANDS-ON LABAdil Islam
Simplifying Password Reset Using Microsoft Entra ID Self-Service Password ResetBeginnerDuration: Up to 1 hour and 15 minutesAuthor: Adil Islam; Difficulty: Beginner; Description: Learn how to enable end-users to reset forgotten passwords without the need for a call to the help desk using Microsoft Entra ID Self-Service Password Reset in this hands-on lab.; Duration: Up to 1 hour and 15 minutes; Content Topics: Microsoft Azure; This hands-on lab has: 4 Lab steps - HANDS-ON LABParveen Singh
Introduction to Microsoft SentinelBeginnerDuration: Up to 1 hourAuthor: Parveen Singh; Difficulty: Beginner; Description: Learn how to use Microsoft Sentinel security tools to collect, investigate and hunt threats using this hands-on lab.; Duration: Up to 1 hour; This hands-on lab has: 4 Lab steps - COURSEThomas Mitchell
Microsoft Entra Permissions ManagementIntermediateDuration: 29 minutes and 58 secondsAuthor: Thomas Mitchell; Difficulty: Intermediate; Duration: 29 minutes and 58 seconds; Content Topics: Microsoft Azure; This course has: 10 Units