Explore all library
49 to 72 of 177 results
Search results 49 - 72 of 177Category: Security
- COURSEWill Meadows
How to Find PHI and Sensitive Data in Your S3 Buckets with Amazon MacieIntermediateDuration: 15 minutes and 8 secondsAuthor: Will Meadows; Difficulty: Intermediate; Duration: 15 minutes and 8 seconds; Content Topics: Security; This course has: 3 Units - COURSEKing Samuel
Understanding Cyberattacks and How to Counter ThemBeginnerDuration: 18 minutes and 3 secondsAuthor: King Samuel; Difficulty: Beginner; Duration: 18 minutes and 3 seconds; Content Topics: Cyber Security, Security vulnerabilities, threats and countermeasures; This course has: 4 Units - HANDS-ON LABRichard Beck
OWASP Exercises: Cross-Site Scripting AttackIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: In this lab, you'll learn how to navigate through DVWA to perform an XSS attack to retrieve a session cookie.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 6 Lab steps - HANDS-ON LABLogan Rakai
Secure Your Cloud with Microsoft Defender for CloudBeginnerDuration: Up to 2 hoursAuthor: Logan Rakai; Difficulty: Beginner; Description: Take advantage of automatic security audits and recommendations to secure your cloud with Microsoft Defender for Cloud (previously Azure Security Center) in this lab.; Duration: Up to 2 hours; Content Topics: Security; This hands-on lab has: 5 Lab steps - COURSEStuart Scott
Manage Your Own Encryption Keys Using AWS CloudHSMIntermediateDuration: 32 minutes and 56 secondsAuthor: Stuart Scott; Difficulty: Intermediate; Duration: 32 minutes and 56 seconds; Content Topics: Security; This course has: 7 Units - LEARNING PATHAtil Samancioglu
Web Penetration Testing & Bug Bounty HuntingIntermediateDuration: Up to 17 hours and 51 minutesAuthor: Atil Samancioglu; Difficulty: Intermediate; Description: Learn how to find vulnerabilities and bugs in websites & web applications, how to secure your own builds, and learn how to start making money from bug bounties!; Duration: Up to 17 hours and 51 minutes; Content Topics: Security Assessment and Testing, SQL; This learning path has: 20 Courses - LEARNING PATHRoss Leo
Certified Information Security Manager (CISM): Part 2 — DomainsIntermediateDuration: Up to 7 hours and 17 minutesAuthor: Ross Leo; Difficulty: Intermediate; Description: This course provides a deep dive into information security and prepares you for the Certified Information Security Manager (CISM) exam!; Duration: Up to 7 hours and 17 minutes; Content Topics: Laws, Regulation and Compliance, Security Operations, Security Governance, Risk Management; This learning path has: 8 Courses, 1 Exam - HANDS-ON LABTiarnan Giles
Cloud Incident Response & Forensics: Foundation LabBeginnerDuration: Up to 1 hour and 10 minutesAuthor: Tiarnan Giles; Difficulty: Beginner; Description: In this lab, the second in the series, you will be performing further incident response and forensic analysis to determine what the attacker did within the container.; Duration: Up to 1 hour and 10 minutes; Content Topics: Security Investigations; This hands-on lab has: 6 Lab steps - COURSEMetasploit Vulnerability Exploitation Tool: The BasicsBeginnerDuration: 5 minutes and 43 secondsDifficulty: Beginner; Duration: 5 minutes and 43 seconds; Content Topics: Security; This course has: 1 Unit
- COURSEQA
SQLmap SQL Injection Tool: The BasicsBeginnerDuration: 6 minutes and 44 secondsAuthor: QA; Difficulty: Beginner; Duration: 6 minutes and 44 seconds; Content Topics: Security; This course has: 1 Unit - COURSEBurpsuite Web App Proxy: The BasicsBeginnerDuration: 7 minutes and 42 secondsDifficulty: Beginner; Duration: 7 minutes and 42 seconds; Content Topics: Security; This course has: 1 Unit
- COURSENetcat Network Utility: The BasicsBeginnerDuration: 5 minutes and 26 secondsDifficulty: Beginner; Duration: 5 minutes and 26 seconds; Content Topics: Security; This course has: 1 Unit
- COURSERoss Leo
CISSP Exam Prep: Domain 7 - Security Operations - Module 1IntermediateDuration: 47 minutes and 7 secondsAuthor: Ross Leo; Difficulty: Intermediate; Duration: 47 minutes and 7 seconds; Content Topics: Security Operations; This course has: 5 Units - COURSEHallam Webber
Configuring Azure Key Vault RBAC and PoliciesIntermediateDuration: 12 minutes and 3 secondsAuthor: Hallam Webber; Difficulty: Intermediate; Duration: 12 minutes and 3 seconds; Content Topics: Microsoft Azure; This course has: 4 Units - COURSEHallam Webber
Configuring and Managing Azure Active Directory Device JoinIntermediateDuration: 24 minutes and 16 secondsAuthor: Hallam Webber; Difficulty: Intermediate; Duration: 24 minutes and 16 seconds; Content Topics: Microsoft Azure; This course has: 7 Units - COURSEHallam Webber
Configuring Tenant-Wide Settings in Azure Active DirectoryBeginnerDuration: 18 minutes and 28 secondsAuthor: Hallam Webber; Difficulty: Beginner; Duration: 18 minutes and 28 seconds; Content Topics: Microsoft Azure; This course has: 7 Units - COURSELee Mucciarone
Microsoft Encryption and HashingBeginnerDuration: 11 minutes and 48 secondsAuthor: Lee Mucciarone; Difficulty: Beginner; Duration: 11 minutes and 48 seconds; Content Topics: Encryption; This course has: 4 Units - COURSEDaniel Mease
Introduction to Google Cloud ArmorIntermediateDuration: 1 minute and 48 secondsAuthor: Daniel Mease; Difficulty: Intermediate; Duration: 1 minute and 48 seconds; Content Topics: Security; This course has: 5 Units - COURSEStuart Scott
Using AWS Secrets Manager to Manage, Rotate, and Retrieve SecretsIntermediateDuration: 13 minutes and 59 secondsAuthor: Stuart Scott; Difficulty: Intermediate; Duration: 13 minutes and 59 seconds; Content Topics: Encryption; This course has: 1 Unit - LEARNING PATHInformation Security Management EssentialsBeginnerDuration: Up to 15 hours and 4 minutesDifficulty: Beginner; Description: Welcome to this course on Information Security Management Essentials.; Duration: Up to 15 hours and 4 minutes; This learning path has: 23 Courses, 8 Exams
- HANDS-ON LABTiarnan Giles
Cloud Incident Response & Forensics: Intermediate LabIntermediateDuration: Up to 1 hour and 10 minutesAuthor: Tiarnan Giles; Difficulty: Intermediate; Description: In this lab, you will figure out what the attacker did in the host machine and generate a report which breaks down what happened.; Duration: Up to 1 hour and 10 minutes; Content Topics: Security Investigations; This hands-on lab has: 6 Lab steps - HANDS-ON LABLogan Rakai
Execute a Reflected Cross-Site Scripting (XSS) AttackIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps - COURSELee Mucciarone
Troubleshooting Azure Active Directory Connect SynchronizationBeginnerDuration: 19 minutes and 18 secondsAuthor: Lee Mucciarone; Difficulty: Beginner; Duration: 19 minutes and 18 seconds; Content Topics: Microsoft Azure; This course has: 5 Units - COURSEThomas Mitchell
Directory Synchronization With Azure AD Cloud SyncBeginnerDuration: 14 minutes and 1 secondAuthor: Thomas Mitchell; Difficulty: Beginner; Duration: 14 minutes and 1 second; Content Topics: Microsoft Azure; This course has: 7 Units