Explore all library
2 to 24 of 168 results
Search results 2 - 24 of 168Category: Security
- COURSERichard BeckTypes of Cyber Attacks and How to Prevent ThemBeginnerDuration: 49 minutes and 23 secondsAuthor: Richard Beck; Difficulty: Beginner; Duration: 49 minutes and 23 seconds; Content Topics: Cyber Security; This course has: 3 Lectures
- COURSEJonathan BethuneImplementing Azure Infrastructure Compliance and SecurityIntermediateDuration: 1 hour and 21 minutesAuthor: Jonathan Bethune; Difficulty: Intermediate; Duration: 1 hour and 21 minutes; Content Topics: Compliance; This course has: 13 Lectures
- COURSENMAP Network Scanner: The BasicsBeginnerDuration: 5 minutes and 43 secondsDifficulty: Beginner; Duration: 5 minutes and 43 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSEStuart ScottSharing Secrets Between Multiple Accounts Using AWS Secrets ManagerIntermediateDuration: 13 minutes and 14 secondsAuthor: Stuart Scott; Difficulty: Intermediate; Duration: 13 minutes and 14 seconds; Content Topics: Security; This course has: 2 Lectures
- COURSEThomas MitchellManaging Azure Data Protection and Security ComplianceBeginnerDuration: 1 hour and 11 minutesAuthor: Thomas Mitchell; Difficulty: Beginner; Duration: 1 hour and 11 minutes; Content Topics: Identity and Access Management, Encryption; This course has: 21 Lectures
- COURSEThomas MitchellImplementing Azure AD Identity ProtectionIntermediateDuration: 16 minutes and 10 secondsAuthor: Thomas Mitchell; Difficulty: Intermediate; Duration: 16 minutes and 10 seconds; Content Topics: Identity and Access Management; This course has: 5 Lectures
- COURSEThomas MitchellGetting Started with Conditional Access PoliciesIntermediateDuration: 15 minutes and 24 secondsAuthor: Thomas Mitchell; Difficulty: Intermediate; Duration: 15 minutes and 24 seconds; Content Topics: Identity and Access Management; This course has: 5 Lectures
- COURSEStuart ScottUsing AWS SSO to Simplify Access Across Your AWS OrganizationIntermediateDuration: 13 minutes and 55 secondsAuthor: Stuart Scott; Difficulty: Intermediate; Duration: 13 minutes and 55 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSEKing SamuelFundamentals of Information Security Risk ManagementBeginnerDuration: 30 minutes and 40 secondsAuthor: King Samuel; Difficulty: Beginner; Duration: 30 minutes and 40 seconds; Content Topics: Risk Management; This course has: 4 Lectures
- COURSEGuy HummelIntroduction to Google Cloud Operations SuiteIntermediateDuration: 29 minutes and 43 secondsAuthor: Guy Hummel; Difficulty: Intermediate; Duration: 29 minutes and 43 seconds; Content Topics: Compliance; This course has: 6 Lectures
- HANDS-ON LABRichard BeckOWASP Exercises: SQL InjectionIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: This lab shows how to manage the security level of a DVWA application and how to perform a SQL injection to a DVWA application.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 7 Lab steps
- HANDS-ON LABLogan RakaiDetecting EC2 Threats with Amazon GuardDutyBeginnerDuration: Up to 50 minutesAuthor: Logan Rakai; Difficulty: Beginner; Description: Learn how to use Amazon GuardDuty to automatically uncover malicious EC2 activity and configure threat lists to improve the security of your AWS environments.; Duration: Up to 50 minutes; Content Topics: Security; This hands-on lab has: 7 Lab steps
- HANDS-ON LABAdil IslamManaging Access in Azure Using Privileged Identity ManagementBeginnerDuration: Up to 1 hour and 15 minutesAuthor: Adil Islam; Difficulty: Beginner; Description: Learn how to assign and activate roles using Azure AD Privileged Identity Management.; Duration: Up to 1 hour and 15 minutes; Content Topics: Identity and Access Management; This hands-on lab has: 4 Lab steps
- COURSEKing SamuelUnderstanding Cyberattacks and How to Counter ThemBeginnerDuration: 18 minutes and 3 secondsAuthor: King Samuel; Difficulty: Beginner; Duration: 18 minutes and 3 seconds; Content Topics: Cyber Security, Security vulnerabilities, threats and countermeasures; This course has: 4 Lectures
- HANDS-ON LABLogan RakaiSecure Your Cloud with Microsoft Defender for CloudBeginnerDuration: Up to 2 hoursAuthor: Logan Rakai; Difficulty: Beginner; Description: Take advantage of automatic security audits and recommendations to secure your cloud with Microsoft Defender for Cloud (previously Azure Security Center) in this lab.; Duration: Up to 2 hours; Content Topics: Security; This hands-on lab has: 5 Lab steps
- COURSEStuart ScottManage Your Own Encryption Keys Using AWS CloudHSMIntermediateDuration: 32 minutes and 56 secondsAuthor: Stuart Scott; Difficulty: Intermediate; Duration: 32 minutes and 56 seconds; Content Topics: Security; This course has: 7 Lectures
- COURSEMetasploit Vulnerability Exploitation Tool: The BasicsBeginnerDuration: 5 minutes and 43 secondsDifficulty: Beginner; Duration: 5 minutes and 43 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSEQASQLmap SQL Injection Tool: The BasicsBeginnerDuration: 6 minutes and 44 secondsAuthor: QA; Difficulty: Beginner; Duration: 6 minutes and 44 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSENetcat Network Utility: The BasicsBeginnerDuration: 5 minutes and 26 secondsDifficulty: Beginner; Duration: 5 minutes and 26 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSEDaniel MeaseIntroduction to Google Cloud ArmorIntermediateDuration: 28 minutesAuthor: Daniel Mease; Difficulty: Intermediate; Duration: 28 minutes; Content Topics: Security; This course has: 5 Lectures
- COURSEThomas MitchellAn Intro to Microsoft Defender for IdentityIntermediateDuration: 18 minutes and 43 secondsAuthor: Thomas Mitchell; Difficulty: Intermediate; Duration: 18 minutes and 43 seconds; Content Topics: Security; This course has: 5 Lectures
- LEARNING PATHRoss LeoCSSLP: Domain 1 - Secure Software ConceptsAdvancedDuration: Up to 5 hours and 35 minutesAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 5 hours and 35 minutes; Content Topics: Cyber Security, Laws, Regulation and Compliance, Risk Management, Security vulnerabilities, threats and countermeasures; This learning path has: 5 Courses, 1 Resource, 4 Exams
- HANDS-ON LABRichard BeckOWASP Exercises: Exploiting the Heartbleed BugIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: In this lab, you'll perform the Heartbleed attack using the MetaSploit Framework in order to dump the contents of a vulnerable webserver using an unpatched version of OpenSSL.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 7 Lab steps
- HANDS-ON LABLogan RakaiExecute a Reflected Cross-Site Scripting (XSS) AttackIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps