Explore all library
3 to 24 of 168 results
Search results 3 - 24 of 168Category: Security
- HANDS-ON LABLogan RakaiCracking Passwords in LinuxIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABAdil IslamCreating Users in Microsoft Entra IDBeginnerDuration: Up to 1 hour and 15 minutesAuthor: Adil Islam; Difficulty: Beginner; Description: Learn how to create new users in Microsoft Entra ID in this hands-on lab.; Duration: Up to 1 hour and 15 minutes; Content Topics: Identity and Access Management; This hands-on lab has: 3 Lab steps
- HANDS-ON LABLogan RakaiProtect Your Code Against Attacks With GauntltIntermediateDuration: Up to 1 hour and 15 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Description: Learn how to use Gauntlt for security testing and protect your code against attacks with Guantlt by embedding it into a continuous integration pipeline.; Duration: Up to 1 hour and 15 minutes; Content Topics: Security; This hands-on lab has: 7 Lab steps
- HANDS-ON LABParveen SinghAdvanced Threat Hunting in Microsoft SentinelIntermediateDuration: Up to 1 hourAuthor: Parveen Singh; Difficulty: Intermediate; Description: Learn how to hunt for potential threats and generate incidents from bookmarks in your Azure Environments using Microsoft Sentinel in this hands-on lab.; Duration: Up to 1 hour; Content Topics: Security; This hands-on lab has: 4 Lab steps
- HANDS-ON LABParveen SinghInvestigating Security Events using Microsoft SentinelIntermediateDuration: Up to 1 hour and 30 minutesAuthor: Parveen Singh; Difficulty: Intermediate; Description: Learn how to investigate security attacks on a Windows virtual machine using Microsoft Sentinel Analytics Rule in this hands-on lab.; Duration: Up to 1 hour and 30 minutes; Content Topics: Security; This hands-on lab has: 6 Lab steps
- COURSEHallam WebberConfiguring and Managing Azure Key VaultIntermediateDuration: 33 minutes and 29 secondsAuthor: Hallam Webber; Difficulty: Intermediate; Duration: 33 minutes and 29 seconds; Content Topics: Encryption; This course has: 7 Lectures
- COURSEThomas MitchellDirectory Synchronization With Azure AD Cloud SyncBeginnerDuration: 14 minutes and 1 secondAuthor: Thomas Mitchell; Difficulty: Beginner; Duration: 14 minutes and 1 second; Content Topics: Identity and Access Management; This course has: 7 Lectures
- HANDS-ON LABTiarnan GilesCloud Incident Response & Forensics: Introductory LabBeginnerDuration: Up to 1 hour and 5 minutesAuthor: Tiarnan Giles; Difficulty: Beginner; Description: In this, the first lab in the series, you will be performing analysis on how the attacker gained access to the system.; Duration: Up to 1 hour and 5 minutes; Content Topics: Security Investigations; This hands-on lab has: 6 Lab steps
- HANDS-ON LABRichard BeckOWASP Exercises: Command ExecutionIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: This lab shows how to manage the security level of a DVWA application and how to perform a Command Execution attack from a DVWA application.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 4 Lab steps
- HANDS-ON LABLogan RakaiExecute a Stored Cross-Site Scripting (XSS) AttackIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABAdil IslamUsing Conditional Access Policies to Enable Microsoft Entra ID Multi-Factor AuthenticationBeginnerDuration: Up to 1 hour and 15 minutesAuthor: Adil Islam; Difficulty: Beginner; Description: Learn how to require multi-factor authentication (MFA) for your users with specific sign-in events using Microsoft Entra ID Conditional Access Policies in this hands-on lab.; Duration: Up to 1 hour and 15 minutes; Content Topics: Identity and Access Management; This hands-on lab has: 4 Lab steps
- COURSENikto Web App Scanner: The BasicsBeginnerDuration: 3 minutes and 21 secondsDifficulty: Beginner; Duration: 3 minutes and 21 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSEWill MeadowsHow to Find PHI and Sensitive Data in Your S3 Buckets with Amazon MacieIntermediateDuration: 15 minutes and 8 secondsAuthor: Will Meadows; Difficulty: Intermediate; Duration: 15 minutes and 8 seconds; Content Topics: Security; This course has: 3 Lectures
- COURSEJorge NegrónAutomating and Centralizing Security Checks with AWS Security HubBeginnerDuration: 19 minutes and 30 secondsAuthor: Jorge Negrón; Difficulty: Beginner; Duration: 19 minutes and 30 seconds; Content Topics: Security; This course has: 10 Lectures
- HANDS-ON LABRichard BeckOWASP Exercises: Cross-Site Scripting AttackIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: In this lab, you'll learn how to navigate through DVWA to perform an XSS attack to retrieve a session cookie.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 6 Lab steps
- COURSEShabaz DarrManaging FSLogix on Azure Virtual DesktopIntermediateDuration: 15 minutes and 59 secondsAuthor: Shabaz Darr; Difficulty: Intermediate; Duration: 15 minutes and 59 seconds; Content Topics: Security; This course has: 7 Lectures
- LEARNING PATHRoss LeoCSSLP: Domain 8 - Secure Software Supply ChainAdvancedDuration: Up to 1 hour and 5 minutesAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 1 hour and 5 minutes; Content Topics: Security; This learning path has: 5 Courses, 1 Resource, 1 Exam
- LEARNING PATHRoss LeoCSSLP: Domain 5 - Secure Software TestingAdvancedDuration: Up to 1 hour and 34 minutesAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 1 hour and 34 minutes; Content Topics: Security Assessment and Testing; This learning path has: 2 Courses, 1 Resource, 1 Exam
- LEARNING PATHRoss LeoCSSLP: Domain 4 - Secure Software ImplementationAdvancedDuration: Up to 1 hour and 42 minutesAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 1 hour and 42 minutes; Content Topics: Software development security; This learning path has: 3 Courses, 1 Resource, 1 Exam
- LEARNING PATHRoss LeoCSSLP: Domain 2 - Secure Software RequirementsAdvancedDuration: Up to 2 hours and 25 minutesAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 2 hours and 25 minutes; Content Topics: Security Governance; This learning path has: 3 Courses, 1 Resource, 2 Exams
- LEARNING PATHRoss LeoCertified Information Security Manager (CISM): Part 2 — DomainsIntermediateDuration: Up to 7 hours and 17 minutesAuthor: Ross Leo; Difficulty: Intermediate; Description: This course provides a deep dive into information security and prepares you for the Certified Information Security Manager (CISM) exam!; Duration: Up to 7 hours and 17 minutes; Content Topics: Laws, Regulation and Compliance, Security Operations, Security Governance, Risk Management; This learning path has: 8 Courses, 1 Exam
- HANDS-ON LABQACracking Hashes with John the RipperIntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: This lab demonstrates how compromised hashes can be cracked using John the Ripper.; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABTiarnan GilesCloud Incident Response & Forensics: Foundation LabBeginnerDuration: Up to 1 hour and 10 minutesAuthor: Tiarnan Giles; Difficulty: Beginner; Description: In this lab, the second in the series, you will be performing further incident response and forensic analysis to determine what the attacker did within the container.; Duration: Up to 1 hour and 10 minutes; Content Topics: Security Investigations; This hands-on lab has: 6 Lab steps
- COURSEBurpsuite Web App Proxy: The BasicsBeginnerDuration: 7 minutes and 42 secondsDifficulty: Beginner; Duration: 7 minutes and 42 seconds; Content Topics: Security; This course has: 1 Lecture