Explore all library
25 to 48 of 171 results
Search results 25 - 48 of 171Category: Security
- HANDS-ON LABStefano CascavillaManaging Encryption Keys With Google Cloud KMSIntermediateDuration: Up to 1 hourAuthor: Stefano Cascavilla; Difficulty: Intermediate; Description: In this lab you will understand core concepts of Google Cloud KMS, you will create a Key Ring and a symmetric encryption key.; Duration: Up to 1 hour; Content Topics: Security; This hands-on lab has: 7 Lab steps
- HANDS-ON LABRichard BeckOWASP Exercises: Exploiting the Heartbleed BugIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: In this lab, you'll perform the Heartbleed attack using the MetaSploit Framework in order to dump the contents of a vulnerable webserver using an unpatched version of OpenSSL.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 7 Lab steps
- HANDS-ON LABLogan RakaiProtect Your Code Against Attacks With GauntltIntermediateDuration: Up to 1 hour and 15 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Description: Learn how to use Gauntlt for security testing and protect your code against attacks with Guantlt by embedding it into a continuous integration pipeline.; Duration: Up to 1 hour and 15 minutes; Content Topics: Security; This hands-on lab has: 7 Lab steps
- HANDS-ON LABParveen SinghIntroduction to Microsoft SentinelBeginnerDuration: Up to 1 hourAuthor: Parveen Singh; Difficulty: Beginner; Description: Learn how to use Microsoft Sentinel security tools to collect, investigate and hunt threats using this hands-on lab.; Duration: Up to 1 hour; Content Topics: Security; This hands-on lab has: 4 Lab steps
- COURSERichard BeckTypes of Cyber Attacks and How to Prevent ThemBeginnerDuration: 49 minutes and 23 secondsAuthor: Richard Beck; Difficulty: Beginner; Duration: 49 minutes and 23 seconds; Content Topics: Cyber Security; This course has: 3 Lectures
- COURSEJonathan BethuneImplementing Azure Infrastructure Compliance and SecurityIntermediateDuration: 1 hour and 21 minutesAuthor: Jonathan Bethune; Difficulty: Intermediate; Duration: 1 hour and 21 minutes; Content Topics: Compliance; This course has: 13 Lectures
- COURSENMAP Network Scanner: The BasicsBeginnerDuration: 5 minutes and 43 secondsDifficulty: Beginner; Duration: 5 minutes and 43 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSEStuart ScottSharing Secrets Between Multiple Accounts Using AWS Secrets ManagerIntermediateDuration: 13 minutes and 14 secondsAuthor: Stuart Scott; Difficulty: Intermediate; Duration: 13 minutes and 14 seconds; Content Topics: Security; This course has: 2 Lectures
- COURSEHallam WebberConfiguring and Managing Azure Key VaultIntermediateDuration: 33 minutes and 29 secondsAuthor: Hallam Webber; Difficulty: Intermediate; Duration: 33 minutes and 29 seconds; Content Topics: Encryption; This course has: 7 Lectures
- COURSEThomas MitchellManaging Azure Data Protection and Security ComplianceBeginnerDuration: 1 hour and 11 minutesAuthor: Thomas Mitchell; Difficulty: Beginner; Duration: 1 hour and 11 minutes; Content Topics: Identity and Access Management, Encryption; This course has: 21 Lectures
- COURSEThomas MitchellImplementing Azure AD Identity ProtectionIntermediateDuration: 16 minutes and 10 secondsAuthor: Thomas Mitchell; Difficulty: Intermediate; Duration: 16 minutes and 10 seconds; Content Topics: Identity and Access Management; This course has: 5 Lectures
- COURSEThomas MitchellGetting Started with Conditional Access PoliciesIntermediateDuration: 15 minutes and 24 secondsAuthor: Thomas Mitchell; Difficulty: Intermediate; Duration: 15 minutes and 24 seconds; Content Topics: Identity and Access Management; This course has: 5 Lectures
- COURSEKing SamuelFundamentals of Information Security Risk ManagementBeginnerDuration: 30 minutes and 40 secondsAuthor: King Samuel; Difficulty: Beginner; Duration: 30 minutes and 40 seconds; Content Topics: Risk Management; This course has: 4 Lectures
- COURSEGuy HummelIntroduction to Google Cloud Operations SuiteIntermediateDuration: 29 minutes and 43 secondsAuthor: Guy Hummel; Difficulty: Intermediate; Duration: 29 minutes and 43 seconds; Content Topics: Compliance; This course has: 6 Lectures
- LEARNING PATHThomas MitchellSC-200 Exam Prep: Microsoft Security Operations AnalystIntermediateDuration: Up to 22 hours and 37 minutesAuthor: Thomas Mitchell; Difficulty: Intermediate; Description: This course is designed to help you and your team prepare for the SC-200: Microsoft Security Operations Analyst exam.; Duration: Up to 22 hours and 37 minutes; Content Topics: Business Suites, Security; This learning path has: 1 Resource, 14 Courses, 1 Lab challenge, 1 Exam, 5 Hands-on labs
- HANDS-ON LABRichard BeckOWASP Exercises: SQL InjectionIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: This lab shows how to manage the security level of a DVWA application and how to perform a SQL injection to a DVWA application.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 7 Lab steps
- HANDS-ON LABLogan RakaiDetecting EC2 Threats with Amazon GuardDutyBeginnerDuration: Up to 50 minutesAuthor: Logan Rakai; Difficulty: Beginner; Description: Learn how to use Amazon GuardDuty to automatically uncover malicious EC2 activity and configure threat lists to improve the security of your AWS environments.; Duration: Up to 50 minutes; Content Topics: Security; This hands-on lab has: 7 Lab steps
- HANDS-ON LABAdil IslamManaging Access in Azure Using Privileged Identity ManagementBeginnerDuration: Up to 1 hour and 15 minutesAuthor: Adil Islam; Difficulty: Beginner; Description: Learn how to assign and activate roles using Azure AD Privileged Identity Management.; Duration: Up to 1 hour and 15 minutes; Content Topics: Identity and Access Management; This hands-on lab has: 4 Lab steps
- COURSEKing SamuelUnderstanding Cyberattacks and How to Counter ThemBeginnerDuration: 18 minutes and 3 secondsAuthor: King Samuel; Difficulty: Beginner; Duration: 18 minutes and 3 seconds; Content Topics: Cyber Security, Security vulnerabilities, threats and countermeasures; This course has: 4 Lectures
- HANDS-ON LABLogan RakaiSecure Your Cloud with Microsoft Defender for CloudBeginnerDuration: Up to 2 hoursAuthor: Logan Rakai; Difficulty: Beginner; Description: Take advantage of automatic security audits and recommendations to secure your cloud with Microsoft Defender for Cloud (previously Azure Security Center) in this lab.; Duration: Up to 2 hours; Content Topics: Security; This hands-on lab has: 5 Lab steps
- COURSEStuart ScottManage Your Own Encryption Keys Using AWS CloudHSMIntermediateDuration: 32 minutes and 56 secondsAuthor: Stuart Scott; Difficulty: Intermediate; Duration: 32 minutes and 56 seconds; Content Topics: Security; This course has: 7 Lectures
- LEARNING PATHRoss LeoCertified Information Security Manager (CISM): Part 2 — DomainsIntermediateDuration: Up to 7 hours and 17 minutesAuthor: Ross Leo; Difficulty: Intermediate; Description: This course provides a deep dive into information security and prepares you for the Certified Information Security Manager (CISM) exam!; Duration: Up to 7 hours and 17 minutes; Content Topics: Laws, Regulation and Compliance, Security Operations, Security Governance, Risk Management; This learning path has: 8 Courses, 1 Exam
- HANDS-ON LABTiarnan GilesCloud Incident Response & Forensics: Foundation LabBeginnerDuration: Up to 1 hour and 10 minutesAuthor: Tiarnan Giles; Difficulty: Beginner; Description: In this lab, the second in the series, you will be performing further incident response and forensic analysis to determine what the attacker did within the container.; Duration: Up to 1 hour and 10 minutes; Content Topics: Security Investigations; This hands-on lab has: 6 Lab steps
- COURSEMetasploit Vulnerability Exploitation Tool: The BasicsBeginnerDuration: 5 minutes and 43 secondsDifficulty: Beginner; Duration: 5 minutes and 43 seconds; Content Topics: Security; This course has: 1 Lecture