Explore all library
25 to 48 of 175 results
Search results 25 - 48 of 175Category: Security
- LEARNING PATHRichard BeckIntroduction to Ethical Hacking ToolsIntermediateDuration: Up to 19 hours and 28 minutesAuthor: Richard Beck; Difficulty: Intermediate; Description: This course has been designed to introduce you to a number of different ethical hacking tools.; Duration: Up to 19 hours and 28 minutes; Content Topics: Cyber Security, Security attacks, Security vulnerabilities, threats and countermeasures; This learning path has: 10 Courses, 9 Resources, 3 Exams, 15 Hands-on labs
- LEARNING PATHDanny JesseeAWS Security – Specialty (SCS-C02) Certification PreparationAdvancedDuration: Up to 44 hours and 44 minutesAuthor: Danny Jessee; Difficulty: Advanced; Description: Train to prepare for the AWS Certified Security – Specialty Certification (SCS-C02) exam, released in July 2023!; Duration: Up to 44 hours and 44 minutes; Content Topics: Amazon Web Services; This learning path has: 6 Courses, 3 Lab challenges, 6 Exams, 17 Hands-on labs
- HANDS-ON LABStefano CascavillaInspecting and De-Identifying Data With Google Cloud Data Loss PreventionIntermediateDuration: Up to 45 minutesAuthor: Stefano Cascavilla; Difficulty: Intermediate; Description: In this lab, you will inspect data stored in Cloud Storage and understand the sensitive information therein.; Duration: Up to 45 minutes; Content Topics: Google Cloud Platform; This hands-on lab has: 4 Lab steps
- HANDS-ON LABStefano CascavillaManaging Encryption Keys With Google Cloud KMSIntermediateDuration: Up to 1 hourAuthor: Stefano Cascavilla; Difficulty: Intermediate; Description: In this lab you will understand core concepts of Google Cloud KMS, you will create a Key Ring and a symmetric encryption key.; Duration: Up to 1 hour; Content Topics: Security; This hands-on lab has: 7 Lab steps
- HANDS-ON LABRichard BeckOWASP Exercises: Exploiting the Heartbleed BugIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: In this lab, you'll perform the Heartbleed attack using the MetaSploit Framework in order to dump the contents of a vulnerable webserver using an unpatched version of OpenSSL.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 7 Lab steps
- HANDS-ON LABLogan RakaiCracking Passwords in LinuxIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABLogan RakaiProtect Your Code Against Attacks With GauntltIntermediateDuration: Up to 1 hour and 15 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Description: Learn how to use Gauntlt for security testing and protect your code against attacks with Guantlt by embedding it into a continuous integration pipeline.; Duration: Up to 1 hour and 15 minutes; Content Topics: Security; This hands-on lab has: 7 Lab steps
- COURSERichard BeckTypes of Cyber Attacks and How to Prevent ThemBeginnerDuration: 49 minutes and 23 secondsAuthor: Richard Beck; Difficulty: Beginner; Duration: 49 minutes and 23 seconds; Content Topics: Cyber Security; This course has: 3 Units
- COURSEJonathan BethuneImplementing Azure Infrastructure Compliance and SecurityIntermediateDuration: 1 hour and 21 minutesAuthor: Jonathan Bethune; Difficulty: Intermediate; Duration: 1 hour and 21 minutes; Content Topics: Compliance; This course has: 13 Units
- COURSENMAP Network Scanner: The BasicsBeginnerDuration: 5 minutes and 43 secondsDifficulty: Beginner; Duration: 5 minutes and 43 seconds; Content Topics: Security; This course has: 1 Unit
- COURSEStuart ScottSharing Secrets Between Multiple Accounts Using AWS Secrets ManagerIntermediateDuration: 13 minutes and 14 secondsAuthor: Stuart Scott; Difficulty: Intermediate; Duration: 13 minutes and 14 seconds; Content Topics: Security; This course has: 2 Units
- COURSEThomas MitchellImplementing and Managing Azure Active Directory Password ProtectionBeginnerDuration: 23 minutes and 42 secondsAuthor: Thomas Mitchell; Difficulty: Beginner; Duration: 23 minutes and 42 seconds; Content Topics: Microsoft Azure; This course has: 7 Units
- COURSEHallam WebberConfiguring and Managing Azure Key VaultIntermediateDuration: 33 minutes and 29 secondsAuthor: Hallam Webber; Difficulty: Intermediate; Duration: 33 minutes and 29 seconds; Content Topics: Microsoft Azure; This course has: 7 Units
- COURSEThomas MitchellManaging Azure Data Protection and Security ComplianceBeginnerDuration: 1 hour and 11 minutesAuthor: Thomas Mitchell; Difficulty: Beginner; Duration: 1 hour and 11 minutes; Content Topics: Microsoft Azure; This course has: 21 Units
- COURSEThomas MitchellGetting Started with Conditional Access PoliciesIntermediateDuration: 15 minutes and 24 secondsAuthor: Thomas Mitchell; Difficulty: Intermediate; Duration: 15 minutes and 24 seconds; Content Topics: Identity and Access Management; This course has: 5 Units
- COURSEKing SamuelFundamentals of Information Security Risk ManagementBeginnerDuration: 30 minutes and 40 secondsAuthor: King Samuel; Difficulty: Beginner; Duration: 30 minutes and 40 seconds; Content Topics: Risk Management; This course has: 4 Units
- COURSEGuy HummelIntroduction to Google Cloud Operations SuiteIntermediateDuration: 29 minutes and 43 secondsAuthor: Guy Hummel; Difficulty: Intermediate; Duration: 29 minutes and 43 seconds; Content Topics: Google Cloud Platform; This course has: 6 Units
- HANDS-ON LABTiarnan GilesCloud Incident Response & Forensics: Introductory LabBeginnerDuration: Up to 1 hour and 5 minutesAuthor: Tiarnan Giles; Difficulty: Beginner; Description: In this, the first lab in the series, you will be performing analysis on how the attacker gained access to the system.; Duration: Up to 1 hour and 5 minutes; Content Topics: Security Investigations; This hands-on lab has: 6 Lab steps
- HANDS-ON LABRichard BeckOWASP Exercises: SQL InjectionIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: This lab shows how to manage the security level of a DVWA application and how to perform a SQL injection to a DVWA application.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 7 Lab steps
- HANDS-ON LABLogan RakaiDetecting EC2 Threats with Amazon GuardDutyBeginnerDuration: Up to 50 minutesAuthor: Logan Rakai; Difficulty: Beginner; Description: Learn how to use Amazon GuardDuty to automatically uncover malicious EC2 activity and configure threat lists to improve the security of your AWS environments.; Duration: Up to 50 minutes; Content Topics: Security; This hands-on lab has: 7 Lab steps
- HANDS-ON LABAdil IslamManaging Access in Azure Using Privileged Identity ManagementBeginnerDuration: Up to 1 hour and 15 minutesAuthor: Adil Islam; Difficulty: Beginner; Description: Learn how to assign and activate roles using Azure AD Privileged Identity Management.; Duration: Up to 1 hour and 15 minutes; Content Topics: Microsoft Azure; This hands-on lab has: 4 Lab steps
- HANDS-ON LABParveen SinghIntroduction to Microsoft SentinelBeginnerDuration: Up to 1 hourAuthor: Parveen Singh; Difficulty: Beginner; Description: Learn how to use Microsoft Sentinel security tools to collect, investigate and hunt threats using this hands-on lab.; Duration: Up to 1 hour; This hands-on lab has: 4 Lab steps
- COURSEThomas MitchellMicrosoft Entra Permissions ManagementIntermediateDuration: 29 minutes and 58 secondsAuthor: Thomas Mitchell; Difficulty: Intermediate; Duration: 29 minutes and 58 seconds; Content Topics: Microsoft Azure; This course has: 10 Units
- COURSEWill MeadowsHow to Find PHI and Sensitive Data in Your S3 Buckets with Amazon MacieIntermediateDuration: 15 minutes and 8 secondsAuthor: Will Meadows; Difficulty: Intermediate; Duration: 15 minutes and 8 seconds; Content Topics: Security; This course has: 3 Units