Explore all library
49 to 72 of 147 results
Search results 49 - 72 of 147Category: Security
- COURSEThomas Mitchell
Microsoft Entra Permissions ManagementIntermediateDuration: 29 minutes and 58 secondsAuthor: Thomas Mitchell; Difficulty: Intermediate; Duration: 29 minutes and 58 seconds; Content Topics: Microsoft Azure; This course has: 10 Units - COURSEWill Meadows
How to Find PHI and Sensitive Data in Your S3 Buckets with Amazon MacieIntermediateDuration: 15 minutes and 8 secondsAuthor: Will Meadows; Difficulty: Intermediate; Duration: 15 minutes and 8 seconds; Content Topics: Security; This course has: 3 Units - HANDS-ON LABRichard Beck
OWASP Exercises: Cross-Site Scripting AttackIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: In this lab, you'll learn how to navigate through DVWA to perform an XSS attack to retrieve a session cookie.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 6 Lab steps - HANDS-ON LABAdil Islam
Managing Access in Azure Using Privileged Identity ManagementBeginnerDuration: Up to 1 hour and 15 minutesAuthor: Adil Islam; Difficulty: Beginner; Description: Learn how to assign and activate roles using Azure AD Privileged Identity Management.; Duration: Up to 1 hour and 15 minutes; Content Topics: Microsoft Azure; This hands-on lab has: 4 Lab steps - HANDS-ON LABLogan Rakai
Secure Your Cloud with Microsoft Defender for CloudBeginnerDuration: Up to 2 hoursAuthor: Logan Rakai; Difficulty: Beginner; Description: Take advantage of automatic security audits and recommendations to secure your cloud with Microsoft Defender for Cloud (previously Azure Security Center) in this lab.; Duration: Up to 2 hours; Content Topics: Security; This hands-on lab has: 5 Lab steps - COURSEStuart Scott
Manage Your Own Encryption Keys Using AWS CloudHSMIntermediateDuration: 32 minutes and 56 secondsAuthor: Stuart Scott; Difficulty: Intermediate; Duration: 32 minutes and 56 seconds; Content Topics: Security; This course has: 7 Units - LEARNING PATHAtil Samancioglu
Web Penetration Testing & Bug Bounty HuntingIntermediateDuration: Up to 17 hours and 51 minutesAuthor: Atil Samancioglu; Difficulty: Intermediate; Description: Learn how to find vulnerabilities and bugs in websites & web applications, how to secure your own builds, and learn how to start making money from bug bounties!; Duration: Up to 17 hours and 51 minutes; Content Topics: Security Assessment and Testing, SQL; This learning path has: 20 Courses - LEARNING PATHAtil Samancioglu
Practical Deep Dive into Pentesting & Privilege EscalationIntermediateDuration: Up to 10 hours and 11 minutesAuthor: Atil Samancioglu; Difficulty: Intermediate; Description: Pentesting & Privilege Escalation; Duration: Up to 10 hours and 11 minutes; This learning path has: 8 Courses - LEARNING PATHRoss Leo
Certified Information Security Manager (CISM): Part 2 — DomainsIntermediateDuration: Up to 7 hours and 17 minutesAuthor: Ross Leo; Difficulty: Intermediate; Description: This course provides a deep dive into information security and prepares you for the Certified Information Security Manager (CISM) exam!; Duration: Up to 7 hours and 17 minutes; Content Topics: Laws, Regulation and Compliance, Security Operations, Security Governance, Risk Management; This learning path has: 8 Courses, 1 Exam - HANDS-ON LABTiarnan Giles
Cloud Incident Response & Forensics: Foundation LabBeginnerDuration: Up to 1 hour and 10 minutesAuthor: Tiarnan Giles; Difficulty: Beginner; Description: In this lab, the second in the series, you will be performing further incident response and forensic analysis to determine what the attacker did within the container.; Duration: Up to 1 hour and 10 minutes; Content Topics: Security Investigations; This hands-on lab has: 6 Lab steps - COURSEMetasploit Vulnerability Exploitation Tool: The BasicsBeginnerDuration: 5 minutes and 43 secondsDifficulty: Beginner; Duration: 5 minutes and 43 seconds; Content Topics: Security; This course has: 1 Unit
- COURSEQA
SQLmap SQL Injection Tool: The BasicsBeginnerDuration: 6 minutes and 44 secondsAuthor: QA; Difficulty: Beginner; Duration: 6 minutes and 44 seconds; Content Topics: Security; This course has: 1 Unit - COURSEBurpsuite Web App Proxy: The BasicsBeginnerDuration: 7 minutes and 42 secondsDifficulty: Beginner; Duration: 7 minutes and 42 seconds; Content Topics: Security; This course has: 1 Unit
- COURSENetcat Network Utility: The BasicsBeginnerDuration: 5 minutes and 26 secondsDifficulty: Beginner; Duration: 5 minutes and 26 seconds; Content Topics: Security; This course has: 1 Unit
- COURSEHallam Webber
Configuring Azure Key Vault RBAC and PoliciesIntermediateDuration: 12 minutes and 3 secondsAuthor: Hallam Webber; Difficulty: Intermediate; Duration: 12 minutes and 3 seconds; Content Topics: Microsoft Azure; This course has: 4 Units - COURSEHallam Webber
Configuring and Managing Azure Active Directory Device JoinIntermediateDuration: 24 minutes and 16 secondsAuthor: Hallam Webber; Difficulty: Intermediate; Duration: 24 minutes and 16 seconds; Content Topics: Microsoft Azure; This course has: 7 Units - COURSEHallam Webber
Configuring Tenant-Wide Settings in Azure Active DirectoryBeginnerDuration: 18 minutes and 28 secondsAuthor: Hallam Webber; Difficulty: Beginner; Duration: 18 minutes and 28 seconds; Content Topics: Microsoft Azure; This course has: 7 Units - COURSELee Mucciarone
Microsoft Encryption and HashingBeginnerDuration: 11 minutes and 48 secondsAuthor: Lee Mucciarone; Difficulty: Beginner; Duration: 11 minutes and 48 seconds; Content Topics: Encryption; This course has: 4 Units - COURSEDaniel Mease
Introduction to Google Cloud ArmorIntermediateDuration: 28 minutesAuthor: Daniel Mease; Difficulty: Intermediate; Duration: 28 minutes; Content Topics: Security; This course has: 5 Units - COURSEStuart Scott
Using AWS Secrets Manager to Manage, Rotate, and Retrieve SecretsIntermediateDuration: 13 minutes and 59 secondsAuthor: Stuart Scott; Difficulty: Intermediate; Duration: 13 minutes and 59 seconds; Content Topics: Encryption; This course has: 1 Unit - LEARNING PATHInformation Security Management EssentialsBeginnerDuration: Up to 15 hours and 4 minutesDifficulty: Beginner; Description: Welcome to this course on Information Security Management Essentials.; Duration: Up to 15 hours and 4 minutes; This learning path has: 23 Courses, 8 Exams
- HANDS-ON LABTiarnan Giles
Cloud Incident Response & Forensics: Intermediate LabIntermediateDuration: Up to 1 hour and 10 minutesAuthor: Tiarnan Giles; Difficulty: Intermediate; Description: In this lab, you will figure out what the attacker did in the host machine and generate a report which breaks down what happened.; Duration: Up to 1 hour and 10 minutes; Content Topics: Security Investigations; This hands-on lab has: 6 Lab steps - HANDS-ON LABLogan Rakai
Execute a Reflected Cross-Site Scripting (XSS) AttackIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps - COURSELee Mucciarone
Troubleshooting Azure Active Directory Connect SynchronizationBeginnerDuration: 19 minutes and 18 secondsAuthor: Lee Mucciarone; Difficulty: Beginner; Duration: 19 minutes and 18 seconds; Content Topics: Microsoft Azure; This course has: 5 Units